As the world becomes more connected, digital security is paramount—not simply for maintaining positive customer relations but for global security and safety. This is one of, if not the most important parts of a robust ITAM & Security strategy. However, the task has never been more monumental. Not only do your organization’s tens of thousands of networked devices need to be tracked, but even employees’ personal devices, such as their phones and personal computers, need to be taken into consideration.
Protecting information from cyber-attacks is so crucial that extensive Executive Orders are in place to guide what companies are accountable for. Executive Order 14028: Improving the Nation’s Cybersecurity was a direct result of the Solar Winds incident, which was released in 2021. Based on this EO, Memorandum M2218: Enhancing the Security of the Software Supply Chain through Secure Software Development Practices was also recently released. Listen in as Blake helps dive into what this means for your organization.
- 3 major security breach case studies
- The triggers you need to keep an eye on
- Importance of accurate data, inventories, and usage
- How to reduce and mitigate security exposures
If you’re interested in learning more about Blake, connect with him on LinkedIn.
Listen in on our latest podcasts by checking out the ITAM Executive.