InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
There is no one correct way to build and maintain an asset inventory. Each organization has its own unique set of requirements and constraints that should drive toward a solution, and there are many options for validating and augmenting whatever solution is selected. This piece explains how to use the tools you have in place already, supplemented where necessary, to create a strong cybersecurity asset management process that fits the business and can be maintained over time.
Building and maintaining an inventory of systems is difficult. Across all market verticals, organizations of all sizes struggle with this deceptively challenging task. Those with the greatest success rates are organizations that take a multi-pronged approach. Single point solutions – even commercial offerings – often fail because they do not have a broad enough set of discovery options.
Most organizations approach systems inventory by leveraging as many sources as possible. While not an inclusive list, the items listed below are commonly available and for consideration:
Gathering inventory data from such varied and disparate systems is challenging, however. Organizations should consider:
When it comes to asset management, one size doesn’t fit all, and force-fitting your needs into a single out-of-the-box platform will likely not get you where you want to be. To help ensure you can track and manage all assets successfully over time consider:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
May 19, 2022
By IANS Faculty
Understand potential security risks for executives on social media. Find information on attack trends and guidelines to help identify potential attacks and keep both social media accounts and the organization secure.
May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
May 12, 2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.