IAITAM CAMSE TRAINING
The intent of security is to manage risks and the extent of the loss after an incident. This simplistic definition does not do justice to the enormous scope of organizational security and the complexity of the processes required. The investment in security processes, automation and professionals has been significant for most organizations and continues to consume budgets on an ongoing basis, from physical security to the myriad of types of information security. Yet, organizational security is routinely rated poorly, especially with the rapidly growing threats to information security. At the same time, the consequences from these failures escalate as laws are put in place to protect individual privacy, create reporting requirements and demand accurate inventory information on which to build security processes. The responsibility for securing the organization and its data is a priority for most organizations and should be part of every employee’s responsibility.
The mission of IAITAM’s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance.
Onsite and Online Courses
Contact Us For Pricing
CAMSE Course Dates
Online Class Requirements
Students will benefit from participating in live discussions over WEBCAM and should take every opportunity to test the Microsoft Skype for Business ® conference software prior to the start of class (see your class schedule). High bandwidth connections are required (3.0 Mbps minimum) for video and audio.
Full Refunds (minus processing fee) are given up to 30 days prior to the scheduled class date. Within 30 days, 50% refund will be given. If less than 2 weeks, NO REFUND will be given, though you may opt to reschedule your class date.
Class registration closes two weeks prior to class. If there is a pressing need for a seat, please send an email to email@example.com with the subject ‘LATE REGISTRATION’ and your contact information. We will do our best to get you a seat, but we cannot guarantee availability.
Day 1- Course Outline
• Introduction to IAITAM
• Student Introductions
• ITAM Code of Ethics
• Description of a CAMSE
• Overview of the ITAM Program
• IAITAM Key Process Areas
• Communication and Education
• Policy and Procedures
• ITAM Processes:
o Request, Approval, and Purchasing
o Receiving, Acceptance, and Inventory
o Use and Inventory
o Disposal Management
o Documentation Management
o Vendor Management
o Financial Management
o Program Management
o Compliance Management
o Legislation Management
o Project Management
Day 2- Course Outline
• Scope of Security and IT Asset Management
• Communication and Education for Information Security
• Policies for Information Security
• ITAM Program Assessment for Security
• General Security Program and Plan
• Acquisition Management
• Asset Identification Management and Inventory
• Disposal Management
• Updating the ITAM Program Roadmap
• Security Emphasis by ITAM Role
• Evaluating the ITAM Contribution to Security
• IT Security Role Topics of Conversation
• Laws and Standards Governing Information Security
• Questions and Review Before Exam
Want to Become A Training Partner?