Navigating Asset Management and Compliance with Marie Joseph, Trava

the Tea on Cybersecurity

We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.

Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.

In this episode, you’ll learn:

  • Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.

  • How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.

  • Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements.

The Tea on Cybersecurity

Cybersecurity—a word we hear all the time. Show of hands for those that actually understand what it means.

The Tea on Cybersecurity is here to help educate the newbs on what cybersecurity is, why it is important, and everything in between. The Tea on Cybersecurity is for everyone, but especially those small and medium-sized businesses that are starting their journey in building a cyber risk management program. Each show is about 15 minutes long to deliver you with the facts and less fluff.