IT asset disposal is a security risk CISOs need to take seriously

2 years ago 61
BOOK THIS SPACE FOR AD
ARTICLE AD

22. June 2021

This article has been indexed from CSO Online

Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Lack of a program signals data may be at risk when equipment is recycled; presence of a program signals attention to data protection. No CISO wants to encounter the former; every CISO wishes to be associated with the latter, though it may be a false-positive if the program does not include an auditable chain of custody/data destruction.

Can you, the CISO, or your team in charge of the ITAD, describe how each device provisioned and issued within the company is tracked, the data on the device is accounted for, and when and how that device is removed from the company ecosystem in a way the company and its customers’ data is protected?

To read this article in full, please click here

Read the original article: IT asset disposal is a security risk CISOs need to take seriously

Read Entire Article