Certified Asset Management Security Expert (CAMSE)

Training Summary
The intent of security is to manage risks and the extent of the loss after an incident. This simplistic definition does not do justice to the enormous scope of organizational security and the complexity of the processes required. The investment in security processes, automation and professionals has been significant for most organizations and continues to consume budgets on an ongoing basis, from physical security to the myriad of types of information security. Yet, organizational security is routinely rated poorly, especially with the rapidly growing threats to information security. At the same time, the consequences from these failures escalate as laws are put in place to protect individual privacy, create reporting requirements and demand accurate inventory information on which to build security processes. The responsibility for securing the organization and its data is a priority for most organizations and should be part of every employee’s responsibility. The mission of IAITAM’s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. Training to be provided by Anglepoint which is an accredited training organization with IAITAM.
There are no prerequisites for this course.
1 Day/Lecture & Lab
IT Asset Management professionals
Course Topics
  • Introduction to IAITAM
  • Student Introductions
  • ITAM Code of Ethics
  • Description of a CAMSE
  • Overview of the ITAM Program
  • IAITAM Key Process Areas
  • Communication and Education
  • Policy and Procedures
  • ITAM Processes:
  • Request, Approval, and Purchasing
  • Receiving, Acceptance, and Inventory
  • Use and Inventory
  • Disposal Management
  • Documentation Management
  • Vendor Management
  • Financial Management
  • Program Management
  • Compliance Management
  • Legislation Management
  • Project Management
  • Scope of Security and IT Asset Management
  • Communication and Education for Information Security
  • Policies for Information Security
  • ITAM Program Assessment for Security
  • General Security Program and Plan
  • Acquisition Management
  • Asset Identification Management and Inventory
  • Disposal Management
  • Updating the ITAM Program Roadmap
  • Security Emphasis by ITAM Role
  • Evaluating the ITAM Contribution to Security
  • IT Security Role Topics of Conversation
  • Laws and Standards Governing Information Security
  • Questions and Review Before Exam

Related Scheduled Courses