The SEC enacted cybersecurity rules and deemed ITAD a risk. Companies can no longer kick the can down the road.
The conventional ITAM-ITAD paradigm is based on trust; the fox watches the hen house.
The conventional ITAM-ITAD paradigm is rigged to skirt disclosure provisions. ITAM and ITAD vendors have each other's backs.
Instead of being investigated, missing assets are regarded as retired. Lost assets are assigned to ITAD vendors. Allocating transfers the burden of inventory reconciliation to the vendor, who has no incentive to report issues.
Problems with conventional ITAM-ITAD are beyond the control of any individual.
It can be tempting for management to ignore the problems.
It can be tempting to sweep problems under the rug.
It can be tempting to take the canary out of the coal mine so you are not alerted to problems.
Transforming the conventional ITAM-ITAD can seem like a challenging task.
The SEC holds management accountable for being aware of incidents. Plausible deniability is not a justifiable excuse. Blaming others won't solve the problem.
Addressing the conflicts of interest inherent in ITAM-ITAD can be awkward and risky. Anyone can submit a whistleblower tip to the SEC.
Problems begin in ITAM, but effective ITAM is needed to help solve them.
Effective ITAM is essential to preventing problems. Assets must be tracked from acquisition through disposition.
Effective ITAM requires adequate resources and executive support.
Transforming ITAM-ITAD requires embracing change and engaging specialists.
Effective ITAM will provide the protection necessary to mitigate cybersecurity risk and guarantee compliance