How Good IT Asset and Risk Management Can Protect You From Ransomware

Resource GRC

IT complexity is rapidly increasing as organizations continually adopt new tools and technology. While IT assets are a necessity to increase productivity and performance, they can become hard to keep track of, resulting in IT security vulnerabilities for enterprises. 


Since COVID-19, the US FBI has reported a 300% increase in reported cybercrimes, and ransomware is the latest hot topic due to recent highly publicized attacks in the US. In this session, we’ll use the Colonial Pipeline as a case study, discussing what went wrong to understand how you can improve your IT asset and risk management practices to proactively protect your organization from ransomware. 

Key Takeaways:

  • Analyze ways to prevent IT asset management from becoming your ’Achilles heel’ 
  • Outline how to implement strong controls to track and manage IT assets throughout their lifecycle  
  • Discuss considerations for assurance over third party risk
  • Review how technology can help you mature your IT asset and risk management programs​​


The speaker Colin Henderson's profile image
Colin Henderson

VP, Security


Watch Video

Note: All fields marked with * are required

I’d like email updates on local privacy events and news, resources and products to stay connected with my community. Unsubscribe at any time.

I’d like a solution expert to provide product information or show me a custom demo of the OneTrust platform

How would you like us to contact you?

Privacy Notice

You can learn more about how we handle your personal data and your rights by reviewing our privacy notice.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You Might Also Be Interested In


The Ultimate Guide to CCPA Compliance eBook

Data Transfers

Transfer Impact Assessment (TIA) Checklist

WEBINAR | DEC 10, 2021
Privacy Management

The Privacy of Wearable Devices

WEBINAR | DEC 14, 2021
Cookie Consent

Cookies & Tech 2021 Round-Up: Italy, California, Global Privacy Control, Third-Party Cookies & More

WEBINAR | DEC 16, 2021
Consent and Preferences

Capture, Govern, Activate: How to Build a Powerful Marketing Data Strategy in 2022

Privacy Management

5 Steps to Automating FOIA Requests

NOVEMBER 19, 2021

5 Ways to Automate IT Risk Management

WEBINAR | DEC 14, 2021

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like

Onetrust All Rights Reserved