This course provides a structured approach to asset return auditing. Topics include return procedures, technical deprovisioning, verification protocols, and employee education. Participants will gain insights into reducing organizational risk and improving accountability through sound asset management practices.
5 Trainers
About
Course Overview:
This comprehensive course guides participants through the process of auditing supplier agreements with a focus on information security. It includes best practices in contract design, the role of legal teams, enforcement mechanisms, escalation protocols, and periodic review strategies to ensure continual compliance and risk mitigation.
What You'll Learn:
How to implement and audit asset return policies
Technical and procedural aspects of asset deprovisioning
Verification techniques and compliance considerations
How to build and evaluate training programs on asset handling
Documentation and legal requirements in asset returns
Languages Available: Spanish, English, German, French
Exam
Certificate upon completion of the course
Tags
Auditing of Control A 5.11
Asset Deprovisioning Processes
Asset Deprovisioning
Employee Training on Asset Return
About the Trainer
Driton Bejtullahu
Management Consultant and ISO Management System Expert
Driton Bejtullahu is an experienced consultant and trainer specializing in ISO standards and integrated management systems. With over 15 years of professional experience and more than a decade in training, he has played a key role in bridging technology and management to enhance business processes. As the founder of Be Consulted AL, he has been instrumental in helping organizations implement and maintain management systems across various industries. Driton is a certified Lead Auditor for ISO/IEC 27001 and Lead Implementer for ISO 9001, ISO 14001, ISO/IEC 20000-1, ISO 22301, ISO 37301, ISO/IEC 27701, ISO 55001, and ISO 31000, among others. His extensive training experience spans multiple ISO standards, demonstrating his expertise in governance, compliance, and information security.