Private and Confidential | Executive ITAD Risk Advisory Roundtable
Most organizations believe the risk associated with retired IT assets ends when equipment leaves the loading dock.
In reality, that is often where the risk begins.
Despite decades of industry development, many enterprise IT asset disposition (ITAD) programs still operate with limited visibility into downstream processing, subcontractor handling, and the operational realities that occur beyond vendor documentation and certifications.
The Private Executive ITAD Risk Roundtable is a confidential leadership discussion designed for senior enterprise technology and risk leaders responsible for IT asset governance and lifecycle oversight. Participants examine how IT asset disposition actually functions downstream—where governance gaps, operational blind spots, and liability exposure often exist. This roundtable provides a rare opportunity for executives to review real-world case studies and engage in candid discussion with peers responsible for enterprise technology governance.
Our roundtable is conducted under a confidential executive discussion format to encourage open and candid dialogue.
Participation is intentionally limited to maintain a peer-level discussion among senior leaders responsible for enterprise technology governance and risk oversight.
Discussions are vendor-neutral, not recorded, and not publicly attributed.
Event Format
This private executive roundtable is conducted as a facilitated leadership discussion and includes examination of real-world case studies and operational scenarios related to enterprise IT asset disposition.
Discussion topics include:
• Common IT Asset Disposition Risk Exposures
• Chain-of-Custody and Asset Accountability Challenges
• Downstream Vendor Transparency and Oversight
• Data Destruction Verification and Reporting Practices
• Corporate Internal Policy and Executive Oversight
Participants will also review real-world case studies drawn from actual IT asset disposition incidents, including situations where organizations discovered gaps in asset accountability, vendor handling practices, and downstream processing visibility.
These case discussions are designed to help executive leaders better understand how governance, policy, and oversight function in real operational environments.
The roundtable format is intentionally structured to encourage peer discussion, shared perspective, and candid dialogue among senior leaders responsible for enterprise technology governance and risk management.
Participation is limited to maintain a confidential executive discussion environment.
Who Should Attend
This roundtable is designed for senior leaders responsible for enterprise technology governance, security oversight, and IT asset lifecycle risk management.
Typical participants include:
• Chief Information Officers (CIO)
• Chief Information Security Officers (CISO)
• Chief Risk Officers
• Vice Presidents of Technology or Infrastructure
• Directors responsible for Enterprise Security, IT Asset Management, or Technology Operations
Participation is limited to Vice President, Director, or equivalent leadership roles and above.
Attendees should have responsibility for enterprise technology governance, security oversight, or asset lifecycle policy within their organizations.
2026 Private Executive Roundtable Schedule
Private Executive ITAD Risk Roundtables are hosted periodically in downtown Chicago and are designed as small, confidential leadership discussions among senior enterprise technology and risk leaders.
Upcoming Session..
September 16th, 2026 Full Day
Downtown Chicago. Location and Date Tentative
Private Executive ITAD Risk Roundtable
8:00 AM – 2:30 PM
Participation is intentionally limited to approximately 12–15 executive leaders to encourage meaningful discussion, peer exchange, and candid dialogue regarding enterprise IT asset disposition governance and downstream risk exposure.
Participation is offered by invitation or application to maintain the confidential executive discussion environment.
Executive participation fee: $2,750 per participant
Organizations interested in attending or receiving additional details are encouraged to submit an inquiry through the contact form.
Additional event details and participation information will be provided upon request.
About the Speaker
The Founder of ITAD Risk Advisory Group brings over 40 years of experience in enterprise IT operations, corporate IT security, and IT asset disposition risk oversight. Throughout his career, he has worked directly with enterprise organizations to examine how IT assets are processed once they leave corporate control—where operational practices, vendor handling, and downstream processing can create unexpected governance and liability exposure.
Drawing from decades of real-world industry experience, this roundtable explores how IT asset disposition actually functions beyond vendor documentation, certifications, and standard reporting practices.
Why Attend
Participants will have the opportunity to:
• Examine where IT asset disposition risk often originates within enterprise environments
• Understand downstream vendor transparency and accountability challenges
• Discuss governance and policy considerations used by leading organizations
• Exchange perspective with other technology, security, and risk leaders responsible for enterprise oversight
Participation
Participation is limited to approximately 12–15 executive leaders to maintain a confidential roundtable discussion environment.
Request Participation
Organizations interested in attending or receiving additional information are encouraged to submit an inquiry through the inquire form.
Roundtable Agenda
8:00 – 8:30 AM
Executive Registration & Breakfast
Participants arrive for registration and informal networking with peers responsible for enterprise technology governance, security, and asset lifecycle oversight.
-Light breakfast served.
8:30 – 9:00 AM
Opening Perspective: The Hidden Reality of IT Asset Disposition
Discussion of how enterprise organizations typically structure IT asset disposition programs—and where operational risk often begins once equipment leaves corporate control.
Topics include:
• Where governance visibility often ends
• The limits of vendor certifications and documentation
• Why many organizations lack insight into downstream processing
9:00 – 10:15 AM
Case Study Discussion: The Disappearing Data Center
A real-world enterprise IT asset disposition project where multiple layers of vendor handling created significant gaps in asset accountability.
Discussion topics include:
• downstream subcontractor exposure
• chain-of-custody visibility challenges
• documentation versus operational reality
Participants explore how governance breaks down when multiple parties handle retired enterprise equipment.
10:15 – 10:30 AM
Executive Break
10:30 – 11:45 AM
Case Study Discussion: Immature ITAD Still Exists
A Fortune 100 organization discovers hundreds of retired IT assets abandoned in a rural warehouse years after disposal.
Discussion topics include:
• vendor accountability failures
• environmental liability exposure
• reputational risk from improperly handled IT assets
• why outdated disposal practices still exist today
Group discussion focuses on how organizations maintain defensible oversight of ITAD vendors.
11:45 – 12:30 PM
Executive Lunch Discussion
Moderated discussion among participants examining common governance challenges including:
• global ITAD vendor management
• internal policy design
• executive oversight responsibilities
• operational concerns organizations face today
-Lunch provided.
12:30 – 1:45 PM
Case Study Discussion: Certificates and the Illusion of Mitigation
Examination of the gap between documented data destruction processes and the operational realities of downstream handling.
Topics explored include:
• reliance on certificates of destruction
• audit visibility versus operational reality
• where organizations assume risk has ended
Participants discuss how executive leadership maintains confidence in vendor claims and reporting.
1:45 – 2:15 PM
Executive Discussion: Critical Questions Organizations Should Ask Their ITAD Vendors
Interactive discussion examining key governance questions related to:
• chain-of-custody accountability
• subcontractor involvement
• downstream processing visibility
• reporting and liability exposure
2:15 – 2:30 PM
Closing Discussion: Where Executive Oversight Makes the Difference
Summary discussion on how organizations strengthen governance over IT asset disposition and vendor oversight.
Participants leave with a clearer understanding of where risk actually emerges and where executive leadership can maintain meaningful visibility and control.
2026 Private Executive ITAD Risk Advisory Roundtable
Next Scheduled: Private Executive Roundtable Date : September 16, 2026
Private Executive
ITAD Advisory Roundtable
“Independent ITAD Guidance for Confidential Executive Discussions.”
Limited Seating ( 12-15 Attendees )