Contact Us Today! 330.628.3012|info@iaitam.org

ITAM Best Practices as the Foundation of a Successful Cybersecurity Program

ITAM Best Practices as the Foundation of a Successful Cybersecurity Program By Jose Carrillo Implementing a cybersecurity program is essential for any organization. With the increasing number of data breaches, new methods of attacks, and even the use of AI and improved phishing techniques, it is imperative for organizations to create a

By |2021-07-12T14:15:13-04:00April 10th, 2020|ITAK, Policy Management|0 Comments

Building a SAM program: Update existing or “rip & replace”?

Building a SAM program: Update existing or "rip & replace"? By Frank Venezia “Update, or, rip and replace?” We have all heard this phrase. In fact, it is likely that most adults have said this phrase at some point in their life. The phrase is commonly used when discussing or thinking about

By |2021-07-12T14:15:13-04:00April 17th, 2019|ITAK, Policy Management|0 Comments

The Role of Policy in the ITAM Maturity Process

The Role of Policy in the ITAM Maturity Process By Rodney Penny No one can dispute that IT assets and the information that they process, store and transmit present a huge risk to organizations. Every organization has the responsibility to protect their data from hackers and phishers, and that means that it

By |2021-07-12T14:15:13-04:00May 3rd, 2018|ITAK, Policy Management|0 Comments

The Importance of BYOD Policies – Lessons from Capitol Hill

The Importance of BYOD Policies - Lessons from Capitol Hill By IAITAM BYOD is a commonly understood abbreviation for a business practice known by most organizations around the world. Even in an organization where the practice has not been implemented, BYOD costs and benefits have been compared to determine if the practice

By |2021-07-12T14:15:14-04:00March 15th, 2015|ITAK, Policy Management|0 Comments

Policy Creation: Understanding the Why

Policy Creation: Understanding the Why By IAITAM Policies have a widespread impact on an organization, documenting the rules for employees and reflecting the culture of the organization. Functional areas have a responsibility to incorporate policy language into execution of the responsibilities within their departments. Management in each of these areas is also

By |2021-07-12T14:15:14-04:00May 26th, 2014|ITAK, Policy Management|0 Comments

What Happens When IT No Longer Governs ITAM?

What Happens When IT No Longer Governs ITAM? - Policy Management By IAITAM Policies are a critical success factor for the IT Asset Management program, providing controls to behavior, influence during periods of change and support for asset education and enforcement. To achieve these results, policies must be clearly defined, understandable, and

By |2021-07-12T14:15:14-04:00July 19th, 2013|ITAK, Policy Management|0 Comments

Policies for Pad Computing Mobility – Going Mobile? – First Get a Roadmap

Policies for Pad Computing Mobility - Going Mobile? - First Get a Roadmap By Ed Cartier, xAssets Ltd. Anyone who really believes that pad-computers (hereafter “pads” to save some ink and paper) won’t invade just about everyone’s IT infrastructure in the next year or so is woefully naïve. Strong words? Not really.

By |2021-07-12T14:15:15-04:00March 17th, 2011|ITAK, Policy Management|0 Comments

Review Your Policies – QSP: Defining the Policy Review Process

Review Your Policies - QSP: Defining the Policy Review Process By Dr. Barbara Rembiesa Your organization probably has more policies in place than one could count. These policies can range from organizational activities and procedures to behavioral requirements while at work. These policies are important to daily function, but sometimes overlap occurs

By |2021-07-12T14:15:15-04:00July 25th, 2009|ITAK, Policy Management|0 Comments

Go to Top