Corporate and client data is proliferated globally for multi-national companies. Learn how to perform data destruction abroad while considering regulatory and operational differences. Learn how to protect against new threat vectors that are challenging the global enterprise. Through case studies, learn how some companies have have protected there data abroad.
The term “resilience” is everywhere, but what does it mean to you and your organization. During this presentation, we will define what Cyber Resilience means and how it differs from Business Continuity/Disaster Recovery. We will also discuss some of the findings of the 2023 Absolute Resilience Index Report, to identify some of the challenges you may have in achieving Cyber Resilience for your organization and how you can integrate Cyber Resilience into your internal processes.
What do successful sports teams all have in common? A playbook. A list of (offense and defense) plays that each individual member of the team can learn, understand and execute to win. This session will show you how to make the most of your time with IAITAM to move your career forward!
A flawed IT Asset Disposition process isn’t just a slip-up; it’s a direct threat to your career. Join this webinar as we cover the top five critical indicators of risk in your ITAD process, offering best-in-class practices from national and global organizations like P&G, GSK, OhioHealth, and Visa to fortify your approach. If you’re connected to your organization’s ITAD efforts, don’t miss our expert insights on how to safeguard your position and ensure your ITAD practices are bulletproof.
Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies and best practices when implementing a BYOD program.
Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.