Forum Replies Created
-
AuthorPosts
-
January 23, 2025 at 1:20 am in reply to: Does your organization already have a document library already and, if not, where will you store documents? #67994
Laura Hudani
ParticipantYes we do.
January 23, 2025 at 1:19 am in reply to: Name legislations you’re familiar with that likely will affect your ITAM program. #67993Laura Hudani
ParticipantPIPA, CASL, EMA, PIPEDA
January 23, 2025 at 1:14 am in reply to: What educational events will you attend to improve your ITAM skills? #67992Laura Hudani
ParticipantI’ll attend Webinars and I’ll do more certifications through IAITAM.
January 23, 2025 at 1:12 am in reply to: Discuss whether communication or education is more important. #67991Laura Hudani
ParticipantYou can’t really have one without the other. You can but it’s not going to be as effective. You need communication to create awareness and get buy in. But without education you aren’t going to be able to build expertise and ensure compliance. You have to do both. It would depend on what your program needed at that time.
Laura Hudani
ParticipantPersonally, I need to focus on the Compliance Management KPA first. We have a program and policies to accompany it.
January 12, 2025 at 5:47 pm in reply to: What do you think is the most important policy for an ITAM program? #66823Laura Hudani
ParticipantLifecycle Management is the most important policy.
January 12, 2025 at 5:44 pm in reply to: Policies must be enforced. What consequences will there be if they are not followed? #66822Laura Hudani
ParticipantConsequences will have to be reviewed on a case by case basis. Examples of some consequences based on severity of the infraction would be education intervention, escalation and formal warnings, restricted access or privilege’s, financial penalties, formal disciplinary actions, finally legal/contractual actions.
January 12, 2025 at 5:40 pm in reply to: Consider a process in your organization and brainstorm how to simplify it. #66821Laura Hudani
ParticipantCurrent Process:
Request Submission:
Employee or manager submits an asset request via email or ticketing system.
Approval Workflow:
The request goes through multiple layers of approval (e.g., manager, finance, IT).
Procurement:
The procurement team sources the asset from vendors, often waiting for quotes or approvals.
Configuration and Setup:
IT receives the asset, configures it with required software, and ensures compliance.
Deployment:
The asset is delivered to the employee, often with limited tracking of assignment.Simplified Process:
1. Centralized Self-Service Portal
2. Automated Approval Workflow
3. Vendor Integration
4. Standardized Configurations
5. Tracking and Asset Assignment
6. Streamlined DeliveryJanuary 12, 2025 at 5:37 pm in reply to: In what ways will your office culture affect how you communicate? #66820Laura Hudani
Participantwe are a hybrid organization and one in a consortium. So communication will be a primary focus for rolling things out properly.
January 12, 2025 at 5:36 pm in reply to: What’s the first policy you’ll create and enforce in your ITAM program? #66819Laura Hudani
ParticipantI’m going to create a governance policy first followed by a SAM policy.
January 12, 2025 at 5:01 pm in reply to: Critique the roles and responsibilities, what other key stakeholder might be present in your organization? #66818Laura Hudani
ParticipantITAM Manager
Responsibility: Oversee the ITAM program, including policy creation, lifecycle management, and compliance.
Critique: This role is often stretched thin.Procurement Team
Responsibility: Handle vendor negotiations, purchase approvals, and contract management.
Critique: Procurement may lack technical knowledge of software licensing models or cloud agreements, leading to suboptimal decisions.Finance Team
Responsibility: Budgeting, cost analysis, and ensuring ROI for IT assets.
Critique: Finance often focuses on cost reduction but may not understand the strategic importance of ITAM in driving long-term savings.IT Department
Responsibility: Implement and manage ITAM tools, provide technical support, and integrate ITAM with broader IT processes.
Critique: IT may view ITAM as secondary to operational priorities, leading to delays in implementation or data integration.HR
Responsibility: Facilitate onboarding and offboarding processes, including asset assignment and recovery.
Critique: HR may not always coordinate effectively with ITAM, leading to gaps in tracking assigned devices or reclaiming them during employee transitions.Executive Sponsor
Responsibility: Champion ITAM at the strategic level, secure resources, and ensure alignment with organizational goals.
Critique: The executive sponsor may not always be actively engaged, leaving ITAM without necessary advocacy or resources.Key Stakeholders That Might Be Missing
Cybersecurity Team
Role: Ensures IT assets meet security standards, particularly in managing shadow IT or mobile devices.
Why Important: Cybersecurity integration can help identify risks associated with unmanaged devices and ensure compliance with data protection regulations.Data Analysts/BI Specialists
Role: Analyze ITAM data for insights into asset utilization, cost savings, and performance.
Why Important: Dedicated analysts can uncover trends and opportunities that might go unnoticed, driving continuous improvement.January 12, 2025 at 4:58 pm in reply to: Consider the executives you’ll have to convince. What negotiation skills will you have to use? #66817Laura Hudani
ParticipantI don’t foresee having to negotiate much. It’s pretty clear what needs done. I’m aligned with my executive on this.
January 12, 2025 at 4:56 pm in reply to: What roles and responsibilities do you have or anticipate you’ll have in your ITAM program? #66816Laura Hudani
ParticipantWe will have all the roles. The only one we don’t have is legal but we have an external agency that we can use if needed.
Laura Hudani
ParticipantIS Map
Description: The current state of the ITAM workflow, showing how software licenses are managed today.Procurement:
Individual departments often purchase software independently.
Limited oversight from central ITAM or Procurement teams.
Software is occasionally purchased without considering compliance or cost efficiency.Asset Tracking:
A mix of spreadsheets and outdated tools is used to track licenses.
Data is incomplete and inconsistently updated.
Shadow IT purchases are not included in tracking.Compliance:
Compliance checks are reactive, typically occurring during audits.
High risk of non-compliance due to poor visibility into usage and licensing.Disposal:
Minimal efforts to track end-of-life for software.SHOULD Map
Description: The ideal state of the ITAM workflow, showing how software licenses should be managed.Procurement:
All software acquisitions go through a centralized procurement process.
ITAM teams review and approve all purchases based on compliance and budget considerations.
Standardized software options are provided to streamline decision-making.
Asset Tracking:A centralized ITAM system with automated discovery tools tracks all licenses in real time.
Shadow IT purchases are minimized through employee education and stricter policies.
License data is accurate, comprehensive, and easily accessible.
Compliance:Regular compliance audits are proactively conducted.
Automated tools flag non-compliance risks and optimize usage.
Licenses are monitored to avoid over-purchasing or under-utilization.
Disposal:Expired or unused licenses are systematically reclaimed and reallocated.
Clear processes are in place for decommissioning and retiring software.Laura Hudani
ParticipantIS Map
Description: The current state of the ITAM workflow, showing how software licenses are managed today.Procurement:
Individual departments often purchase software independently.
Limited oversight from central ITAM or Procurement teams.
Software is occasionally purchased without considering compliance or cost efficiency.Asset Tracking:
A mix of spreadsheets and outdated tools is used to track licenses.
Data is incomplete and inconsistently updated.
Shadow IT purchases are not included in tracking.Compliance:
Compliance checks are reactive, typically occurring during audits.
High risk of non-compliance due to poor visibility into usage and licensing.Disposal:
Minimal efforts to track end-of-life for software. -
AuthorPosts