Forum Replies Created
-
AuthorPosts
-
January 12, 2025 at 5:47 pm in reply to: What do you think is the most important policy for an ITAM program? #66823Laura HudaniParticipant
Lifecycle Management is the most important policy.
January 12, 2025 at 5:44 pm in reply to: Policies must be enforced. What consequences will there be if they are not followed? #66822Laura HudaniParticipantConsequences will have to be reviewed on a case by case basis. Examples of some consequences based on severity of the infraction would be education intervention, escalation and formal warnings, restricted access or privilege’s, financial penalties, formal disciplinary actions, finally legal/contractual actions.
January 12, 2025 at 5:40 pm in reply to: Consider a process in your organization and brainstorm how to simplify it. #66821Laura HudaniParticipantCurrent Process:
Request Submission:
Employee or manager submits an asset request via email or ticketing system.
Approval Workflow:
The request goes through multiple layers of approval (e.g., manager, finance, IT).
Procurement:
The procurement team sources the asset from vendors, often waiting for quotes or approvals.
Configuration and Setup:
IT receives the asset, configures it with required software, and ensures compliance.
Deployment:
The asset is delivered to the employee, often with limited tracking of assignment.Simplified Process:
1. Centralized Self-Service Portal
2. Automated Approval Workflow
3. Vendor Integration
4. Standardized Configurations
5. Tracking and Asset Assignment
6. Streamlined DeliveryJanuary 12, 2025 at 5:37 pm in reply to: In what ways will your office culture affect how you communicate? #66820Laura HudaniParticipantwe are a hybrid organization and one in a consortium. So communication will be a primary focus for rolling things out properly.
January 12, 2025 at 5:36 pm in reply to: What’s the first policy you’ll create and enforce in your ITAM program? #66819Laura HudaniParticipantI’m going to create a governance policy first followed by a SAM policy.
January 12, 2025 at 5:01 pm in reply to: Critique the roles and responsibilities, what other key stakeholder might be present in your organization? #66818Laura HudaniParticipantITAM Manager
Responsibility: Oversee the ITAM program, including policy creation, lifecycle management, and compliance.
Critique: This role is often stretched thin.Procurement Team
Responsibility: Handle vendor negotiations, purchase approvals, and contract management.
Critique: Procurement may lack technical knowledge of software licensing models or cloud agreements, leading to suboptimal decisions.Finance Team
Responsibility: Budgeting, cost analysis, and ensuring ROI for IT assets.
Critique: Finance often focuses on cost reduction but may not understand the strategic importance of ITAM in driving long-term savings.IT Department
Responsibility: Implement and manage ITAM tools, provide technical support, and integrate ITAM with broader IT processes.
Critique: IT may view ITAM as secondary to operational priorities, leading to delays in implementation or data integration.HR
Responsibility: Facilitate onboarding and offboarding processes, including asset assignment and recovery.
Critique: HR may not always coordinate effectively with ITAM, leading to gaps in tracking assigned devices or reclaiming them during employee transitions.Executive Sponsor
Responsibility: Champion ITAM at the strategic level, secure resources, and ensure alignment with organizational goals.
Critique: The executive sponsor may not always be actively engaged, leaving ITAM without necessary advocacy or resources.Key Stakeholders That Might Be Missing
Cybersecurity Team
Role: Ensures IT assets meet security standards, particularly in managing shadow IT or mobile devices.
Why Important: Cybersecurity integration can help identify risks associated with unmanaged devices and ensure compliance with data protection regulations.Data Analysts/BI Specialists
Role: Analyze ITAM data for insights into asset utilization, cost savings, and performance.
Why Important: Dedicated analysts can uncover trends and opportunities that might go unnoticed, driving continuous improvement.January 12, 2025 at 4:58 pm in reply to: Consider the executives you’ll have to convince. What negotiation skills will you have to use? #66817Laura HudaniParticipantI don’t foresee having to negotiate much. It’s pretty clear what needs done. I’m aligned with my executive on this.
January 12, 2025 at 4:56 pm in reply to: What roles and responsibilities do you have or anticipate you’ll have in your ITAM program? #66816Laura HudaniParticipantWe will have all the roles. The only one we don’t have is legal but we have an external agency that we can use if needed.
Laura HudaniParticipantIS Map
Description: The current state of the ITAM workflow, showing how software licenses are managed today.Procurement:
Individual departments often purchase software independently.
Limited oversight from central ITAM or Procurement teams.
Software is occasionally purchased without considering compliance or cost efficiency.Asset Tracking:
A mix of spreadsheets and outdated tools is used to track licenses.
Data is incomplete and inconsistently updated.
Shadow IT purchases are not included in tracking.Compliance:
Compliance checks are reactive, typically occurring during audits.
High risk of non-compliance due to poor visibility into usage and licensing.Disposal:
Minimal efforts to track end-of-life for software.SHOULD Map
Description: The ideal state of the ITAM workflow, showing how software licenses should be managed.Procurement:
All software acquisitions go through a centralized procurement process.
ITAM teams review and approve all purchases based on compliance and budget considerations.
Standardized software options are provided to streamline decision-making.
Asset Tracking:A centralized ITAM system with automated discovery tools tracks all licenses in real time.
Shadow IT purchases are minimized through employee education and stricter policies.
License data is accurate, comprehensive, and easily accessible.
Compliance:Regular compliance audits are proactively conducted.
Automated tools flag non-compliance risks and optimize usage.
Licenses are monitored to avoid over-purchasing or under-utilization.
Disposal:Expired or unused licenses are systematically reclaimed and reallocated.
Clear processes are in place for decommissioning and retiring software.Laura HudaniParticipantIS Map
Description: The current state of the ITAM workflow, showing how software licenses are managed today.Procurement:
Individual departments often purchase software independently.
Limited oversight from central ITAM or Procurement teams.
Software is occasionally purchased without considering compliance or cost efficiency.Asset Tracking:
A mix of spreadsheets and outdated tools is used to track licenses.
Data is incomplete and inconsistently updated.
Shadow IT purchases are not included in tracking.Compliance:
Compliance checks are reactive, typically occurring during audits.
High risk of non-compliance due to poor visibility into usage and licensing.Disposal:
Minimal efforts to track end-of-life for software.January 12, 2025 at 4:49 pm in reply to: What non-verbals are you using right now as you read these discussion questions? #66813Laura HudaniParticipantAgain facial exprressions, cocentrating on at i’m reading. Body language, i’m sitting up right at my desk leaning forward engaged in what I’m doing.
January 12, 2025 at 4:07 pm in reply to: Perform a SWOT analysis on yourself. What are your strengths, weaknesses, etc.? #66810Laura HudaniParticipantStrengths: high pattern recognition and love of processes. Experience in contract management and procurement.
Weakness: never led an ITAM program before.
Opportunity: Certifications and education [hence why I’m in this course]
Thread: time and moneyJanuary 12, 2025 at 4:05 pm in reply to: Create a SWOT analysis of your current or anticipated ITAM program. #66809Laura HudaniParticipantStrengths: Strong organizational support and compliance-driven environment. Integration of ITAM with contract management expertise. Access to initial training (e.g., CAMP, CSAM certifications). Existing tools and systems for asset tracking. Dedicated leadership to drive ITAM implementation.
Weaknesses: Immature SAM processes and limited cross-team training. Fragmented or incomplete asset data. Reactive processes rather than proactive optimization.
Opportunities: Cost optimization through better asset utilization and licensing. Adoption of cloud-based ITAM tools and emerging technologies.
Enhanced vendor collaboration for better terms and training.Threats: Regulatory penalties for non-compliance or audit failures. Technological complexity with SaaS and cloud models. Risks from shadow IT and unapproved asset procurement. Vendor lock-in limiting flexibility and increasing costs. Data security threats from poorly tracked IT assets.
January 12, 2025 at 4:00 pm in reply to: Describe a time when there was a miscommunication and explain how you handled it. #66808Laura HudaniParticipantMiscommunications happens. But when they do the first thing I do is figure out what needs to be done first to mitigate the situation. Once we have things controlled I would go back and review the chain of events to determine where the miscommunication occured and what we can do to avoid it recurring.
Laura HudaniParticipantAlign – Ensuring that the outcomes of the communication process are actionable, understood, and consistent with policies or strategies.
-
AuthorPosts