Forum Replies Created

Viewing 15 posts - 1 through 15 (of 41 total)
  • Author
    Posts
  • Laura Hudani
    Participant

    Lifecycle Management is the most important policy.

    Laura Hudani
    Participant

    Consequences will have to be reviewed on a case by case basis. Examples of some consequences based on severity of the infraction would be education intervention, escalation and formal warnings, restricted access or privilege’s, financial penalties, formal disciplinary actions, finally legal/contractual actions.

    Laura Hudani
    Participant

    Current Process:
    Request Submission:
    Employee or manager submits an asset request via email or ticketing system.
    Approval Workflow:
    The request goes through multiple layers of approval (e.g., manager, finance, IT).
    Procurement:
    The procurement team sources the asset from vendors, often waiting for quotes or approvals.
    Configuration and Setup:
    IT receives the asset, configures it with required software, and ensures compliance.
    Deployment:
    The asset is delivered to the employee, often with limited tracking of assignment.

    Simplified Process:
    1. Centralized Self-Service Portal
    2. Automated Approval Workflow
    3. Vendor Integration
    4. Standardized Configurations
    5. Tracking and Asset Assignment
    6. Streamlined Delivery

    Laura Hudani
    Participant

    we are a hybrid organization and one in a consortium. So communication will be a primary focus for rolling things out properly.

    Laura Hudani
    Participant

    I’m going to create a governance policy first followed by a SAM policy.

    Laura Hudani
    Participant

    ITAM Manager
    Responsibility: Oversee the ITAM program, including policy creation, lifecycle management, and compliance.
    Critique: This role is often stretched thin.

    Procurement Team
    Responsibility: Handle vendor negotiations, purchase approvals, and contract management.
    Critique: Procurement may lack technical knowledge of software licensing models or cloud agreements, leading to suboptimal decisions.

    Finance Team
    Responsibility: Budgeting, cost analysis, and ensuring ROI for IT assets.
    Critique: Finance often focuses on cost reduction but may not understand the strategic importance of ITAM in driving long-term savings.

    IT Department
    Responsibility: Implement and manage ITAM tools, provide technical support, and integrate ITAM with broader IT processes.
    Critique: IT may view ITAM as secondary to operational priorities, leading to delays in implementation or data integration.

    HR
    Responsibility: Facilitate onboarding and offboarding processes, including asset assignment and recovery.
    Critique: HR may not always coordinate effectively with ITAM, leading to gaps in tracking assigned devices or reclaiming them during employee transitions.

    Executive Sponsor
    Responsibility: Champion ITAM at the strategic level, secure resources, and ensure alignment with organizational goals.
    Critique: The executive sponsor may not always be actively engaged, leaving ITAM without necessary advocacy or resources.

    Key Stakeholders That Might Be Missing
    Cybersecurity Team
    Role: Ensures IT assets meet security standards, particularly in managing shadow IT or mobile devices.
    Why Important: Cybersecurity integration can help identify risks associated with unmanaged devices and ensure compliance with data protection regulations.

    Data Analysts/BI Specialists
    Role: Analyze ITAM data for insights into asset utilization, cost savings, and performance.
    Why Important: Dedicated analysts can uncover trends and opportunities that might go unnoticed, driving continuous improvement.

    Laura Hudani
    Participant

    I don’t foresee having to negotiate much. It’s pretty clear what needs done. I’m aligned with my executive on this.

    Laura Hudani
    Participant

    We will have all the roles. The only one we don’t have is legal but we have an external agency that we can use if needed.

    in reply to: Create and compare an “Is Map” vs. a “Should Map.” #66815
    Laura Hudani
    Participant

    IS Map
    Description: The current state of the ITAM workflow, showing how software licenses are managed today.

    Procurement:
    Individual departments often purchase software independently.
    Limited oversight from central ITAM or Procurement teams.
    Software is occasionally purchased without considering compliance or cost efficiency.

    Asset Tracking:
    A mix of spreadsheets and outdated tools is used to track licenses.
    Data is incomplete and inconsistently updated.
    Shadow IT purchases are not included in tracking.

    Compliance:
    Compliance checks are reactive, typically occurring during audits.
    High risk of non-compliance due to poor visibility into usage and licensing.

    Disposal:
    Minimal efforts to track end-of-life for software.

    SHOULD Map
    Description: The ideal state of the ITAM workflow, showing how software licenses should be managed.

    Procurement:

    All software acquisitions go through a centralized procurement process.
    ITAM teams review and approve all purchases based on compliance and budget considerations.
    Standardized software options are provided to streamline decision-making.
    Asset Tracking:

    A centralized ITAM system with automated discovery tools tracks all licenses in real time.
    Shadow IT purchases are minimized through employee education and stricter policies.
    License data is accurate, comprehensive, and easily accessible.
    Compliance:

    Regular compliance audits are proactively conducted.
    Automated tools flag non-compliance risks and optimize usage.
    Licenses are monitored to avoid over-purchasing or under-utilization.
    Disposal:

    Expired or unused licenses are systematically reclaimed and reallocated.
    Clear processes are in place for decommissioning and retiring software.

    in reply to: Create and compare an “Is Map” vs. a “Should Map.” #66814
    Laura Hudani
    Participant

    IS Map
    Description: The current state of the ITAM workflow, showing how software licenses are managed today.

    Procurement:
    Individual departments often purchase software independently.
    Limited oversight from central ITAM or Procurement teams.
    Software is occasionally purchased without considering compliance or cost efficiency.

    Asset Tracking:
    A mix of spreadsheets and outdated tools is used to track licenses.
    Data is incomplete and inconsistently updated.
    Shadow IT purchases are not included in tracking.

    Compliance:
    Compliance checks are reactive, typically occurring during audits.
    High risk of non-compliance due to poor visibility into usage and licensing.

    Disposal:
    Minimal efforts to track end-of-life for software.

    Laura Hudani
    Participant

    Again facial exprressions, cocentrating on at i’m reading. Body language, i’m sitting up right at my desk leaning forward engaged in what I’m doing.

    Laura Hudani
    Participant

    Strengths: high pattern recognition and love of processes. Experience in contract management and procurement.
    Weakness: never led an ITAM program before.
    Opportunity: Certifications and education [hence why I’m in this course]
    Thread: time and money

    Laura Hudani
    Participant

    Strengths: Strong organizational support and compliance-driven environment. Integration of ITAM with contract management expertise. Access to initial training (e.g., CAMP, CSAM certifications). Existing tools and systems for asset tracking. Dedicated leadership to drive ITAM implementation.

    Weaknesses: Immature SAM processes and limited cross-team training. Fragmented or incomplete asset data. Reactive processes rather than proactive optimization.

    Opportunities: Cost optimization through better asset utilization and licensing. Adoption of cloud-based ITAM tools and emerging technologies.
    Enhanced vendor collaboration for better terms and training.

    Threats: Regulatory penalties for non-compliance or audit failures. Technological complexity with SaaS and cloud models. Risks from shadow IT and unapproved asset procurement. Vendor lock-in limiting flexibility and increasing costs. Data security threats from poorly tracked IT assets.

    Laura Hudani
    Participant

    Miscommunications happens. But when they do the first thing I do is figure out what needs to be done first to mitigate the situation. Once we have things controlled I would go back and review the chain of events to determine where the miscommunication occured and what we can do to avoid it recurring.

    in reply to: Add another step to the SPUR communication model. #66807
    Laura Hudani
    Participant

    Align – Ensuring that the outcomes of the communication process are actionable, understood, and consistent with policies or strategies.

Viewing 15 posts - 1 through 15 (of 41 total)