Nikki Evans
ServiceNow
IAITAM Provider Member ServiceNow (NYSE: NOW) makes the world work better for everyone. Our cloud based platform and solutions help digitize and unify organizations so that they can find smarter, faster, better ways to make work flow. So employees and customers can be...
Legislative, Regulatory and Contractual Requirements that Effect IT Asset Professionals
In a world filled with Cybersecurity laws, regulations, and contractual requirements, it is easy to feel overwhelmed.
Legislative, Regulatory and Contractual Requirements that Effect IT Asset Professionals
In a world filled with Cybersecurity laws, regulations, and contractual requirements, it is easy to feel overwhelmed.
Legislative, Regulatory and Contractual Requirements that Effect IT Asset Professionals
In a world filled with Cybersecurity laws, regulations, and contractual requirements, it is easy to feel overwhelmed.
Mastering Cloud Cost Management
Discover the keys to optimizing your cloud costs and achieving financial success
Safeguarding your Data through Proactive Vendor Management
Data protection is a topic on everyone’s minds, but far too often the considerations for data protection stop in-house.
Projections for 2024
With global economy challenges, rises in the use of AI, mergers and acquisitions, and continued cyber attacks, what does 2024 look like for your ITAM Program?
Placing ITAM at the Center of your Organization
Placing ITAM at the Center of your OrganizationWith: Steff Gilbert, IAITAM Getting the buy-in ITAM needs in a siloed organization can seem like an impossible task! It’s difficult to find all of the value you can for your organization when other departments don’t...
Knowing What You Have: Inventory Management Best Practices
Software, Hardware, and Cloud. Oh My! How does your organization ensure successful inventory management of your IT assets? Let’s talk about what to manage, how to manage it, and the tools and tips that will help you succeed.
Managing Security Risks with Documented ITAM
You can’t secure what you don’t know you have! A documented process from procurement through disposal is a critical partner to Managing Risks related to Data Security.