George Weisgerber

George has decades of experience helping technology firms scale by optimizing business processes and workflows. He recently joined GALIDE as Head of Procurement, GALIDE's procurement team's focus is helping schools and enterprises recover the most value from their aged IT hardware.
KPA of the Month: Compliance Management

KPA of the Month: Compliance Management

KPA of the Month: Compliance ManagementWith: Steff Gilbert, IAITAM Staying on top of compliance issues is important in ITAM because it prevents the disruption of business practices and saves money by helping to avoid fines, fees, and penalties. In this session, we'll...

Showing the Value of the ITAM Program

Showing the Value of the ITAM Program

Showing the Value of the ITAM ProgramWith: Steff Gilbert, IAITAM ITAM is all about value! We acquire the asset with the highest value, and manage it so that it continues to be valuable throughout its lifecycle. Without this value, the organization would suffer. But...

Accurate and Timely Procurement Data is Critical to Success

Accurate and Timely Procurement Data is Critical to Success

Accurate and Timely Procurement Data is Critical to SuccessWith: Todd Hogan, Geonovi Development Getting accurate and timely procurement details into your ITAM system is challenging, frustrating, and costly. It is often so challenging that organizations rely on asset...

Retrieving Assets at EOL

Retrieving Assets at EOL

Retrieving Assets at EOLWith: Steff Gilbert, IAITAM Many organizations are having a rough time retrieving assets from the WFH environment. In this session, we’ll talk about policies to develop to get the commitment of employees, and steps you can take when the policy...

The Mainframe isn’t Dead, it is Modernizing for the Next-Gen

The Mainframe isn’t Dead, it is Modernizing for the Next-Gen

The Mainframe isn't Dead, it is Modernizing for the Next-GenWith: Alan Bain, ISAM Computing infrastructures have evolved from mainframe to server to cloud to managed services to hybrid. But in many cases, the constant has been mainframe even though it has been a...

Cybersecurity and the SAM Manager

Cybersecurity and the SAM Manager

Cybersecurity and the SAM ManagerWith: Sumin Tchen, Belarc Cybersecurity needs much of the same data that SAM uses as far as software and usage details. Given the right tools, SAM can make this automatically available to other groups within the organization, such as...

What to Look for in an ITAD Vendor

What to Look for in an ITAD Vendor

What to Look for in an ITAD VendorWith: Steff Gilbert, IAITAM Technology is evolving at rapid speed, asset lifecycles are shrinking, and environmental regulations are ever-changing. This makes ITAD even more complicated. In this session, we're going to explore several...

Reconnecting HAM & SAM

Reconnecting HAM & SAM

Reconnecting HAM & SAMWith: Steff Gilbert, IAITAM Are you currently experiencing a disconnect between HAM and SAM in your ITAM Program? In this session, we’re going to talk about the areas where HAM & SAM overlap and depend upon one another as well as some...

Uncovering True Visibility into your IT Environment

Uncovering True Visibility into your IT Environment

Uncovering True Visibility into your IT EnvironmentWith: Frank Venezia, Ernst & Young In the ever-evolving realm of IT, achieving comprehensive visibility within your organization’s environment is pivotal for efficient management, robust security, and optimal...

Asset ID & Tracking Methods

Asset ID & Tracking Methods

Asset ID & Tracking MethodsWith: Steff Gilbert, IAITAM Barcodes, RFID, IoT… which is right for your organization’s IT assets? In this session we’ll explore the pros and cons of each method and discuss how they’ve helped your organizations keep track of IT...