Jeff Seibert
Implementing IAITAM’s 12 KPAs
Is your organization mired in uncertainty, lack of cooperation and understanding or are you driving cost and risks out of your distributed computing model and creating value for your end-users and business? Data security in a circular economy and sustainability initiatives can only be achieved by “starting with the end in mind”. Find out how you and your organization fare in terms of relative organizational maturity through the implementation of IAITAM’s 12 Key Process Areas (KPAs). No one said ITAM was easy and that driving change is without organizational challenges. Let’s discuss the complexities of driving digital transformation in your unique organizational culture in anticipation of such disruptive technologies as AI, IoT, ML, etc. through the deployment of IAITAM’s 12 KPAs. By participating in this month’s IMUG, you’ll learn if your organization will earn gold, silver, or bronze in this Olympic style survey and/or what it will take for you to make it to the 2028 IAITAM Olympics!
The Inter-Dependency of ITAM & Data Management
This article underscores the importance of lifecycle management policies, processes, and compliance in ensuring data security and enabling digital transformation. Proper IT asset lifecycle management reduces IT operation costs and enhances data security, thereby optimizing technology investments and supporting competitive advantage.
Seven Reasons Why SAM Tool Implementations Fail
SAM Tools are designed to help organizations optimize their software usage and compliance. The tool vendors claim they can save you millions. However, sometimes SAM tools fail to deliver the expected benefits. How can you save your multi-million dollar SAM Tool investment from going bust? What can you learn from other failed implementations? In this presentation, learn the seven most common reasons SAM tools fail and how to avoid these pitfalls.
Myths and Realities of IT Financial Optimization
In the realm of Information Technology (IT), financial optimization is a constant challenge. However, many myths and realities need to be demystified.
Mastering Remote Offboarding: Best Practices for IT Asset Managers
Learn the most efficient, accountable ways to recover assets from remote workers during offboarding. Success is more complicated than you think.
SIE Consulting Group
IAITAM Provider Member SIE Consulting Group brings a unique mix of public sector experience and private sector insights to every client situation. Our team has successfully delivered hundreds of consulting engagements for nearly every industry group. Our strategic...
Understanding Oracle Enterprise Agreements
Oracle’s Enterprise Agreements can be a blessing or a curse, depending on your management of these complex licensing vehicles. In this session, you will learn different types of Oracle enterprise agreements, such as ULAs and ELAs, and what are the benefits and risks, examples, and strategies for managing your enterprise agreements with Oracle. This session is good for anyone who has an enterprise agreement with Oracle or may be considering one in the future.
ITAD Superpowers: 5 Steps to Becoming an ITAD Hero!
Feeling the crunch of escalating ITAD responsibilities amidst shrinking teams and soaring compliance demands? If so, you’re the unsung hero your organization needs. Join us as we share best practices from industry giants like P&G, GSK, OhioHealth, and Visa on strategies to manage data security, chain of custody, and asset disposition with finesse. We’ll provide you with three key insights to help turn your ITAD challenges into victories, proving once again, you are the champion, my friend.