Sunil Chandna

Sunil Chandna, CEO of Stellar Data Recovery Inc, has over 30 years of corporate experience, leading the company's growth since 1993. His overall leadership, strategy and innovations has led the company in data recovery and erasure solutions globally.
Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies and best practices when implementing a BYOD program.

Workflow Automation and SAM

Workflow Automation and SAM

Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.

CentricsIT

IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT...

Unlocking Change Through Understanding Your Leadership Voice

Unlocking Change Through Understanding Your Leadership Voice

Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the voices of others

Dissecting an ITAD Service Agreement

Dissecting an ITAD Service Agreement

In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these agreements work and how they can help protect a company.

Mobile Assets: Same Animal, Different Breed

“How do smartphones fit here? Are they harder to manage? Are there additional best practices for managing that hardware asset type?”. The short answer is it depends, laptops and desktops, depends… There is no “one size fits all” in ITAM

Software Audit Response Steps

Software Audit Response Steps

Software audits can seem mysterious, especially if someone has never been through one. In this session, we will look at the steps that can be taken to prepare for the eventual “Audit Letter.” One challenge with being proactive is that we have to do it before the letter comes. So let’s look at ways we can be more proactive, before it is too late.

What to Manage and Where is My Data?

What to Manage and Where is My Data?

Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.