Skot Waldron
Workflow Automation and SAM
Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.
CentricsIT
IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT...
Unlocking Change Through Understanding Your Leadership Voice
Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the voices of others
Dissecting an ITAD Service Agreement
In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these agreements work and how they can help protect a company.
How valuable is the data residing on & through your IT assets and how well do you protect it?
Data breaches happen every day. So do you have a cybersecurity insurance policy in place? The real question is, when was the last time you knew your data was lost or stolen … or do you even know?
Mobile Assets: Same Animal, Different Breed
“How do smartphones fit here? Are they harder to manage? Are there additional best practices for managing that hardware asset type?”. The short answer is it depends, laptops and desktops, depends… There is no “one size fits all” in ITAM
Software Audit Response Steps
Software audits can seem mysterious, especially if someone has never been through one. In this session, we will look at the steps that can be taken to prepare for the eventual “Audit Letter.” One challenge with being proactive is that we have to do it before the letter comes. So let’s look at ways we can be more proactive, before it is too late.
What to Manage and Where is My Data?
Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.
The Regulatory Roadmap
Legislation is an evolutionary process that should come as no surprise. Understanding when & why a CITAM leads the Education & Communication Core KPA with lobbyists, lawyers, the Executive Management Team is more valuable than insurance.