My Courses

  • Absolute Security

    Absolute Security

    IAITAM Provider Member Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by 21,000 global enterprises, and licensed across 14 million PC users. With the Absolute Security Cyber Resilience Platform integrated into their digital enterprise, customers ensure their mobile and hybrid workforces connect securely and seamlessly from anywhere in the world and that business operations recover quickly following cyber disruptions and attacks. Our award-winning capabilities have earned recognition and leadership status across multiple technology categories, including Zero Trust Network Access (ZTNA), Endpoint Security, Security Services […]

  • Sustainability: How Does Your Disposition Vendor’s Certifications Impact Your Environmental Footprint

    Sustainability: How Does Your Disposition Vendor’s Certifications Impact Your Environmental Footprint

    Global e-Waste is growing exponentially every year! Have you wondered how your disposition process is contributing to reducing this global burden and what does your ITAD vendor’s certifications e-Stewards and R2 mean to you?

  • Assessing ITAM Technology

    Assessing ITAM Technology

    Automation is all but a requirement to be able to manage environments at any sort of scale. Technology is a key part of building out our automation. It may not be the best approach to select a particular tool based on one recommendation. Once we bring a particular tool into our environment, it can be…

  • Yes. You Can Get Fired for a Bad ITAD Process

    Yes. You Can Get Fired for a Bad ITAD Process

    A flawed IT Asset Disposition process isn’t just a slip-up; it’s a direct threat to your career. Join this webinar as we cover the top five critical indicators of risk in your ITAD process, offering best-in-class practices from national and global organizations like P&G, GSK, OhioHealth, and Visa to fortify your approach. If you’re connected…

  • Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

    Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

    Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies…

  • Workflow Automation and SAM

    Workflow Automation and SAM

    Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs…

  • CentricsIT

    CentricsIT

    IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT value optimization. We got here by following our instincts, embracing change and committing ourselves to the highest levels of customer support and service delivery. We provide secure sustainability—a balanced mix of traditional tactics and smart alternatives that optimizes your systems, maximizes your resources, and helps IT leaders, ESG officers and CFOs finally speak the same language.Address 3140 Northwoods PkwySuite […]

  • Unlocking Change Through Understanding Your Leadership Voice

    Unlocking Change Through Understanding Your Leadership Voice

    Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the…

  • Dissecting an ITAD Service Agreement

    Dissecting an ITAD Service Agreement

    In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these…

  • How valuable is the data residing on & through your IT assets and how well do you protect it?

    How valuable is the data residing on & through your IT assets and how well do you protect it?

    Data breaches happen every day. So do you have a cybersecurity insurance policy in place? The real question is, when was the last time you knew your data was lost or stolen … or do you even know?