-
Using Asset ID to Gain Organizational Support
Using Asset ID to Gain Organizational SupportWith: Steff Gilbert, IAITAM ITAM is slowly becoming a core business program, and even more in the past few years. Asset ID is a very important part of the program, playing a critical role in Financial Management, Compliance Management, Security & Risk Mitigation, and more! In this session, we’ll discuss how to use our Asset ID successes to gain understanding of and support for ITAM across the entire organization.
-
KPA of the Month: Compliance Management
KPA of the Month: Compliance ManagementWith: Steff Gilbert, IAITAM Staying on top of compliance issues is important in ITAM because it prevents the disruption of business practices and saves money by helping to avoid fines, fees, and penalties. In this session, we’ll take a look at how Compliance Management relates to the other KPAs and what you can do in 2023 to ensure your organization is compliant.
-
Showing the Value of the ITAM Program
Showing the Value of the ITAM ProgramWith: Steff Gilbert, IAITAM ITAM is all about value! We acquire the asset with the highest value, and manage it so that it continues to be valuable throughout its lifecycle. Without this value, the organization would suffer. But how do we show the Executives, Stakeholders, and other Departments how important our job is? That’s what this session is all about! Let’s talk Quick Success Projects, Communication, and your Program Success Reports!
-
Accurate and Timely Procurement Data is Critical to Success
Accurate and Timely Procurement Data is Critical to SuccessWith: Todd Hogan, Geonovi Development Getting accurate and timely procurement details into your ITAM system is challenging, frustrating, and costly. It is often so challenging that organizations rely on asset discovery data as the source of truth for assets. This approach is a fatal mistake that most often surfaces around the 12-18 month after deployment, as trust in the data is lost and organization again return to managing assets in Excel.
-
Retrieving Assets at EOL
Retrieving Assets at EOLWith: Steff Gilbert, IAITAM Many organizations are having a rough time retrieving assets from the WFH environment. In this session, we’ll talk about policies to develop to get the commitment of employees, and steps you can take when the policy isn’t followed.
-
The Mainframe isn’t Dead, it is Modernizing for the Next-Gen
The Mainframe isn’t Dead, it is Modernizing for the Next-GenWith: Alan Bain, ISAM Computing infrastructures have evolved from mainframe to server to cloud to managed services to hybrid. But in many cases, the constant has been mainframe even though it has been a platform destined for extinction for more than twenty years. Why has it been scorned, why has it been resilient and how could a little Software Asset Management attention bring it back into the fold of flexible and affordable platforms? This presentation will present the history, the benefits and the opportunities for cost savings that can be exercised […]
-
Cybersecurity and the SAM Manager
Cybersecurity and the SAM ManagerWith: Sumin Tchen, Belarc Cybersecurity needs much of the same data that SAM uses as far as software and usage details. Given the right tools, SAM can make this automatically available to other groups within the organization, such as Cybersecurity, Operations, Vendor Management, Finance and the Business Units. Sumin will discuss Cybersecurity Controls, what they are, why they are needed and list the specific Controls where SAM can support Cybersecurity. The objective is to support Cybersecurity with automatic access to accurate, complete and up to data data. Now the SAM manager will be asking: why does […]
-
What to Look for in an ITAD Vendor
What to Look for in an ITAD VendorWith: Steff Gilbert, IAITAM Technology is evolving at rapid speed, asset lifecycles are shrinking, and environmental regulations are ever-changing. This makes ITAD even more complicated. In this session, we’re going to explore several criteria for selecting an ITAD Vendor, including aligning certifications with your organization’s business needs, compliance and security practices, and auditable processes.
-
Reconnecting HAM & SAM
Reconnecting HAM & SAMWith: Steff Gilbert, IAITAM Are you currently experiencing a disconnect between HAM and SAM in your ITAM Program? In this session, we’re going to talk about the areas where HAM & SAM overlap and depend upon one another as well as some areas, tasks, and functions that could bridge any gaps! As always, feel free to chime in with any questions, stories, or examples you have.
-
Uncovering True Visibility into your IT Environment
Uncovering True Visibility into your IT EnvironmentWith: Frank Venezia, Ernst & Young In the ever-evolving realm of IT, achieving comprehensive visibility within your organization’s environment is pivotal for efficient management, robust security, and optimal performance. Join our interactive session to grasp the vital significance of true visibility in today’s intricate IT landscapes. Discover how it empowers proactive management, enhances security measures, and enables resource optimization. Engage with strategies that harness advanced tools and techniques, ensuring you can navigate complexities with confidence. This session equips you with insights to master your IT ecosystem, transforming challenges into opportunities for growth.