-
Asset ID & Tracking Methods
Asset ID & Tracking MethodsWith: Steff Gilbert, IAITAM Barcodes, RFID, IoT… which is right for your organization’s IT assets? In this session we’ll explore the pros and cons of each method and discuss how they’ve helped your organizations keep track of IT assets.
-
Proactively Navigate Microsoft Renewals in the 365 Age to Regain Control
Proactively Navigate Microsoft Renewals in the 365 Age to Regain ControlWith: Phil Emery, ISAMo Step One: Understand the History – Collect Historical Information and Review Past Renewals, Pricing o Step Two: Understand the Future Collect Business Requirements ; Examine Business Trends and Future Needs ; What Has Changed With Microsoft? ; Pricing ; Security Licensing ; Windows Server Licensing ; The Rise of AI ; Having Fail; Budget and Pricing Expectations ; Explore Migrations and Retirements (What Can You Get Rid of?) o Step Three: Build the Plan; Identify Growth Areas ; Identify Reduction Areas ; Find the […]
-
Contract Management Best Practices
Contract Management Best PracticesWith: Steff Gilbert, IAITAMKeeping track of SLAs, VPAs, and other IT Asset Contracts can be tough work! In this session we’ll discuss several best practices for effective Contract Management including: Standardizing and centralizing agreements, setting sensible KPIs, areas for automation, and more!
-
Managing the Cost of the Cloud
Managing the Cost of the CloudWith: Steff Gilbert, IAITAMIt’s more important than ever to have an accurate picture of the cloud resources being used in your organization and what they cost. In this session, we’ll take a look at the best practices for managing cloud costs. Please chime in with your own experiences and questions!
-
Managing the Cloud
Managing the CloudWith: Steff Gilbert, IAITAMIt’s more important than ever to have an accurate picture of the cloud resources being used in your organization and when. In this session, we’ll discuss ways to allocate resources more efficiently and ensure that your using what you’re paying for. Please chime in with your own experiences and questions!
-
KPA of the Month: Communication & Education Management
KPA of the Month: Communication & Education ManagementWith: Steff Gilbert, IAITAMCommunication and Education is a Core Key Process Area that the entire organization needs to be successful. In this session, we’ll look at the best practices that C&E process holders can use to get involved to strengthen the relationship between the KPAs of ITAM and between ITAM and the rest of the organization. What’s been your most successful communication strategy to mature your program? We can’t wait to hear from all of you!
-
The Three Pillars of IT Asset Disposition; Vendor Checklist
The Three Pillars of IT Asset Disposition; Vendor ChecklistWith: George Weisgerber, GalideIn this session, we’re going to explore the three pillars of IT Asset Disposition along with a checklist of criteria you should consider when selecting an ITAD Vendor who aligns with your organization’s business needs, industry regulations, internal compliance, security practices, and auditable processes.
-
Keep It Super Simple – The 4 Step ITAM Process for Success
Keep It Super Simple – The 4 Step ITAM Process for SuccessWith: Steff Gilbert, IAITAMOften times we find ourselves getting bogged down in complex solutions in efforts to align with organizational goals or increase efficiency. In this session we’re going to look at four simple steps of ITAM to focus on in order to bring value and maturity to your ITAM Program.
-
Wipe or Shred? How to Create an Effective Hybrid Data Destruction Plan
Wipe or Shred? How to Create an Effective Hybrid Data Destruction PlanWith: Dale Hurteau, Guardian Data DestructionMany organizations have a singular approach to data destruction. This could be a result of legal action, experience, insufficient knowledge or outdated practices. We’ll walk you through a hybrid approach to data security and data destruction to maximize ESG/Corporate Governance goals and retained or market value. Without sacrificing risk. Hybrid data destruction services solutions may include a combination of erasure (wipe), degauss and shred. Each project’s data destruction process should be based upon the level of security required by the organization as a whole, […]
-
SAM Tool Basics NOT To Be Missed During Implementation
SAM Tool Basics NOT To Be Missed During ImplementationWith: Manisha Srivastava, Birlasoft India Pvt Ltd.In this session, we’ll discuss the failures and successes of SAM Tool Implementation. Please come prepared to ask questions and share your own experiences!