-
KPA of the Month: Communication & Education Management
KPA of the Month: Communication & Education ManagementWith: Steff Gilbert, IAITAMCommunication and Education is a Core Key Process Area that the entire organization needs to be successful. In this session, we’ll look at the best practices that C&E process holders can use to get involved to strengthen the relationship between the KPAs of ITAM and between ITAM and the rest of the organization. What’s been your most successful communication strategy to mature your program? We can’t wait to hear from all of you!
-
The Three Pillars of IT Asset Disposition; Vendor Checklist
The Three Pillars of IT Asset Disposition; Vendor ChecklistWith: George Weisgerber, GalideIn this session, we’re going to explore the three pillars of IT Asset Disposition along with a checklist of criteria you should consider when selecting an ITAD Vendor who aligns with your organization’s business needs, industry regulations, internal compliance, security practices, and auditable processes.
-
Keep It Super Simple – The 4 Step ITAM Process for Success
Keep It Super Simple – The 4 Step ITAM Process for SuccessWith: Steff Gilbert, IAITAMOften times we find ourselves getting bogged down in complex solutions in efforts to align with organizational goals or increase efficiency. In this session we’re going to look at four simple steps of ITAM to focus on in order to bring value and maturity to your ITAM Program.
-
Wipe or Shred? How to Create an Effective Hybrid Data Destruction Plan
Wipe or Shred? How to Create an Effective Hybrid Data Destruction PlanWith: Dale Hurteau, Guardian Data DestructionMany organizations have a singular approach to data destruction. This could be a result of legal action, experience, insufficient knowledge or outdated practices. We’ll walk you through a hybrid approach to data security and data destruction to maximize ESG/Corporate Governance goals and retained or market value. Without sacrificing risk. Hybrid data destruction services solutions may include a combination of erasure (wipe), degauss and shred. Each project’s data destruction process should be based upon the level of security required by the organization as a whole, […]
-
SAM Tool Basics NOT To Be Missed During Implementation
SAM Tool Basics NOT To Be Missed During ImplementationWith: Manisha Srivastava, Birlasoft India Pvt Ltd.In this session, we’ll discuss the failures and successes of SAM Tool Implementation. Please come prepared to ask questions and share your own experiences!
-
KPA of the Month: Policy Management
KPA of the Month: Policy ManagementWith: Steff Gilbert, IAITAMPolicy Management is the KPA responsible for ensuring the organization’s policies are current, clear, understood, and equally enforced. In this session we’ll define important policy related terms, discuss best practices, and take a look at the relationship between Policy Management and the other KPAs in your ITAM Program.
-
How is the Economy Affecting Software Asset Management?
How is the Economy Affecting Software Asset ManagementWith: Michael Swanson, ISAMSince 2000, global GDP grew by 184%, North America GDP by 127% while going thru two major recessions. In spite of the recessions, IoT devices grew from 0.5 billion to over 50 billion, internet users from 284 million to 5.5 billion and 4.7 billion active social media users came online. Although corporate revenue is impacted by the economy, and vice versa, IoT, internet usage and social media has reached global levels that have caused growth in corporate IT expenses. When our economy is threatened by a recession, companies look for […]
-
Practical Challenges in Hardware Asset Management
Practical Challenges in Hardware Asset ManagementWith: Sumit Maheshwari, TCSIT Asset Managers face many challenges, from asset forecasting without proper analysis, to improper receiving, to lack of policy and process awareness, and more! It’s important to know what these challenges are and how they will impact the organization across various processes and projects. In this session, we will discuss these issues and how to resolve them.
-
You Can’t Secure What You Don’t Know You Have
You Can’t Secure What You Don’t Know You HaveWith: Steff Gilbert, IAITAMOrganization’s have been faced with the challenge of securing their assets since the dawn of time, but the threats have changed and evolved over time. With hybrid work environments comes additional risk. From exploited app vulnerabilities, to insecure authentication practices and the growing number of MFA attacks via social engineering, to lack of employee security awareness training, and beyond, we’ll talk about these risks and challenges and how to mitigate them through proactive ITAM.
-
KPA of the Month: Program Management
KPA of the Month: Program ManagementWith: Steff Gilbert, IAITAMThe ITAM Program defines the overall strategy, mission, objectives, prioritization, and measurement of all efforts to manage an organization’s IT assets. This KPA encompasses all ITAM related efforts. In this session, we’ll discuss the Roles, Responsibilities, and Best Practices of ITAM Program Management.