My Courses

  • Implementing IAITAM’s 12 KPAs

    Implementing IAITAM’s 12 KPAs

    Is your organization mired in uncertainty, lack of cooperation and understanding or are you driving cost and risks out of your distributed computing model and creating value for your end-users and business? Data security in a circular economy and sustainability initiatives can only be achieved by “starting with the end in mind”. Find out how…

  • The Inter-Dependency of ITAM & Data Management

    The Inter-Dependency of ITAM & Data Management

    This article underscores the importance of lifecycle management policies, processes, and compliance in ensuring data security and enabling digital transformation. Proper IT asset lifecycle management reduces IT operation costs and enhances data security, thereby optimizing technology investments and supporting competitive advantage.

  • Seven Reasons Why SAM Tool Implementations Fail

    Seven Reasons Why SAM Tool Implementations Fail

    SAM Tools are designed to help organizations optimize their software usage and compliance. The tool vendors claim they can save you millions. However, sometimes SAM tools fail to deliver the expected benefits. How can you save your multi-million dollar SAM Tool investment from going bust? What can you learn from other failed implementations? In this…

  • Myths and Realities of IT Financial Optimization

    Myths and Realities of IT Financial Optimization

    In the realm of Information Technology (IT), financial optimization is a constant challenge. However, many myths and realities need to be demystified.

  • Mastering Remote Offboarding: Best Practices for IT Asset Managers

    Mastering Remote Offboarding: Best Practices for IT Asset Managers

    Learn the most efficient, accountable ways to recover assets from remote workers during offboarding. Success is more complicated than you think.

  • SIE Consulting Group

    SIE Consulting Group

    IAITAM Provider Member SIE Consulting Group brings a unique mix of public sector experience and private sector insights to every client situation. Our team has successfully delivered hundreds of consulting engagements for nearly every industry group.  Our strategic approach is a key element of success in addressing public and private sector challenges. We provide end-to-end expertise for the acquisition lifecycle.  Our services include, category management planning, spend analytics, supplier selection and award, through to post-award management. We have also helped dozens of clients with procurement technology selection and implementation for all of the largest software providers in the Software Asset […]

  • Understanding Oracle Enterprise Agreements

    Understanding Oracle Enterprise Agreements

    Oracle’s Enterprise Agreements can be a blessing or a curse, depending on your management of these complex licensing vehicles. In this session, you will learn different types of Oracle enterprise agreements, such as ULAs and ELAs, and what are the benefits and risks, examples, and strategies for managing your enterprise agreements with Oracle. This session…

  • ITAD Superpowers: 5 Steps to Becoming an ITAD Hero!

    ITAD Superpowers: 5 Steps to Becoming an ITAD Hero!

    Feeling the crunch of escalating ITAD responsibilities amidst shrinking teams and soaring compliance demands? If so, you’re the unsung hero your organization needs. Join us as we share best practices from industry giants like P&G, GSK, OhioHealth, and Visa on strategies to manage data security, chain of custody, and asset disposition with finesse. We’ll provide…