My Courses

  • Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

    Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

    Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies…

  • Workflow Automation and SAM

    Workflow Automation and SAM

    Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs…

  • CentricsIT

    CentricsIT

    IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT value optimization. We got here by following our instincts, embracing change and committing ourselves to the highest levels of customer support and service delivery. We provide secure sustainability—a balanced mix of traditional tactics and smart alternatives that optimizes your systems, maximizes your resources, and helps IT leaders, ESG officers and CFOs finally speak the same language.Address 3140 Northwoods PkwySuite […]

  • Unlocking Change Through Understanding Your Leadership Voice

    Unlocking Change Through Understanding Your Leadership Voice

    Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the…

  • Dissecting an ITAD Service Agreement

    Dissecting an ITAD Service Agreement

    In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these…

  • How valuable is the data residing on & through your IT assets and how well do you protect it?

    How valuable is the data residing on & through your IT assets and how well do you protect it?

    Data breaches happen every day. So do you have a cybersecurity insurance policy in place? The real question is, when was the last time you knew your data was lost or stolen … or do you even know?

  • Mobile Assets: Same Animal, Different Breed

    Mobile Assets: Same Animal, Different Breed

    “How do smartphones fit here? Are they harder to manage? Are there additional best practices for managing that hardware asset type?”. The short answer is it depends, laptops and desktops, depends… There is no “one size fits all” in ITAM

  • Software Audit Response Steps

    Software Audit Response Steps

    Software audits can seem mysterious, especially if someone has never been through one. In this session, we will look at the steps that can be taken to prepare for the eventual “Audit Letter.” One challenge with being proactive is that we have to do it before the letter comes. So let’s look at ways we…

  • What to Manage and Where is My Data?

    What to Manage and Where is My Data?

    Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.