Michelle Wescovich

Michelle Wescovich is a Senior Consultant with ISAM Group, Inc. She has worked in the Software Asset Management field for 10 years, starting her career as a Compliance Consultant for Xerox in 2013.
Workflow Automation and SAM

Workflow Automation and SAM

Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.

CentricsIT

IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT...

Unlocking Change Through Understanding Your Leadership Voice

Unlocking Change Through Understanding Your Leadership Voice

Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the voices of others

Dissecting an ITAD Service Agreement

Dissecting an ITAD Service Agreement

In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these agreements work and how they can help protect a company.

Mobile Assets: Same Animal, Different Breed

“How do smartphones fit here? Are they harder to manage? Are there additional best practices for managing that hardware asset type?”. The short answer is it depends, laptops and desktops, depends… There is no “one size fits all” in ITAM

Software Audit Response Steps

Software Audit Response Steps

Software audits can seem mysterious, especially if someone has never been through one. In this session, we will look at the steps that can be taken to prepare for the eventual “Audit Letter.” One challenge with being proactive is that we have to do it before the letter comes. So let’s look at ways we can be more proactive, before it is too late.

What to Manage and Where is My Data?

What to Manage and Where is My Data?

Does your ITAM program encompass all the areas where Data can reside? We will discuss overlooked asset classes, hardware and storage configurations that are often overlooked.

The Regulatory Roadmap

The Regulatory Roadmap

Legislation is an evolutionary process that should come as no surprise. Understanding when & why a CITAM leads the Education & Communication Core KPA with lobbyists, lawyers, the Executive Management Team is more valuable than insurance.