Browse our certifications
Find training
Open page navigation
Risk ManagementCyber SecurityProcess ManagementIT Management

Do We Need an IT Asset Management Program?

Full ITAM Webinar Series recordings available here

APMG and the International Association of IT Asset Managers (IAITAM) are delighted to present the recordings of an 8 part webinar series, the goal of which was to provide an updated look at the benefits of IT asset management to the enterprise.  

If your organization purchases, deploys, uses, and disposes of IT assets, then you have an ITAM Program. The real question though, is whether it is working to your advantage.  Or is it a set of uncoordinated activities that leaves your organization vulnerable on any number of fronts.

Information technology is a critical component of our everyday lives.  We can no longer imagine working in a world without compute power and networks to support us.  When you think about it, IT has become so pervasive that we take it for granted.  We are not only using more “traditional” computers, software, and telecommunications.  We use a wide variety of wirelessly connected devices, including devices we bring from home, like tablets and cell phones.  And IT is built into the new range of sensor driven devices, ushering in the Internet of Things (IoT) era. 

With this proliferation of technology, it is imperative that today’s businesses have a solid IT Asset Management program in place.   Yesterday we were only concerned with the spread of licensed software and paying ‘true up” costs to software publishers.  Today, we must be concerned about cyber security, personal devices accessing corporate data in the workplace, disposing of IT assets without jeopardizing company information, and a host of other concerns which pose a greater risk to the enterprise. After all, the organization’s real asset – information – is accessed by and stored on their IT assets.

With these factors in mind, the webinars discussed how a solid IT asset management program can help reduce the risk to your company. 

The topics in this series highlighted timely areas where a robust ITAM program could help the enterprise by minimizing risks associated with current threats like cyber attacks, forthcoming regulations including GDPR, growing trends such as BYOD, or the proliferation of devices caused by IoT. 

This webinar series features renowned guest experts who explore each topic and provide the kind of food for thought that would stimulate more discussion and awareness of the benefits of a well-conceived and constructed ITAM program. 

The topics  covered were as follows and you can see the recordings of the webinars by clicking on the appropriate links;

ITAM have a series of conferences and roadshows - full details of which can be found on their website

 

RELATED PRODUCTS

Bridge across a river

BiSL® (Business Information Services Library)

Connecting business information with key management areas

View more
Image of human and robot shaking hands Service Automation Framework SAF

The Service Automation Framework (SAF)

Embrace the future of service delivery

View more
ISACA Cybersecurity certifications product page image

ISACA Cybersecurity Certificate Programs

Gain the most up-to-date knowledge and abilities necessary to protect your enterprise

View more
Close

Certifications & Solutions

Accredited Training Organizations

Leadership

Accredited training providers

Certifications & Solutions

Seleccione cualquier filtro y pulse Aplicar para ver los resultados