The ITAM Executive: A Podcast for IT Asset Management Professionals

The ITAM Executive: A Podcast for IT Asset Management Professionals

by

IT asset management — it’s not easy. Protect the company from licensing risks. Save on costs. And do it all while successfully conducting a long-term strategic deployment of software and technology. Need some advice?
The ITAM Executive is your trusted resource. Listen in as we chat with seasoned leaders from the ITAM community and pick up tips on how to define your IT strategy, manage licenses, and dial into the latest IT trends.
The ITAM Executive is a podcast created specifically for ITAM leaders and practitioners. In each episode, we invite seasoned leaders and industry experts from the ITAM community to share their tips on how to define strategy, manage licenses, and dial into the latest IT trends. Host: Philippe de Raet, VP of Business Development at Anglepoint (https://www.linkedin.com/in/pderaet/)
Speaker: Blake DeShaw, Security Manager at Anglepoint
As the world becomes more connected, digital security is paramount—not simply for maintaining positive customer relations but for global security and safety. This is one of, if not the most important parts of a robust ITAM & Security strategy. However, the task has never been more monumental. Not only do your organization’s tens of thousands of networked devices need to be tracked, but even employees’ personal devices, such as their phones and personal computers, need to be taken into consideration.
Protecting information from cyber-attacks is so crucial that extensive Executive Orders are in place to guide what companies are accountable for. Executive Order 14028: Improving the Nation’s Cybersecurity was a direct result of the Solar Winds incident, which was released in 2021. Based on this EO, Memorandum M2218: Enhancing the Security of the Software Supply Chain through Secure Software Development Practices was also recently released. Listen in as Blake helps dive into what this means for your organization.
We discuss:
3 major security breach case studies
The triggers you need to keep an eye on
Importance of accurate data, inventories, and usage
How to reduce and mitigate security exposures

If you’re interested in learning more about Blake, connect with him on LinkedIn (https://www.linkedin.com/in/blake-w-deshaw-52513661/).
Dig into more insights from ITAM executives by subscribing on Apple Podcasts, Spotify, or wherever you listen to podcasts.
Listening on a desktop & can’t see the links? Just search for The ITAM Executive in your favorite podcast player.

Recent Episodes

  • Security & ITAM in the Public Sector

    1 year ago
  • How to Maintain the Driver’s Seat during an Audit

    1 year ago
  • ISO 27002: A Millennia of Change in a Decade

    2 years ago
  • Riding the Efficiency Wave of Floating License Management

    2 years ago
  • Go Big Bang with Your ITAM Strategy

    2 years ago
  • Why You Shouldn’t Manage SaaS Without SAM

    2 years ago
  • How To Wrap Your Brain & Strategy Around SaaS Sprawl

    2 years ago
  • The Strategic Importance of Software Asset Management

    2 years ago
  • Software Asset Management: People, Process, & Technology

    2 years ago
  • ​​How Not to Select a SAM Tool

    2 years ago