AIIM Webinars

Learn from industry consultants, analysts, and expert users via AIIM's webinar series. Join us for the live events or make the time when it works best for you!


1 - 10 Results out of 116

Modernizing Information Governance

Outdated governance and compliance practices not only make companies like yours more vulnerable to security breaches, but they also make it difficult to locate and access your information. In this webinar, we’ll explore how to improve your information governance efforts with modernization. We’ll share the new best practices on how to administer the complete lifecycle of your information and data, including: automating records management; fully integrate with your business processes; managing records in place; maintaining security and regulatory compliance; and understanding how new technologies can be invaluable.

Turning Digital Transformation into a Tangible Action Plan: A Strategic Discussion

Every organization needs to be exploring and advancing in the area of digital transformation, but how do we put this into an actionable plan? Join us as we explore the broad themes of these 4 questions: 

  • What are the primary goals "best-in-class" organizations hope to achieve through digital transformation?
  • How can you use design thinking to put people at the center of digital transformation?
  • How can you better innovate with open collaboration and integrate new technologies and services?
  • How do successful organizations use platform thinking to harness the power and scale of their digital capabilities and rapidly create new digital initiatives?

The Simplest Route to Security and Compliance: How North American Multinationals Are Responding to Regulatory Compliance

2018 is just around the corner, and with it comes a slew of new security and regulatory concerns. Responding to this new landscape of information security concerns and complying with regulation can seem like a massive effort, especially if your organization has not been employing best practices with managing your data and information, or struggles with multiple systems with inadequate architecture. In this webinar, we’ll take a close look at some best practices for data privacy compliance, and assess how six large US-based multinational organizations are: prioritizing GDPR compliance with other goals; assessing the risk posed by noncompliance; formalizing teams to address this and future mandates; and revising data privacy models in a world where breaches continue to be the norm. The more consistency you can achieve between systems, and the broader your controls around those systems, the easier your process will be. Without the simplest route to compliance, the risk will always be too great.

Robotic Process Automation 101: What is it? What can it mean for your organization?

There are exciting advancements in process automation and robotics technologies which have resulted in an ever-growing interest in – and need for – Robotics Process Automation (RPA).  Robotics has been very successful in industrial and manufacturing industries for some time. The advancements that can impact back-office uses today are many, and can represent a good ROI. In this webinar, we’ll take an introductory overview of Robotic Process Automation – what it is and what it can do for you and your organization.

Overcoming Information Chaos – It’s More Than Just FINDING the Needle in the Haystack

The way we have traditionally addressed business content challenges is by focusing on improving enterprise search – solving the "needle in the haystack" problem, and often solving it by brute force. But if digital transformation projects are to succeed, we must do two things: 1) rethink and automate how we solve the "finding" problem; and 2) move from "finding" to "using" information to create new sources of customer value. Join leading information management executive John Mancini for a lively discussion on how to find value – and opportunity – in the information and data in your business.

Drowning in Emails? Top Tips to Manage Them Like a Pro

As organizations strive to digitalize the workplace, there is great value on getting the right information at the right time -- including with emails. Whether you want to manage emails right within the email client or at the server level with rules based email management, email management is a best practice more organizations need to implement. Join us to learn some best practices on how to achieve this.

Don’t Just Analyze Your Processes: Learn How to Quickly Implement Change for Progress

Businesses have come to realize the importance of analyzing their processes as the key to progression. But, do we have the right people analyzing our processes? Do we know even know HOW to analyze them? This ongoing effort needs to be made at the user level where the work is done and the process is best understood. There’s a major advantage and benefit of empowering your workforce to be the change-enablers, delivering the greatest benefit for the business. Join us as we outline some best practices for process improvement and how to quickly implement these changes.

Data Privacy – Solving Negligence, Bad Practices, Access Control, and Compliance Issues

There’s no denying that data leaks and breaches are a threat. According to recent AIIM research, a large majority of data loss or exposure is not due to hacking or malicious attacks but due to staff negligence, bad practices, or unauthorized access. So how can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner?  In this webinar, we’ll outline the top data privacy threats to your internal operations and how they can be solved. We’ll discuss best practices such as: monitoring who is reading and accessing your sensitive documents; understanding and incorporating any regulatory compliance requirements vital to your organization’s operation; and handling sensitive data well while maintaining focus on your core business. We’ll also identify some of the biggest mistakes companies make when making decisions about securing sensitive data – and show you how to correct them.

Evaluate How You Run Your Large Capture Operation

An essential part of managing you or your client's business information is capturing it at the entry point. But, successful capture implementation isn’t driven by products, tools, and technologies – it’s the information professionals who are responsible to manage, configure, and operate the capture systems that really drive success. But just how does your organization stack up against others? How successfully are you leading a capture deployment in your (or your client’s) organization? We asked the capture leaders in the AIIM community these questions and more. Join us where we’ll learn about how the top leaders in the AIIM community successfully lead, navigate, and evaluate a capture deployment. Whether you manage your operations in house or outsource this vital function, or if you are the provider of this outsourced endeavor, this webinar is for you.

Workflow and Process Security – Checking the Locks

With so many potential threats, your documents aren’t as secure as you think, or hope, they are. No one is immune to the challenges of securing your infrastructure, your applications, and your data. So how do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In this webinar, we’ll discuss tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.

Back to Top Back to Top