AIIM Webinars

Learn from industry consultants, analysts, and expert users via AIIM's webinar series. Join us for the live events or make the time when it works best for you!


1 - 10 Results out of 112

Overcoming Information Chaos – It’s More Than Just FINDING the Needle in the Haystack

The way we have traditionally addressed business content challenges is by focusing on improving enterprise search – solving the "needle in the haystack" problem, and often solving it by brute force. But if digital transformation projects are to succeed, we must do two things: 1) rethink and automate how we solve the "finding" problem; and 2) move from "finding" to "using" information to create new sources of customer value. Join leading information management executive John Mancini for a lively discussion on how to find value – and opportunity – in the information and data in your business.

Drowning in Emails? Top Tips to Manage Them Like a Pro

As organizations strive to digitalize the workplace, there is great value on getting the right information at the right time -- including with emails. Whether you want to manage emails right within the email client or at the server level with rules based email management, email management is a best practice more organizations need to implement. Join us to learn some best practices on how to achieve this.

Don’t Just Analyze Your Processes: Learn How to Quickly Implement Change for Progress

Businesses have come to realize the importance of analyzing their processes as the key to progression. But, do we have the right people analyzing our processes? Do we know even know HOW to analyze them? This ongoing effort needs to be made at the user level where the work is done and the process is best understood. There’s a major advantage and benefit of empowering your workforce to be the change-enablers, delivering the greatest benefit for the business. Join us as we outline some best practices for process improvement and how to quickly implement these changes.

Data Privacy – Solving Negligence, Bad Practices, Access Control, and Compliance Issues

There’s no denying that data leaks and breaches are a threat. According to recent AIIM research, a large majority of data loss or exposure is not due to hacking or malicious attacks but due to staff negligence, bad practices, or unauthorized access. So how can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner?  In this webinar, we’ll outline the top data privacy threats to your internal operations and how they can be solved. We’ll discuss best practices such as: monitoring who is reading and accessing your sensitive documents; understanding and incorporating any regulatory compliance requirements vital to your organization’s operation; and handling sensitive data well while maintaining focus on your core business. We’ll also identify some of the biggest mistakes companies make when making decisions about securing sensitive data – and show you how to correct them.

Evaluate How You Run Your Large Capture Operation

An essential part of managing you or your client's business information is capturing it at the entry point. But, successful capture implementation isn’t driven by products, tools, and technologies – it’s the information professionals who are responsible to manage, configure, and operate the capture systems that really drive success. But just how does your organization stack up against others? How successfully are you leading a capture deployment in your (or your client’s) organization? We asked the capture leaders in the AIIM community these questions and more. Join us where we’ll learn about how the top leaders in the AIIM community successfully lead, navigate, and evaluate a capture deployment. Whether you manage your operations in house or outsource this vital function, or if you are the provider of this outsourced endeavor, this webinar is for you.

Workflow and Process Security – Checking the Locks

With so many potential threats, your documents aren’t as secure as you think, or hope, they are. No one is immune to the challenges of securing your infrastructure, your applications, and your data. So how do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In this webinar, we’ll discuss tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.

Finance in the Digital World – Facing and Embracing Disruption

Financial automation now gives organisations the opportunity to transform their financial operations, yet many departments remain stuck with manual processes and working at the speed of paper. And let’s face it, paper-driven processes are costing you too much time and money. To succeed in this digital world, you must face and embrace the disruption. Join AIIM’s Atle Skjekkeland as he shares when to automate your A/P processes for better cash flow, cost-avoidance, and more efficient handling. Follow along as he covers financial automation – the benefits, the requirements, critical success factors, and more. Learn how to establish your business case to automate and transform your financial processes today.

Getting Strategic – Lessons from 3 Decades of ECM Experience

Far from being “dead,” content management is evolving into something much bigger and more strategic for organizations. Join AIIM Chief Evangelist John Mancini as he hosts an interactive discussion with executives from two premier end user organizations as they explore lessons learned in over three decades of ECM at massive scale. They’ll share their insights about how to leverage this investment and extend it into the era of analytics. Don’t miss this exciting conversation, and take the opportunity to ask your own questions to our panelists.

Data Privacy – Learn What It Takes to Protect Your Information

According to recent AIIM research, 31% feel their companies’ data protection is insufficient when it comes to protecting confidential and sensitive information. In this webinar, we will take a close look at what it takes to prepare for all kinds of data privacy regulations – to learn how to protect your data in order to be compliant with regulators or for healthy business practices in general. We will discuss ways to identify the data you have; store what you need, and defensibly delete what you don’t – or when you need; and encrypt the data you want to keep – and keep it secure.

Planning for Change – How to Map and Model Your Enterprise Processes

With digital transformation in mind, new projects and changes in business strategies are now on almost every business’ agenda. These and other enterprise-wide changes all require significant adjustments to your existing processes. In this webinar, you'll learn how you can successfully map and model your enterprise processes; how process modeling can have a major impact on bringing together your critical organizational practices; and help you integrate your systems and better serve your customers and citizens. Businesses that want to rise above and beyond their competition should consider an enterprise-wide process modeling approach. Join this webinar and learn about the potential.
Back to Top Back to Top