AIIM Webinars

Learn from industry consultants, analysts, and expert users via AIIM's webinar series. Join us for the live events or make the time when it works best for you!


11 - 20 Results out of 119

Data Privacy – Solving Negligence, Bad Practices, Access Control, and Compliance Issues

There’s no denying that data leaks and breaches are a threat. According to recent AIIM research, a large majority of data loss or exposure is not due to hacking or malicious attacks but due to staff negligence, bad practices, or unauthorized access. So how can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner?  In this webinar, we’ll outline the top data privacy threats to your internal operations and how they can be solved. We’ll discuss best practices such as: monitoring who is reading and accessing your sensitive documents; understanding and incorporating any regulatory compliance requirements vital to your organization’s operation; and handling sensitive data well while maintaining focus on your core business. We’ll also identify some of the biggest mistakes companies make when making decisions about securing sensitive data – and show you how to correct them.

Evaluate How You Run Your Large Capture Operation

An essential part of managing you or your client's business information is capturing it at the entry point. But, successful capture implementation isn’t driven by products, tools, and technologies – it’s the information professionals who are responsible to manage, configure, and operate the capture systems that really drive success. But just how does your organization stack up against others? How successfully are you leading a capture deployment in your (or your client’s) organization? We asked the capture leaders in the AIIM community these questions and more. Join us where we’ll learn about how the top leaders in the AIIM community successfully lead, navigate, and evaluate a capture deployment. Whether you manage your operations in house or outsource this vital function, or if you are the provider of this outsourced endeavor, this webinar is for you.

Workflow and Process Security – Checking the Locks

With so many potential threats, your documents aren’t as secure as you think, or hope, they are. No one is immune to the challenges of securing your infrastructure, your applications, and your data. So how do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In this webinar, we’ll discuss tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.

Finance in the Digital World – Facing and Embracing Disruption

Financial automation now gives organisations the opportunity to transform their financial operations, yet many departments remain stuck with manual processes and working at the speed of paper. And let’s face it, paper-driven processes are costing you too much time and money. To succeed in this digital world, you must face and embrace the disruption. Join AIIM’s Atle Skjekkeland as he shares when to automate your A/P processes for better cash flow, cost-avoidance, and more efficient handling. Follow along as he covers financial automation – the benefits, the requirements, critical success factors, and more. Learn how to establish your business case to automate and transform your financial processes today.

Getting Strategic – Lessons from 3 Decades of ECM Experience

Far from being “dead,” content management is evolving into something much bigger and more strategic for organizations. Join AIIM Chief Evangelist John Mancini as he hosts an interactive discussion with executives from two premier end user organizations as they explore lessons learned in over three decades of ECM at massive scale. They’ll share their insights about how to leverage this investment and extend it into the era of analytics. Don’t miss this exciting conversation, and take the opportunity to ask your own questions to our panelists.

Data Privacy – Learn What It Takes to Protect Your Information

According to recent AIIM research, 31% feel their companies’ data protection is insufficient when it comes to protecting confidential and sensitive information. In this webinar, we will take a close look at what it takes to prepare for all kinds of data privacy regulations – to learn how to protect your data in order to be compliant with regulators or for healthy business practices in general. We will discuss ways to identify the data you have; store what you need, and defensibly delete what you don’t – or when you need; and encrypt the data you want to keep – and keep it secure.

Planning for Change – How to Map and Model Your Enterprise Processes

With digital transformation in mind, new projects and changes in business strategies are now on almost every business’ agenda. These and other enterprise-wide changes all require significant adjustments to your existing processes. In this webinar, you'll learn how you can successfully map and model your enterprise processes; how process modeling can have a major impact on bringing together your critical organizational practices; and help you integrate your systems and better serve your customers and citizens. Businesses that want to rise above and beyond their competition should consider an enterprise-wide process modeling approach. Join this webinar and learn about the potential.

Intelligently Fueling Your Processes with Capture

There are different formats and types of information steadily coming into your organization every day, and it is imperative to get that information and data into your processes as quickly and accurately as possible. In this webinar, we’ll explore how machine learning and natural language understanding play an integral role in assisting in this intelligent and progressive way to capture and route valuable data. We know that capture technology can be so much more than scanning incoming paper. Join us and learn about these exciting possibilities and how you can intelligently fuel your critical business processes using capture.

The Low-Hanging Fruit of Document Automation – Finding Places to Get Started

The best approach in any department starts with document automation – with the creation, delivery, tracking, and tracing of your key documents in real time. In this webinar, by way of example, we’ll take an in-depth look at one vital business unit, found in every organization, and how it can benefit from getting the right information into the right hands at the right time – on any device.  We’ll look at financial document automation. Learn ways to: obtain greater visibility and control of your critical documents with your customers and partners; monitor and improve document delivery; uncover data trends to help drive decisions and actions; and maintain an audit trail of every action. We’ll also share customer use case examples of how organizations like yours are successfully controlling their critical documents and in the process are creating value and improving their ROI.

Growing the Seed for Your Digital Revolution with Modern Capture

For our UK and European community. Modern capture has become so much more than document scanning and digital storage. Today, capture is viewed as the starting line where digital transformation initiatives begin. In other words, business-critical data isn’t just being captured and stored, now it’s being integrated with critical workflows to help people work more effectively, more profitably, and with less risk and errors. In this webinar, we’ll explore and learn about a revolutionary way of capturing your critical business information into your back end processes.
Back to Top Back to Top