Our Approach

FOR TODAY’S IT CHALLENGES AND TOMORROW’S IT OPPORTUNITIES

Leading Edge Technologies

Cryptocurrency and Blockchain

AI and Data Analytics

Drones and Autonomous Vehicles

Virtual and Augmented Reality


Robotics and IoT



5G and Everything as a Service


Voice and Natural Language Interface


Quantum

Digital Transformation

What's on the Horizon


Delightful Customer Experience


Trusted Provider


Frictionless Operations


Supply Chain and Ecosystems


Agility, Resiliency, and Security


Rewarding Workplace


ESG in Action

Considerations with New Technologies


THINK ABOUT USE CASES AND HOW TECHNOLOGIES AND TECHNOLOGY INITIATIVES SUPPORT BUSINESS GOALS

EVALUATE THOSE USE CASES AND DON’T BE AFRAID TO PULL THE PLUG ON INITIATIVES THAT ARE NOT BENEFICIAL OR IMPACTFUL

START SMALL AND LEARN – AND EVALUATE OFTEN


CONSIDER FEEDBACK LOOPS



REMEMBER EDUCATION AND SKILLS TRAINING IN SUPPORT OF NEW TECHNOLOGIES AND APPROACHES


THINK ABOUT TIME HORIZONS TO REALIZE BENEFITS – HOW LONG WILL IT TAKE?


Building Blocks and Enabling Capabilities


FLEXIBLE AND OPEN ARCHITECTURE

DATA STRATEGY

AGILE FUNDING MODEL

MULTIDISCIPLINARY APPROACH

ROBUST ECOSYSTEM

Information Governance

Image

Digital Resiliency


Image

Wisdom from the Trenches


Digital transformation is won and lost in middle management

Innovating is fundamentally different from building for scale and resiliency

Adoption of technology takes much longer than the hype but typically has greater impact than the predictions

Image

Innovation in a Board Context

Image
Board Composition

• Digital DNA
• Innovation Support
• Skills Mix

Image
Board Governance

• Overnight
• Accountability
• Frameworks for Decision Making
• Policies and Guardrails

Image
Board Oversight of Talent and Culture

• Brand
• Training and Development
• Learning Culture
• Structures and Incentives

Board Oversight of Information Security


Governance
• Creating the right governance and authorizing environment
• Considering domain expertise, integration with IT functions, escalation, and oversight
• Keeping up with guidance and regulation
Policy
• Ensuring policies are comprehensive and current
• Assessing compliance
Testing
• Testing the security posture of your organization through internal and external assessment
• Practicing incident response and learning from industry events
Transparency
• Identifying the reporting and metrics you need to manage cyber risk
• Making thoughtful disclosure of material cyber risks and reporting of incidents
Resource Allocation
• Ensure that allocation of resources aligns with goals and desired outcomes
• Evaluating effectiveness of resource allocations