Sourcing Assessments

Sourcing Assessments Consulting

Our team of expert Senior Consultants will study the areas you are considering out-, in- or co-sourcing. We'll interview all those involved in the project, including project managers, metrics specialists, line of business managers, implementors, process specialists, quality personnel, and finance professionals.


Security Risk Assessment and Review

Do you know what you're up against? Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews. Each of these assessment/reviews will provide you with a snapshot of your vulnerabilities and challenges, and show you ways to mitigate the risks.


Security Implementation and Operations

We don't just make recommendations: we help implement them. Using either off-the-shelf or custom solutions we can help you install and configure applications, deploy security systems including firewalls, routers, VPNs, PKI and other authentication systems, as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

For more than 16 years, Cutter Senior Consultant Rebecca Herold has created Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guidelines.


Risk Management Oversight

Tim Lister
Risk Management Oversight

Cutter Fellow Tim Lister, known for his expertise in the areas of risk management and IT project critical success factors, such as teams, methods, human capital, complex organizational interfaces, interpersonal skills, and conflict resolution, can assist your enterprise with risk management oversight and guidance.


Risk Management Assessment

Tim Lister

The Risk Management Assessment, created by Cutter Fellows Tom DeMarco and Tim Lister focuses on the five core risks common to all software projects:

Scope inflation Innate schedule flaw Personnel turnover Conflict Productivity variation,

plus the risks that are unique to the project being assessed.


Project Office Development

Project Office Development Consulting

A results-oriented Project Office can add tremendous value to your organization, allowing you to identify, implement, and integrate a strategy that focuses on your top software projects. Our Senior Consultants will work with you to design, build, and implement an independent Project Office that will enable you to consistently collect data, analyze it, and present the results.


Project Chartering

Project Chartering

An effective project chartering session is the best way to ensure that a project gets started correctly. Cutter's project chartering sessions help establish a project's team values, vision, mission, objectives, project community, measures of success, scope and boundaries, committed resources, and working agreements. The process is extremely effective in building the team community.


Outsourcing Implementation Support

Outsourcing Implementation Support Consulting

The Consortium is prepared to help you throughout the lifetime of your sourcing agreement. We can help negotiate the contract, renegotiate to incorporate changes in scope, and our team can serve as a mediator, if necessary. We'll provide you guidance and make recommendations about appropriate measures and milestones, service level agreements, and statements of work.


Organizational Development Assessments

Capitalize on the Strengths of Your Organization

IT Organizational Assessments examine the strengths and weaknesses of your organization so you can capitalize on the former and correct the latter. Senior Consultants conduct extensive interviews with IT and with business management. Findings and analysis can be presented in a wrap-up session to participants, summarized in a written report, and/or delivered to your Board of Directors and/or senior executives.