Consulting by the Business Technology & Digital Transformation Strategies Team

You are here

Get Game-Changing Guidance from Cutter Consortium’s Global Team of Experts

Through a variety of services that range from onsite consulting to executive education and coaching, Cutter’s Business Technology & Digital Transformation Strategies experts are helping organizations worldwide grapple with technology strategy, technology-empowered business strategy, IT strategy and implementation, leadership, risk management, change management, and sustainable innovation.


Third-Party Security and Privacy Program Reviews

It is critical to know that the organizations to whom your organization has entrusted its data handling and processing functions have sound and effective information security and privacy programs.


Technology Tool Watches

The Consortium's Senior Consultants deliver the required objectivity, providing you with an analysis of the tool investments you are considering, and some you may not have considered, making recommendations based on your organization's needs and abilities.


Strategy Meeting Facilitation

Cutter Senior Consultants and Fellows are experts at facilitating both business and IT strategy sessions.


Strategic Planning Team Augmentation

If extreme busyness and/or a reduction of strategic planning staff has left your enterprise without the time or dedicated staff to anticipate future trends and prepare for the effect new developments will have on it, Cutter Consortium's Fellows and Senior Consultants can fill that void


Sourcing Assessments

Cutter's team will then help you identify the appropriate sourcing options and help you derive a short list of potential vendors, including their strengths and weaknesses.


Security Risk Assessment and Review

Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Roadmapping: The T-Plan Approach to Identifying and Exploring Strategic, Innovation and Business Opportunities

Robert Phaal

Dr. Rob Phaal will work with your organization to tailor the S-Plan method to its specific needs and its business context, and help your organization understand how to use roadmaps at the front end of strategy and innovation to support identification and exploration of opportunities and then later to develop and implement strategic plans.


Roadmapping: The S-Plan Approach to Identifying and Exploring Strategic, Innovation and Business Opportunities

Robert Phaal

Learn how to use a powerful, structured framework approach to address three key questions every organization must continuously consider: Where do we want to go? Where are we now? How can we get there?


Risk Management Oversight

Tim Lister

Get assistance and ongoing support risk management oversight and guidance for your enterprise.


Risk Management Assessment

Tim Lister

By framing the questions explicitly in terms of a worst case; switching perspectives and allowing people to describe the best case; examining blame-free, blameworthy, and partial failures, and employing additional techniques, Tim Lister is able to overcome the hesitation that prevents most people in most companies from articulating many risks they are aware of.


Outsourcing Implementation Support

The Consortium is prepared to help you throughout the lifetime of your sourcing agreement.


Organizational Development Assessments

IT Organizational Assessments examine the strengths and weaknesses of your organization so you can capitalize on the former and correct the latter.


Optimization Review

Tim Lister

The Optimization Review, typically two days, is designed to identify the most promising opportunities for change by identifying what separates a company from the norm. This unique approach, developed by Tom DeMarco and Tim Lister, is designed to finesse change resistance, and has proven repeatedly to be both a tremendous morale-builder and an extremely effective change mechanism.


Offshore Due Diligence

The offshore outsourcing specialists on Cutter Consortium's team are prepared to lead trips to India, Poland, or other countries, for client companies that are investigating offshore opportunities.


Negotiating Complex Deals

Sara Cullen

Steering complex deals requires fine-tuned negotiation skills — skills most IT executives are not trained in. But Cutter Senior Consultant Sara Cullen is. With a doctorate in contracts and the experience of assisting more than 140 deals, you could not put a better expert on your team than Sara Cullen.


Metrics Program Development

Take advantage of the opportunity to take a more thorough look at how efficient and productive your software development efforts are ... and can be.


IT Strategic Planning

Cutter Consortium will help you put a strategic planning process and a strategic plan in place.


IT Governance and Board Level Oversight of IT

Get guidance in establishing and operating an IT Oversight Committee, and/or have Cutter's independent experts sit on your existing committee.