Game-Changing Guidance from Cutter Consortium’s Global Team of Experts
From onsite consulting to executive education and coaching, Cutter’s Business Technology & Digital Transformation Strategies experts are helping organizations worldwide grapple with digital strategy, technology-empowered business strategy, IT strategy and implementation, leadership, risk management, change management, and sustainable innovation.
Optimization Review
The Optimization Review, typically two days, is designed to identify the most promising opportunities for change by identifying what separates a company from the norm. This unique approach, developed by Tom DeMarco and Tim Lister, is designed to finesse change resistance, and has proven repeatedly to be both a tremendous morale-builder and an extremely effective change mechanism.
Offshore Due Diligence
The offshore outsourcing specialists on Cutter Consortium's team are prepared to lead trips to India, Poland, or other countries, for client companies that are investigating offshore opportunities.
Negotiating Complex Deals
Steering complex deals requires fine-tuned negotiation skills — skills most IT executives are not trained in. But Cutter Senior Consultant Sara Cullen is. With a doctorate in contracts and the experience of assisting more than 140 deals, you could not put a better expert on your team than Sara Cullen.
Metrics Program Development
Take advantage of the opportunity to take a more thorough look at how efficient and productive your software development efforts are ... and can be.
Knowledge Management Assessments
Our Senior Consultants help you determine where and how to target your knowledge management efforts, and help you outline a program to measure those efforts.
IT Strategic Planning
Cutter Consortium will help you put a strategic planning process and a strategic plan in place.
IT Governance and Board Level Oversight of IT
Get guidance in establishing and operating an IT Oversight Committee, and/or have Cutter's independent experts sit on your existing committee.
Information Security and Privacy Training and Awareness
Create an information security and privacy program for your organization that is not only designed solely upon your its specific concerns, but takes into account the learners needs of those in your organization: their expectations, learning styles, time commitments, job responsibilities, learning levels and objectives.
Financial Management of Information Technology
This engagement equips business executives, CIOs, IT executives, IT financial managers, and CFOs with the tools and processes they need to answer the following questions:
EA Maturity Assessment
Through a qualitative and quantitative evaluation of your architecture and organization, Cutter's maturity assessment program provides a relative comparison of the organization to industry norms and identifies strengths and areas needing attention.