Business Transformation Requires Transformational Leaders

Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans — you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.

Subscribe to Arthur D. Little's Culture & Leadership Newsletter

Insight

Projects are an integral part of business. In this fast-paced, ever-changing business world, doing projects well is crucial. To clarify what I mean by "project" in the accompanying Executive Report: a project is a planned set of actions taken to improve a business process or to implement a new business process.

E-project management (EPM) has been defined as the management of projects that are large and mission-critical but involve the use of novel tools and processes required to address turbulent business and technology environments (see Cutter Consortium's e-Project Management -- now known as Agile Project Management -- Executive Report, Vol. 1, No. 1). In this Update, we'll be examining EPM primarily as it applies to managing large-scale, advanced software projects.

Note: The present Council Opinion is the second of three on the subject of a pandemic -- an extensive disruption of our information infrastructure due to natural or malicious causes. The overall assertion is that such a pandemic is likely in our near future and that companies, governments, and economies need to take steps to buffer themselves from pandemic effects. For the first article in this series, see Council Opinion, Vol. 2, No. 10.

Domain

Security

Editor's note: Attacks on information infrastructures are increasing, and consumers and companies are especially watchful for the best protective measures to strengthen cyber-security. Discussions on cyber-threats often give rise to the following questions: What are the symptoms of criminal activity? What routines are advised for early detection of attacks?

Cutter Consortium recently conducted a survey regarding litigation experiences in IT. In this Executive Update, I will present these survey results as they confirm anecdotal accounts and general impressions. Of the respondents, 78% had been involved in a dispute that had ended in litigation (see Figure 1).