Business Transformation Requires Transformational Leaders

Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans — you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.

Subscribe to Arthur D. Little's Culture & Leadership Newsletter

Insight

Everyone is talking about big changes in IT. They are indeed big -- bigger, in fact, than the ones we discussed before the dot-com bubble exploded. What are you going to do about them?

FIVE AREAS FOR IMMEDIATE ATTENTION

Here are five areas that require your immediate attention:

  1. Devices

  2. Software

Last year, I wrote an Advisor titled "Jumping the Walrus: When Risk Management Goes Bad" (1 July 2010), which discussed the systemic risk management blunders by BP and the oil industry in general that came to light in the aftermath of the

With the explosion of data and computing devices over the past decade and the about-to-explode iPad-like consumer device market, it is unsurprising that a vigorous debate about how people should use or not use data and computers has ensued.

Excellence is an old topic, more honored in a book than observed in the workplace. Nonetheless, it is an important topic because of some almost unbearable forces that are shearing the workplace.

There is growing apprehension among business leaders, economists, and ordinary Americans that we are witnessing what may well be the largest outmigration of nonmanufacturing jobs in the history of the US economy.

-- Askok Bardhan and Cynthia Kroll

Abstract

This Executive Report by Sebastian Konkol presents one type of advanced information access control: Chinese Wall security policy (CWSP).

In today's business realities, there are circumstances in which traditionally employed information access schemas are incapable of securing information against breaches. Such a class of problems can be identified as sensitive information security related to conflict of interests.

In this issue of Cutter Benchmark Review, we consider the future of customer relationships, the management of those relationships, and the role that IT and the IT shop can play in the evolution of effective customer relationship management (CRM). Right off the bat it's important to ponder some questions that are fundamental to how we understand, on the most basic level, the dynamic and structure of the relationships we have with our customers. Think about the following for a moment: In today's world, is it really possible (or even desirable) to "own" a customer anymore? How is our present use of IT aiding our relationships with our customers? And in the current environment of data overload and incredible accessibility of information and services, is it possible (or even wise) to expect consumers to continue to relinquish control of what is truly theirs, namely, their own personal information?