Consulting

You are here

Put Cutter's Experts to Work on Your Challenges

Cutter has no off-the-shelf consulting solutions — we view each assignment as unique, assembling a team custom-fit for your requirements, culture, budget, and business drivers. From business technology strategy development to enterprise architecture assessments, digital business transformation, to developing a customized software development framework, Cutter's experts deliver powerful solutions. See sample Cutter Consulting offerings by selecting one or any of the practice areas below.

Consulting

Select specific practice areas by using the drop down list.

Software Development Analytics

Murray Cantor

Cutter’s modern analytics in software development consulting, led by Cutter Senior Consultant Dr. Murray Cantor, delivers real-time knowledge about your software development operation and the adjustments you can make to deliver optimal business value — whether the goal is better financial outcomes, faster time to market, or operational efficiency.


Dr. Alexandre Rodrigues

Agile-EVM Performance Measurement Workshop

Alexandre Rodrigues
Measure and Manage Performance in Your Agile Projects

Agile adoption goes hand in hand with abandoning so-called traditional project management. Yet new projects are continously faced with legitimate management questions. Now you can answer these questions with confidence when you adapt the Earned Value Management method (EVM) into your Agile product development process.   


Supporting Go/No-Go Investment Decisions with Technical Due Diligence

For venture capitalists and M&A pros who need to make quick go/no-go investment decisions, we offer a streamlined variant of our Technical and Process Review. What makes it a finely honed tool for evaluating investment decisions?


Technical and Process Review

The Power of Combining Qualitative Assessment with Quantitative Analysis

The fact of the matter is, often times you are at loss as to how to improve your software. You know it needs improving because you can identify the symptoms -- perhaps poor business results, late delivery, inadequate quality or low productivity -- but their root cause is not so clear. What's more, the cause is often the subject of ruthless debate amongst your superiors, peers, and subordinates.


Executive Education: Sample Curriculum

Gather leaders from all areas of your company and spend from a 1/2 day to a week honing the skills and building the teams that will lead your company to the next level. We'll customize a curriculum that combines case studies and lectures taught by Cutter's experts and guest professors from leading b-schools and that will serve as a foundation for clarifying your strategy and its execution.


Independent Contract Reviews

In the middle of negotiating a contract? Not sure if the RFP you're about to put out really covers all your bases? Would an outside expert opinion on the SLAs you're about to agree on make you more comfortable?


Neuroscience-Based Leadership Coaching

Lynne Ellyn

During coaching sessions with Lynne Ellyn, you'll learn how the findings of neuroscience can help you improve team dynamics, foster bright, creative, stimulating environments that excel in innovation and productivity.


Improve Measured Business Performance with Lean

James Sutton

It's easy for a Lean or Agile initiative to get disconnected from the reasons a business exists. James Sutton brings his big picture perspective and wide experience -- from leadership on small teams to billion-dollar programs -- to helping your organization (re)align to improve its business's bottom line. Using James' approach, your organization will decrease waste by improving value and flow.


Radical Management

Radical Management applies Agile-like principles to the organizational level.


Architecture for the Cloud

Claude Baudoin

Cutter Consortium's Senior Consultants will help architect your enterprise for the cloud to addresses the entire range of issues including integration, semantics, security, data integrity, reliability, DR/BCP. Plus, we'll help you create and describe a framework that includes accountability and responsibility to govern cloud adoption.


Managing Your Application Portfolio

Bob Benson

Cutter Senior Consultant Bob Benson has developed a tested approach to managing the application portfolio as a result of assisting dozens of client companies define and implement successful application portfolio management programs.


Cost Reduction Roadmap for IT

Bob Benson

To help IT executives identify "hidden" areas for cost reduction, Cutter Consortium Fellow Bob Benson's Cost Reduction Roadmap for IT applies time-tested portfolio management principles. This simple roadmap has proven to be an effective framework for IT cost reduction, addressing both project budgets and ongoing IT expense budgets.


Project Office Development

Our Senior Consultants will work with you to design, build, and implement an independent Project Office that will enable you to consistently collect data, analyze it, and present the results.


Security Risk Assessment and Review

Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews.


Sourcing Assessments

Cutter's team will then help you identify the appropriate sourcing options and help you derive a short list of potential vendors, including their strengths and weaknesses.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Technology Tool Watches

The Consortium's Senior Consultants deliver the required objectivity, providing you with an analysis of the tool investments you are considering, and some you may not have considered, making recommendations based on your organization's needs and abilities.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Vendor Selection

Cutter's team can help you write RFPs that will elicit proposals that meet your requirements. We'll help evaluate the proposals that result from the RFP and make recommendations based on those proposals and our experience with similar sourcing and/or large software/hardware deals


Information Security and Privacy Training and Awareness

Rebecca Herold

Create an information security and privacy program for your organization that is not only designed solely upon your its specific concerns, but takes into account the learners needs of those in your organization: their expectations, learning styles, time commitments, job responsibilities, learning levels and objectives.


Risk Management Oversight

Tim Lister

Get assistance and ongoing support risk management oversight and guidance for your enterprise.


Third-Party Security and Privacy Program Reviews

It is critical to know that the organizations to whom your organization has entrusted its data handling and processing functions have sound and effective information security and privacy programs.


Risk Management Assessment

Tim Lister

By framing the questions explicitly in terms of a worst case; switching perspectives and allowing people to describe the best case; examining blame-free, blameworthy, and partial failures, and employing additional techniques, Tim Lister is able to overcome the hesitation that prevents most people in most companies from articulating many risks they are aware of.


Helping Organziations Leverage Social Networks Internally

Determine how employees are using social networks now and the tools they are relying on, refine your strategy to ensure it supports company objectives, and devise a plan so that employees transition to company tools and adopt them in a way that guarantees bottom line benefits.


Information Security Assessment

Cutter Consortium's information security assessment will help you determine how secure your organization is today, and identify areas that are vulnerable to security breaches.


Pages