Put Cutter’s Experts to Work on Your Challenges

Cutter has no off-the-shelf consulting solutions — we view each assignment as unique, assembling a team custom-fit for your requirements, culture, budget, and business drivers. From business technology strategy development to enterprise architecture assessments, digital business transformation, to developing a customized software development framework, Cutter's experts deliver powerful solutions. See sample Cutter Consulting offerings by selecting one or any of the practice areas below.

Agile-EVM Performance Measurement Workshop

Alexandre Rodrigues
Measure and Manage Performance in Your Agile Projects

Agile adoption goes hand in hand with abandoning so-called traditional project management. Yet new projects are continously faced with legitimate management questions. Now you can answer these questions with confidence when you adapt the Earned Value Management method (EVM) into your Agile product development process.   


Supporting Go/No-Go Investment Decisions with Technical Due Diligence

For venture capitalists and M&A pros who need to make quick go/no-go investment decisions, we offer a streamlined variant of our Technical and Process Review. What makes it a finely honed tool for evaluating investment decisions?


Technical and Process Review

The Power of Combining Qualitative Assessment with Quantitative Analysis

The fact of the matter is, often times you are at loss as to how to improve your software. You know it needs improving because you can identify the symptoms -- perhaps poor business results, late delivery, inadequate quality or low productivity -- but their root cause is not so clear. What's more, the cause is often the subject of ruthless debate amongst your superiors, peers, and subordinates.


Independent Contract Reviews

In the middle of negotiating a contract? Not sure if the RFP you're about to put out really covers all your bases? Would an outside expert opinion on the SLAs you're about to agree on make you more comfortable?


Neuroscience-Based Leadership Coaching

Lynne Ellyn

During coaching sessions with Lynne Ellyn, you'll learn how the findings of neuroscience can help you improve team dynamics, foster bright, creative, stimulating environments that excel in innovation and productivity.


Improve Measured Business Performance with Lean

James Sutton

It's easy for a Lean or Agile initiative to get disconnected from the reasons a business exists. James Sutton brings his big picture perspective and wide experience -- from leadership on small teams to billion-dollar programs -- to helping your organization (re)align to improve its business's bottom line. Using James' approach, your organization will decrease waste by improving value and flow.


Radical Management

Radical Management applies Agile-like principles to the organizational level.


Architecture for the Cloud

Claude Baudoin

Cutter Consortium's Senior Consultants will help architect your enterprise for the cloud to addresses the entire range of issues including integration, semantics, security, data integrity, reliability, DR/BCP. Plus, we'll help you create and describe a framework that includes accountability and responsibility to govern cloud adoption.


Managing Your Application Portfolio

Bob Benson

Cutter Senior Consultant Bob Benson has developed a tested approach to managing the application portfolio as a result of assisting dozens of client companies define and implement successful application portfolio management programs.


Cost Reduction Roadmap for IT

Bob Benson

To help IT executives identify "hidden" areas for cost reduction, Cutter Consortium Fellow Bob Benson's Cost Reduction Roadmap for IT applies time-tested portfolio management principles. This simple roadmap has proven to be an effective framework for IT cost reduction, addressing both project budgets and ongoing IT expense budgets.


Offshore Due Diligence

The offshore outsourcing specialists on Cutter Consortium's team are prepared to lead trips to India, Poland, or other countries, for client companies that are investigating offshore opportunities.


Optimization Review

Tim Lister

The Optimization Review, typically two days, is designed to identify the most promising opportunities for change by identifying what separates a company from the norm. This unique approach, developed by Tom DeMarco and Tim Lister, is designed to finesse change resistance, and has proven repeatedly to be both a tremendous morale-builder and an extremely effective change mechanism.


Organizational Development Assessments

IT Organizational Assessments examine the strengths and weaknesses of your organization so you can capitalize on the former and correct the latter.


Security Risk Assessment and Review

Cutter Consortium is available for risk assessments, network assessments, application reviews, security-oriented design reviews, site and facility surveys, and configuration or source code reviews.


Outsourcing Implementation Support

The Consortium is prepared to help you throughout the lifetime of your sourcing agreement.


Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Project Office Development

Our Senior Consultants will work with you to design, build, and implement an independent Project Office that will enable you to consistently collect data, analyze it, and present the results.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Sourcing Assessments

Cutter's team will then help you identify the appropriate sourcing options and help you derive a short list of potential vendors, including their strengths and weaknesses.


Information Security and Privacy Training and Awareness

Rebecca Herold

Create an information security and privacy program for your organization that is not only designed solely upon your its specific concerns, but takes into account the learners needs of those in your organization: their expectations, learning styles, time commitments, job responsibilities, learning levels and objectives.


Vendor Selection

Cutter's team can help you write RFPs that will elicit proposals that meet your requirements. We'll help evaluate the proposals that result from the RFP and make recommendations based on those proposals and our experience with similar sourcing and/or large software/hardware deals


Third-Party Security and Privacy Program Reviews

It is critical to know that the organizations to whom your organization has entrusted its data handling and processing functions have sound and effective information security and privacy programs.


Risk Management Oversight

Tim Lister

Get assistance and ongoing support risk management oversight and guidance for your enterprise.


Risk Management Assessment

Tim Lister

By framing the questions explicitly in terms of a worst case; switching perspectives and allowing people to describe the best case; examining blame-free, blameworthy, and partial failures, and employing additional techniques, Tim Lister is able to overcome the hesitation that prevents most people in most companies from articulating many risks they are aware of.


Due Diligence for Mergers & Acquisitions

Steve Andriole

Cutter Consortium Fellow Steve Andriole has developed a framework that can be used to conduct formal M&A technology due diligence. The framework addresses all aspects of the technology environment, and accommodates criteria weighting, among other methodological capabilities.