Consulting

You are here

Put Cutter's Experts to Work on Your Challenges

Cutter has no off-the-shelf consulting solutions — we view each assignment as unique, assembling a team custom-fit for your requirements, culture, budget, and business drivers. From business technology strategy development to enterprise architecture assessments, digital business transformation, to developing a customized software development framework, Cutter's experts deliver powerful solutions. See sample Cutter Consulting offerings by selecting one or any of the practice areas below.

Consulting

Select specific practice areas by using the drop down list.

Security and Privacy Policies, Procedures, Standards and Guidelines

Rebecca Herold

Rebecca Herold will create Security and Privacy Policies, Procedures, Standards and Guidelines policies, procedures, standards and guideline for your organization.


Technology Tool Watches

The Consortium's Senior Consultants deliver the required objectivity, providing you with an analysis of the tool investments you are considering, and some you may not have considered, making recommendations based on your organization's needs and abilities.


Security Implementation and Operations

We can help you install and configure applications, deploy security systems as well as intrusion detection systems. Our operations support services include firewall and critical infrastructure management, incident response, system administration. If desired, we can even serve as acting-Chief Security Officer (CSO) while you conduct a search.


Vendor Selection

Cutter's team can help you write RFPs that will elicit proposals that meet your requirements. We'll help evaluate the proposals that result from the RFP and make recommendations based on those proposals and our experience with similar sourcing and/or large software/hardware deals


Information Security and Privacy Training and Awareness

Rebecca Herold

Create an information security and privacy program for your organization that is not only designed solely upon your its specific concerns, but takes into account the learners needs of those in your organization: their expectations, learning styles, time commitments, job responsibilities, learning levels and objectives.


Risk Management Oversight

Tim Lister

Get assistance and ongoing support risk management oversight and guidance for your enterprise.


Third-Party Security and Privacy Program Reviews

It is critical to know that the organizations to whom your organization has entrusted its data handling and processing functions have sound and effective information security and privacy programs.


Risk Management Assessment

Tim Lister

By framing the questions explicitly in terms of a worst case; switching perspectives and allowing people to describe the best case; examining blame-free, blameworthy, and partial failures, and employing additional techniques, Tim Lister is able to overcome the hesitation that prevents most people in most companies from articulating many risks they are aware of.


Helping Organziations Leverage Social Networks Internally

Determine how employees are using social networks now and the tools they are relying on, refine your strategy to ensure it supports company objectives, and devise a plan so that employees transition to company tools and adopt them in a way that guarantees bottom line benefits.


Emerging Technologies Watch

Steve Andriole

This single-session or retainer consulting engagement will put your IT team on track to put winning technologies into action first to gain a clear competitive edge.


Information Security Assessment

Cutter Consortium's information security assessment will help you determine how secure your organization is today, and identify areas that are vulnerable to security breaches.


EA Maturity Assessment

Through a qualitative and quantitative evaluation of your architecture and organization, Cutter's maturity assessment program provides a relative comparison of the organization to industry norms and identifies strengths and areas needing attention.


Business Intelligence Strategy

Our Senior Consultants consider your business needs as well as your infrastructure requirements, and help you prioritize them based on criticality and potential return on investment (ROI). We'll help you develop a governance structure for your business intelligence initiative that includes prioritization, funding of projects, and resolution of conflict -- and we'll guide you through the necessary steps to develop an implementation strategy.


Due Diligence for Mergers & Acquisitions

Steve Andriole

Cutter Consortium Fellow Steve Andriole has developed a framework that can be used to conduct formal M&A technology due diligence. The framework addresses all aspects of the technology environment, and accommodates criteria weighting, among other methodological capabilities.


Architecture Review and Action Plan

The Architecture Review and Action Plan provides an in-depth evaluation of your enterprise's architecture. It takes an architectural approach to addressing specific questions and concerns that you may have. It is intended to clarify business, application, and technology discussions and help your organization make specific technology decisions.


Strategic Planning Team Augmentation

If extreme busyness and/or a reduction of strategic planning staff has left your enterprise without the time or dedicated staff to anticipate future trends and prepare for the effect new developments will have on it, Cutter Consortium's Fellows and Senior Consultants can fill that void


IT Governance and Board Level Oversight of IT

Get guidance in establishing and operating an IT Oversight Committee, and/or have Cutter's independent experts sit on your existing committee.


IT Strategic Planning

Cutter Consortium will help you put a strategic planning process and a strategic plan in place.


Project Chartering

An effective project chartering session is the best way to ensure that a project gets started correctly. Cutter's project chartering sessions help establish a project's team values, vision, mission, objectives, project community, measures of success, scope and boundaries, committed resources, and working agreements.


Knowledge Management Assessments

Our Senior Consultants help you determine where and how to target your knowledge management efforts, and help you outline a program to measure those efforts.


Value Project Portfolio Management

Bob Benson

Every IT project should deliver business value. The challenge is that traditional project management and PMOs focus on "on time" and "on budget," not achievement of business value. Cutter's Value Project Portfolio Management (Value-PPM) approach ensures organizations achieve all three goals.


Litigation Support for Software Intensive Projects

Tim Lister

Let Cutter help you with vetting potential partners, understanding and quantifying schedules, requirements, specs, and risk management before signing contracts, to successfully prosecuting or defending against an IT-related lawsuit.


Pages