SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
© The Economist Intelligence Unit Limited 20161
A report from The Economist Intelligence Unit
The path to self-disruption
Nine steps of a digital transformation
journey
Digital disruption is a top-of-mind issue in the C-suites of every industry. Senior
executives of traditional firms are looking over their shoulders and wondering if their
firms will be the next to be “Ubered” or “Amazoned.” Far-sighted executives are asking
how they can disrupt themselves by creating a new digital business—and responding
with their own digital transformation journey.
Journeys demand roadmaps, and execution requires deadlines. While each business’s
transition will be unique and complex, it may be helpful to present nine key steps that
are consistent across different industries. These are thought starters for those who are
planning to disrupt themselves and launch their own digital journeys.
Sponsored by
Transformation roadmap and timeline
Envision the
end state
Determine where
you are now
Define how you
will get there
1. Design your own
disruptive business
The end-game
business model
Gap analysis and
strength assessment
Determine the
change vehicle
2. Architect the new
technology
Optimal IT
architecture
Legacy technology
audit
IT architecture
buildout
3. Secure the
enterprise
Data security
strategy
Transformation
security
Building security into
transformation
Accelerate the
timeline
6-12 months
© The Economist Intelligence Unit Limited 20162
The path to self-disruption
The nine steps of a digital transformation journey
Design your own disruptive business
The first step is to design the end-game business model—the future enterprise that
technology and data security structures will be designed against.
1.	 Creating the end-game business model: One long-time expert on disruption is
Geoffrey Moore, author of “Crossing the Chasm.” He recently advised, “Every
decade or so you must get your company into one net new line of business that has
exceptionally high revenue growth.”1
This means disruption. However, the future
business model may be such a radical departure from the business that the
planning process may not work, and traditional planners may feel threatened by
the results. Here are three starting points:
l	 Begin with your own digital assets. Every company has a series of digital initiatives
already ongoing—these should be catalogued, reviewed, and used as the
starting base.
l	 Begin a process of innovation to design the new model. The use of cloud
capabilities can provide an environment in which experimentation can be rapid
and failure can be low-cost. This can enable a process of continuing, innovative
transformation.
l	 Finally, a useful model for future digital business may be the very insurgents that
are driving transformation in the first place. In 2015, the EIU asked 350 bankers2
what they thought were the most valuable competitive advantages of their
digital challengers. Here are the key findings.
These are attributes that these traditional firms will need to build into their digital
business model. If you need to disrupt your own business, look to those who are trying to
disrupt you from the outside for a blueprint.
1	 Zone to Win: Organizing to Compete in an Age of Disruption, 2015
2	 The Disruption of Banking, Economist Intelligence Unit, October 2015.
Banks’ assessment of the competitive strengths of disruptive insurgents
% citing very or somewhat important, 2015
Agility and speed to market
Capacity to innovate
Lower cost structure
Absence of legacy systems
Focus on single product
Source: Economist Intelligence Unit survey, 2015
87
87
84
72
64
© The Economist Intelligence Unit Limited 20163
The path to self-disruption
The nine steps of a digital transformation journey
2.	 Gap analysis and strength assessment: The legacy firm does not start from a blank
slate—the second step is to assess its current assets and liabilities against the future
business model.
	 Much of today’s dialogue on disruption focuses on the weaknesses of traditional
firms—legacy technologies, inability to attract tech talent, etc. But the traditional
firm should not underestimate the strengths it brings to the table.
	 “Some firms have almost an inferiority complex when dealing with digital disruption,”
says Scott Sparks, a partner at the Proxima Group, a disruptive firm that provides
digitized alternatives to traditional procurement departments. “These are
companies that bring enormous assets to the table—big customer bases, big brand
names, regulatory approvals. These are strengths that they can build into their new
digital businesses.”
3.	 Execution—vehicle for digital change: The final step is execution. Some traditional
firms are turning to acquisitions and partnerships as a vehicle for digital change.
	 Often incumbents struggle to build new cultures and businesses, particularly those
that threaten the existing franchise. New insurgents—for all of their hubris—often
need the assets and branding of their larger competitors to break out from their
many rivals. Finally, combination with the insurgent challenger can accelerate
time-to-market for the new enterprise—a critical advantage in the digital space.
	 In its research on disruption, the EIU found that 45 percent of traditional firms and 53
percent of digital challengers believed that the best strategy was for them to join
forces as partners or acquisitions. Digital disruption is not always a zero-sum
game—a combination of forces may be the best and fastest route forward.
Architect the new technology
Disrupting your firm therefore requires the creation of a new architecture structured for
a new business.
4.	 Defining the optimal IT architecture: The central choice in self-disruption is whether
and how many applications should be shifted to the cloud. After all, many of the
new disruptive firms are premised on the low costs and technical agility that cloud
can provide. Some providers depict this as a stark cloud versus on-premise decision.
	 This is a false choice. Each firm will make its own decision on public, private, and
on-premise solutions according to its business and security needs. This hybrid solution
is not a compromise—it is a means of combining cloud agility with traditional IT
predictability.
5.	 The legacy technology audit: Once the end game is defined, the incumbent must
examine its current networks, processes, and personnel not only as assets but as
liabilities. For example, early technology leaders such as insurance companies and
airlines find that their proprietary, server-based systems are holding them back.
© The Economist Intelligence Unit Limited 20164
The path to self-disruption
The nine steps of a digital transformation journey
	 What were once constraints are now becoming serious liabilities as nimble, cloud-
based insurgents challenge traditional firms for the market. Incumbents must identify
their technology liabilities and make plans to replace them where necessary.
6.	 Building out the IT architecture: As firms redesign their technology, an emerging
model is that of “dual-speed IT.”
	 Legacy firms often find they cannot abandon the legacy technologies that house
their customer lists, product information, and back-office systems. At the same time
their customers, whose digital expectations have been set by Amazon and
Facebook, are expecting nothing less than an outstanding digital interface.
	 A practical result of the audit is the emergence of co-existing IT architectures—dual-
speed IT. “Organizations need to overhaul their support model to adjust to this new
paradigm. A critical element is recognizing that IT needs two speeds of service
delivery,” says Antoine Gourevitch, managing partner at the Boston Consulting
Group.3
While this model will present significant integration challenges, it is a
practical solution to the back-office realities of many firms.
Secure the enterprise
The world is a dangerous place, and in technology it is becoming more dangerous. The
fluid nature of the transformation journey presents risks during the journey but also an
opportunity to improve overall security standards.
7.	 Setting the data security strategy: The EIU asked 700 firms, split equally between
traditional firms and digital disruptors, what the greatest challenge was in the digital
journey. They said data security is No. 1.
	 A data security strategy must be designed not for the present, but for the future
business and the projected level of threats. This requires a new degree of flexibility
and scalability in security strategies. Data security used to consist of high firewalls
and locking down the firm. With the increased sophistication and frequency of
cyber attacks, it is accepted that the bad guys are going to get in. The new security
must have the flexibility to be scaled up and modified for the cyber risk of tomorrow,
which can only be expected to escalate and become more sophisticated.
8.	 Maintaining security during transformation: The transformation journey is a period of
elevated data security risk. By its nature, transformation brings new entities—some of
which may not have equivalent standards—within the firewalls. New devices, new
networks, and new employees all present potential entry points. These require an
aggressive data security program that keeps pace with and is an essential part of
the journey.
3	 Two-Speed IT: A Linchpin for Success in a Digitized World, Boston Consulting Group, 2012.
© The Economist Intelligence Unit Limited 20165
The path to self-disruption
The nine steps of a digital transformation journey
9.	 Transformation as an opportunity: Just as the transformation stage presents risk, it
also presents an opportunity to escalate the security standards of the enterprise.
	 In most legacy firms, security consists of passwords, firewalls, and software and
remains the domain of the IT professionals. But with the new sophistication and
frequency of attacks, security needs to be woven into the fabric of the entire
enterprise. Disruption can be turned into an advantage in data security. It provides
an opportunity to integrate standards into every part of the firm.
Accelerate the timeline for disruption
Clearly there is no “right” schedule for setting up a new digital business—every firm and
industry will dictate its own.
But one element is clear: The agility of the new disruptors and the potential agility of
your competitors mean that digital transformation cannot be business as usual. “One
thing is for sure. Your new digital competition is going to make you move fast. I would
say most business transformations should take place between six and 12 months,”
Sparks says.
This is light-speed for setting up a new business. But there are certain characteristics of
the digital world that can enable a faster than usual approach:
l	 Take advantage of agile new technologies—cloud, hybrid cloud, virtualized
systems—that present lower development times and allow rapid modification.
l	 Co-opt the insurgents: Absorbing your most potent digital competitors can bring a
ready-made business model, culture, and employees into your enterprise.
l	 Select and engage strong partners. It is a reality that your current personnel may not
have the experience or incentive to create the new business; outside resources can
bring expertise and resources to bear.
Summary
We live in an era where technology enables new businesses to come to market faster
and cheaper than ever before. A digitally transformed company can speed its time to
market, operate from a lower cost basis, and out-innovate its competition.
But this kind of transition will not occur in an overnight big bang. The process must be
deliberate, modular, planned, and built into an aggressive timeline. That is the reality of
self-disruption and of the digital transformation journey.

Contenu connexe

Tendances

Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and CompliancePECB
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk managementRamana K V
 
A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...Hassan Zaitoun
 
Enterprise risk management february 9th solution training
Enterprise risk management february 9th   solution trainingEnterprise risk management february 9th   solution training
Enterprise risk management february 9th solution trainingveritama
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCBill Graham CP.APMP
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityJeff B
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceResolver Inc.
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackContinuity and Resilience
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
Busines Continuity And Compliance
Busines Continuity And ComplianceBusines Continuity And Compliance
Busines Continuity And Compliancesalamali
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field Resolver Inc.
 

Tendances (20)

Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and Compliance
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
Risk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and ImplementationRisk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and Implementation
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk management
 
A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...A structured approach to Enterprise Risk Management (ERM) and the requirement...
A structured approach to Enterprise Risk Management (ERM) and the requirement...
 
Enterprise risk management february 9th solution training
Enterprise risk management february 9th   solution trainingEnterprise risk management february 9th   solution training
Enterprise risk management february 9th solution training
 
Ten Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRCTen Slides in Ten Minutes - Company Realities - GRC
Ten Slides in Ten Minutes - Company Realities - GRC
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
 
Coso erm frmwrk
Coso erm frmwrkCoso erm frmwrk
Coso erm frmwrk
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management Creating Value Through Enterprise Risk Management
Creating Value Through Enterprise Risk Management
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber Attack
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
Busines Continuity And Compliance
Busines Continuity And ComplianceBusines Continuity And Compliance
Busines Continuity And Compliance
 
CISSPills #3.04
CISSPills #3.04CISSPills #3.04
CISSPills #3.04
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 

En vedette

ENCA 2016 - Genoa - Annelies Hoeskstra
ENCA 2016 - Genoa - Annelies HoeskstraENCA 2016 - Genoa - Annelies Hoeskstra
ENCA 2016 - Genoa - Annelies Hoeskstraanton gruss
 
Roca metamórfica
Roca metamórficaRoca metamórfica
Roca metamórficaJuan Soto
 
đêM nhạc một thời để yêu
đêM nhạc một thời để yêuđêM nhạc một thời để yêu
đêM nhạc một thời để yêungoc4410
 
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...Rotary Clube Vizela
 
Reunião º 2 - Assembleia de Clube - dia 9-07-2014
Reunião º 2 - Assembleia de Clube - dia 9-07-2014Reunião º 2 - Assembleia de Clube - dia 9-07-2014
Reunião º 2 - Assembleia de Clube - dia 9-07-2014Rotary Clube Vizela
 
Portaiture ppt
Portaiture pptPortaiture ppt
Portaiture pptHari Khan
 
Boyne Highlands Recomendation
Boyne Highlands RecomendationBoyne Highlands Recomendation
Boyne Highlands RecomendationGabriel Caetano
 
Diploma Fontys Applied Science
Diploma Fontys Applied ScienceDiploma Fontys Applied Science
Diploma Fontys Applied ScienceWesley Ketelaars
 
TWMS Cover DRAFT
TWMS Cover DRAFTTWMS Cover DRAFT
TWMS Cover DRAFTLaura Noe
 
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015Rotary Clube Vizela
 
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014Rotary Clube Vizela
 
Decongestion of Zomba Central hospital_Final
Decongestion of Zomba Central hospital_FinalDecongestion of Zomba Central hospital_Final
Decongestion of Zomba Central hospital_FinalGrevasio Chamatambe
 
Making a Difference to The Healthcare Delivery System - David S. Muntz
Making a Difference to The Healthcare Delivery System - David S. MuntzMaking a Difference to The Healthcare Delivery System - David S. Muntz
Making a Difference to The Healthcare Delivery System - David S. Muntzscoopnewsgroup
 

En vedette (20)

ENCA 2016 - Genoa - Annelies Hoeskstra
ENCA 2016 - Genoa - Annelies HoeskstraENCA 2016 - Genoa - Annelies Hoeskstra
ENCA 2016 - Genoa - Annelies Hoeskstra
 
Roca metamórfica
Roca metamórficaRoca metamórfica
Roca metamórfica
 
Recurso Tecnologico
Recurso TecnologicoRecurso Tecnologico
Recurso Tecnologico
 
đêM nhạc một thời để yêu
đêM nhạc một thời để yêuđêM nhạc một thời để yêu
đêM nhạc một thời để yêu
 
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...
Reunião nº 46 – Empreendedorismo no Sector Imobiliário por Agostinho Sousa– d...
 
BVEx Research: Open Data Unlocked
BVEx Research: Open Data UnlockedBVEx Research: Open Data Unlocked
BVEx Research: Open Data Unlocked
 
Reunião º 2 - Assembleia de Clube - dia 9-07-2014
Reunião º 2 - Assembleia de Clube - dia 9-07-2014Reunião º 2 - Assembleia de Clube - dia 9-07-2014
Reunião º 2 - Assembleia de Clube - dia 9-07-2014
 
Portaiture ppt
Portaiture pptPortaiture ppt
Portaiture ppt
 
Boyne Highlands Recomendation
Boyne Highlands RecomendationBoyne Highlands Recomendation
Boyne Highlands Recomendation
 
Prevision samedi 19avril2014
Prevision samedi 19avril2014Prevision samedi 19avril2014
Prevision samedi 19avril2014
 
Diploma Fontys Applied Science
Diploma Fontys Applied ScienceDiploma Fontys Applied Science
Diploma Fontys Applied Science
 
TWMS Cover DRAFT
TWMS Cover DRAFTTWMS Cover DRAFT
TWMS Cover DRAFT
 
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015
Reunião nº 42 – Trabalho e Companheirismo – dia 15-04-2015
 
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014
Reunião nº 6 - Trabalho e Companheirismo - dia 06-08-2014
 
CV BISWAJIT New
CV BISWAJIT NewCV BISWAJIT New
CV BISWAJIT New
 
Sociocognitivos
SociocognitivosSociocognitivos
Sociocognitivos
 
Q14 cat - Guia d’iniciatives locals cap a la transició energètica als polígon...
Q14 cat - Guia d’iniciatives locals cap a la transició energètica als polígon...Q14 cat - Guia d’iniciatives locals cap a la transició energètica als polígon...
Q14 cat - Guia d’iniciatives locals cap a la transició energètica als polígon...
 
Decongestion of Zomba Central hospital_Final
Decongestion of Zomba Central hospital_FinalDecongestion of Zomba Central hospital_Final
Decongestion of Zomba Central hospital_Final
 
Making a Difference to The Healthcare Delivery System - David S. Muntz
Making a Difference to The Healthcare Delivery System - David S. MuntzMaking a Difference to The Healthcare Delivery System - David S. Muntz
Making a Difference to The Healthcare Delivery System - David S. Muntz
 
7190
71907190
7190
 

Similaire à The Path to Self-Disruption

The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Solving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategySolving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategyThe Economist Media Businesses
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...Rick Bouter
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformationPaula Calvo Lopez
 
Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Fabio Mittelstaedt
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
Digital strategy during coronavirus crisis
Digital strategy during coronavirus crisisDigital strategy during coronavirus crisis
Digital strategy during coronavirus crisisAgileTech Vietnam
 
VMware Business Agility and the True Economics of Cloud Computing
VMware Business Agility and the True Economics of Cloud ComputingVMware Business Agility and the True Economics of Cloud Computing
VMware Business Agility and the True Economics of Cloud ComputingVMware
 
Mc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMarco Crudo
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 
The power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationThe power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationIBM Software India
 
Digital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCHDigital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCHTom Rieger
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
 

Similaire à The Path to Self-Disruption (20)

The path to self-disruption
The path to self-disruptionThe path to self-disruption
The path to self-disruption
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Solving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategySolving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategy
 
201605 R&P on Digitization
201605 R&P on Digitization201605 R&P on Digitization
201605 R&P on Digitization
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...
 
Governance: a central component of successful digital transformation
Governance:  a central component of successful digital transformationGovernance:  a central component of successful digital transformation
Governance: a central component of successful digital transformation
 
Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Digital strategy during coronavirus crisis
Digital strategy during coronavirus crisisDigital strategy during coronavirus crisis
Digital strategy during coronavirus crisis
 
VMware Business Agility and the True Economics of Cloud Computing
VMware Business Agility and the True Economics of Cloud ComputingVMware Business Agility and the True Economics of Cloud Computing
VMware Business Agility and the True Economics of Cloud Computing
 
Mc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insurance
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Digital decodedv1.1
Digital decodedv1.1Digital decodedv1.1
Digital decodedv1.1
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 
The power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationThe power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovation
 
Digital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCHDigital Transformation and Application Decommissioning - THE RESEARCH
Digital Transformation and Application Decommissioning - THE RESEARCH
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
 

Plus de Hewlett Packard Enterprise Business Value Exchange

Plus de Hewlett Packard Enterprise Business Value Exchange (20)

To Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket ScientistTo Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket Scientist
 
Manufacturing Forum 2016
Manufacturing Forum 2016Manufacturing Forum 2016
Manufacturing Forum 2016
 
Connecting the manufacturing industry
Connecting the manufacturing industryConnecting the manufacturing industry
Connecting the manufacturing industry
 
Getting to your hybrid future
Getting to your hybrid futureGetting to your hybrid future
Getting to your hybrid future
 
Technology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmesTechnology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmes
 
Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure
 
FSI Key Propositions
FSI Key PropositionsFSI Key Propositions
FSI Key Propositions
 
Happy Employees Lead to Happy Customers
Happy Employees Lead to Happy CustomersHappy Employees Lead to Happy Customers
Happy Employees Lead to Happy Customers
 
How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
Realising Potential - The Dandelion Program
Realising Potential - The Dandelion ProgramRealising Potential - The Dandelion Program
Realising Potential - The Dandelion Program
 
FinTech Innovation Model 2015
FinTech Innovation Model 2015FinTech Innovation Model 2015
FinTech Innovation Model 2015
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Awareness is only the first step
Awareness is only the first stepAwareness is only the first step
Awareness is only the first step
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

The Path to Self-Disruption

  • 1. © The Economist Intelligence Unit Limited 20161 A report from The Economist Intelligence Unit The path to self-disruption Nine steps of a digital transformation journey Digital disruption is a top-of-mind issue in the C-suites of every industry. Senior executives of traditional firms are looking over their shoulders and wondering if their firms will be the next to be “Ubered” or “Amazoned.” Far-sighted executives are asking how they can disrupt themselves by creating a new digital business—and responding with their own digital transformation journey. Journeys demand roadmaps, and execution requires deadlines. While each business’s transition will be unique and complex, it may be helpful to present nine key steps that are consistent across different industries. These are thought starters for those who are planning to disrupt themselves and launch their own digital journeys. Sponsored by Transformation roadmap and timeline Envision the end state Determine where you are now Define how you will get there 1. Design your own disruptive business The end-game business model Gap analysis and strength assessment Determine the change vehicle 2. Architect the new technology Optimal IT architecture Legacy technology audit IT architecture buildout 3. Secure the enterprise Data security strategy Transformation security Building security into transformation Accelerate the timeline 6-12 months
  • 2. © The Economist Intelligence Unit Limited 20162 The path to self-disruption The nine steps of a digital transformation journey Design your own disruptive business The first step is to design the end-game business model—the future enterprise that technology and data security structures will be designed against. 1. Creating the end-game business model: One long-time expert on disruption is Geoffrey Moore, author of “Crossing the Chasm.” He recently advised, “Every decade or so you must get your company into one net new line of business that has exceptionally high revenue growth.”1 This means disruption. However, the future business model may be such a radical departure from the business that the planning process may not work, and traditional planners may feel threatened by the results. Here are three starting points: l Begin with your own digital assets. Every company has a series of digital initiatives already ongoing—these should be catalogued, reviewed, and used as the starting base. l Begin a process of innovation to design the new model. The use of cloud capabilities can provide an environment in which experimentation can be rapid and failure can be low-cost. This can enable a process of continuing, innovative transformation. l Finally, a useful model for future digital business may be the very insurgents that are driving transformation in the first place. In 2015, the EIU asked 350 bankers2 what they thought were the most valuable competitive advantages of their digital challengers. Here are the key findings. These are attributes that these traditional firms will need to build into their digital business model. If you need to disrupt your own business, look to those who are trying to disrupt you from the outside for a blueprint. 1 Zone to Win: Organizing to Compete in an Age of Disruption, 2015 2 The Disruption of Banking, Economist Intelligence Unit, October 2015. Banks’ assessment of the competitive strengths of disruptive insurgents % citing very or somewhat important, 2015 Agility and speed to market Capacity to innovate Lower cost structure Absence of legacy systems Focus on single product Source: Economist Intelligence Unit survey, 2015 87 87 84 72 64
  • 3. © The Economist Intelligence Unit Limited 20163 The path to self-disruption The nine steps of a digital transformation journey 2. Gap analysis and strength assessment: The legacy firm does not start from a blank slate—the second step is to assess its current assets and liabilities against the future business model. Much of today’s dialogue on disruption focuses on the weaknesses of traditional firms—legacy technologies, inability to attract tech talent, etc. But the traditional firm should not underestimate the strengths it brings to the table. “Some firms have almost an inferiority complex when dealing with digital disruption,” says Scott Sparks, a partner at the Proxima Group, a disruptive firm that provides digitized alternatives to traditional procurement departments. “These are companies that bring enormous assets to the table—big customer bases, big brand names, regulatory approvals. These are strengths that they can build into their new digital businesses.” 3. Execution—vehicle for digital change: The final step is execution. Some traditional firms are turning to acquisitions and partnerships as a vehicle for digital change. Often incumbents struggle to build new cultures and businesses, particularly those that threaten the existing franchise. New insurgents—for all of their hubris—often need the assets and branding of their larger competitors to break out from their many rivals. Finally, combination with the insurgent challenger can accelerate time-to-market for the new enterprise—a critical advantage in the digital space. In its research on disruption, the EIU found that 45 percent of traditional firms and 53 percent of digital challengers believed that the best strategy was for them to join forces as partners or acquisitions. Digital disruption is not always a zero-sum game—a combination of forces may be the best and fastest route forward. Architect the new technology Disrupting your firm therefore requires the creation of a new architecture structured for a new business. 4. Defining the optimal IT architecture: The central choice in self-disruption is whether and how many applications should be shifted to the cloud. After all, many of the new disruptive firms are premised on the low costs and technical agility that cloud can provide. Some providers depict this as a stark cloud versus on-premise decision. This is a false choice. Each firm will make its own decision on public, private, and on-premise solutions according to its business and security needs. This hybrid solution is not a compromise—it is a means of combining cloud agility with traditional IT predictability. 5. The legacy technology audit: Once the end game is defined, the incumbent must examine its current networks, processes, and personnel not only as assets but as liabilities. For example, early technology leaders such as insurance companies and airlines find that their proprietary, server-based systems are holding them back.
  • 4. © The Economist Intelligence Unit Limited 20164 The path to self-disruption The nine steps of a digital transformation journey What were once constraints are now becoming serious liabilities as nimble, cloud- based insurgents challenge traditional firms for the market. Incumbents must identify their technology liabilities and make plans to replace them where necessary. 6. Building out the IT architecture: As firms redesign their technology, an emerging model is that of “dual-speed IT.” Legacy firms often find they cannot abandon the legacy technologies that house their customer lists, product information, and back-office systems. At the same time their customers, whose digital expectations have been set by Amazon and Facebook, are expecting nothing less than an outstanding digital interface. A practical result of the audit is the emergence of co-existing IT architectures—dual- speed IT. “Organizations need to overhaul their support model to adjust to this new paradigm. A critical element is recognizing that IT needs two speeds of service delivery,” says Antoine Gourevitch, managing partner at the Boston Consulting Group.3 While this model will present significant integration challenges, it is a practical solution to the back-office realities of many firms. Secure the enterprise The world is a dangerous place, and in technology it is becoming more dangerous. The fluid nature of the transformation journey presents risks during the journey but also an opportunity to improve overall security standards. 7. Setting the data security strategy: The EIU asked 700 firms, split equally between traditional firms and digital disruptors, what the greatest challenge was in the digital journey. They said data security is No. 1. A data security strategy must be designed not for the present, but for the future business and the projected level of threats. This requires a new degree of flexibility and scalability in security strategies. Data security used to consist of high firewalls and locking down the firm. With the increased sophistication and frequency of cyber attacks, it is accepted that the bad guys are going to get in. The new security must have the flexibility to be scaled up and modified for the cyber risk of tomorrow, which can only be expected to escalate and become more sophisticated. 8. Maintaining security during transformation: The transformation journey is a period of elevated data security risk. By its nature, transformation brings new entities—some of which may not have equivalent standards—within the firewalls. New devices, new networks, and new employees all present potential entry points. These require an aggressive data security program that keeps pace with and is an essential part of the journey. 3 Two-Speed IT: A Linchpin for Success in a Digitized World, Boston Consulting Group, 2012.
  • 5. © The Economist Intelligence Unit Limited 20165 The path to self-disruption The nine steps of a digital transformation journey 9. Transformation as an opportunity: Just as the transformation stage presents risk, it also presents an opportunity to escalate the security standards of the enterprise. In most legacy firms, security consists of passwords, firewalls, and software and remains the domain of the IT professionals. But with the new sophistication and frequency of attacks, security needs to be woven into the fabric of the entire enterprise. Disruption can be turned into an advantage in data security. It provides an opportunity to integrate standards into every part of the firm. Accelerate the timeline for disruption Clearly there is no “right” schedule for setting up a new digital business—every firm and industry will dictate its own. But one element is clear: The agility of the new disruptors and the potential agility of your competitors mean that digital transformation cannot be business as usual. “One thing is for sure. Your new digital competition is going to make you move fast. I would say most business transformations should take place between six and 12 months,” Sparks says. This is light-speed for setting up a new business. But there are certain characteristics of the digital world that can enable a faster than usual approach: l Take advantage of agile new technologies—cloud, hybrid cloud, virtualized systems—that present lower development times and allow rapid modification. l Co-opt the insurgents: Absorbing your most potent digital competitors can bring a ready-made business model, culture, and employees into your enterprise. l Select and engage strong partners. It is a reality that your current personnel may not have the experience or incentive to create the new business; outside resources can bring expertise and resources to bear. Summary We live in an era where technology enables new businesses to come to market faster and cheaper than ever before. A digitally transformed company can speed its time to market, operate from a lower cost basis, and out-innovate its competition. But this kind of transition will not occur in an overnight big bang. The process must be deliberate, modular, planned, and built into an aggressive timeline. That is the reality of self-disruption and of the digital transformation journey.