SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
© The Economist Intelligence Unit Limited 20161
A report from The Economist Intelligence Unit
The path to self-disruption
Nine steps of a digital transformation
journey
Digital disruption is a top-of-mind issue in the C-suites of every industry. Senior
executives of traditional firms are looking over their shoulders and wondering if they are
in the crosshairs of a digital insurgent. Far-sighted executives are asking how they can
disrupt themselves by creating a new digital business—and responding with their own
digital transformation journey.
Journeys demand roadmaps, and execution requires deadlines. While each business’s
transition will be unique and complex, it may be helpful to present nine key steps that
are consistent across different industries. These are thought starters for those who are
planning to disrupt themselves and launch their own digital journeys.
Sponsored by
Transformation roadmap and timeline
Envision the
end state
Determine where
you are now
Define how you
will get there
1. Design your own
disruptive business
The end-game
business model
Gap analysis and
strength assessment
Determine the
change vehicle
2. Architect the new
technology
Optimal IT
architecture
Legacy technology
audit
IT architecture
buildout
3. Secure the
enterprise
Data security
strategy
Transformation
security
Building security into
transformation
Accelerate the
timeline
6-12 months
© The Economist Intelligence Unit Limited 20162
The path to self-disruption
The nine steps of a digital transformation journey
Design your own disruptive business
The first step is to design the end-game business model—the future enterprise that
technology and data security structures will be designed against.
1.	 Creating the end-game business model: One long-time expert on disruption is
Geoffrey Moore, author of “Crossing the Chasm.” He recently advised, “Every
decade or so you must get your company into one net new line of business that has
exceptionally high revenue growth.”1
This means disruption. However, the future
business model may be such a radical departure from the business that the
planning process may not work, and traditional planners may feel threatened by
the results. Here are three starting points:
l	 Begin with your own digital assets. Every company has a series of digital initiatives
already ongoing—these should be catalogued, reviewed, and used as the
starting base.
l	 Begin a process of innovation to design the new model. The use of cloud
capabilities can provide an environment in which experimentation can be rapid
and failure can be low-cost. This can enable a process of continuing, innovative
transformation.
l	 Finally, a useful model for future digital business may be the very insurgents that
are driving transformation in the first place. In 2015, the EIU asked 350 bankers2
what they thought were the most valuable competitive advantages of their
digital challengers. Here are the key findings.
These are attributes that these traditional firms will need to build into their digital
business model. If you need to disrupt your own business, look to those who are trying to
disrupt you from the outside for a blueprint.
1	 Zone to Win: Organizing to Compete in an Age of Disruption, 2015
2	 The Disruption of Banking, Economist Intelligence Unit, October 2015.
Banks’ assessment of the competitive strengths of disruptive insurgents
% citing very or somewhat important, 2015
Agility and speed to market
Capacity to innovate
Lower cost structure
Absence of legacy systems
Focus on single product
Source: Economist Intelligence Unit survey, 2015
87
87
84
72
64
© The Economist Intelligence Unit Limited 20163
The path to self-disruption
The nine steps of a digital transformation journey
2.	 Gap analysis and strength assessment: The legacy firm does not start from a blank
slate—the second step is to assess its current assets and liabilities against the future
business model.
	 Much of today’s dialogue on disruption focuses on the weaknesses of traditional
firms—legacy technologies, inability to attract tech talent, etc. But the traditional
firm should not underestimate the strengths it brings to the table.
	 Some firms appear to have an inferiority complex when dealing with digital
disruption. These incumbent companies bring enormous assets to the table, such as
big customer bases, big brand names, or regulatory approvals. These are strengths
that can be built into their new digital businesses.
3.	 Execution—vehicle for digital change: The final step is execution. Some traditional
firms are turning to acquisitions and partnerships as a vehicle for digital change.
	 Often incumbents struggle to build new cultures and businesses, particularly those
that threaten the existing franchise. New insurgents—for all of their hubris—often
need the assets and branding of their larger competitors to break out from their
many rivals. Finally, combination with the insurgent challenger can accelerate
time-to-market for the new enterprise—a critical advantage in the digital space.
	 In its research on disruption, the EIU found that 45 percent of traditional firms and 53
percent of digital challengers believed that the best strategy was for them to join
forces as partners or acquisitions. Digital disruption is not always a zero-sum
game—a combination of forces may be the best and fastest route forward.
Architect the new technology
Disrupting your firm therefore requires the creation of a new architecture structured for
a new business.
4.	 Defining the optimal IT architecture: The central choice in self-disruption is whether
and how many applications should be shifted to the cloud. After all, many of the
new disruptive firms are premised on the low costs and technical agility that cloud
can provide. Some providers depict this as a stark cloud versus on-premise decision.
	 This is a false choice. Each firm will make its own decision on public, private, and
on-premise solutions according to its business and security needs. This hybrid solution
is not a compromise—it is a means of combining cloud agility with traditional IT
predictability.
5.	 The legacy technology audit: Once the end game is defined, the incumbent must
examine its current networks, processes, and personnel not only as assets but as
liabilities. For example, early technology leaders such as insurance companies and
airlines find that their proprietary, server-based systems are holding them back.
© The Economist Intelligence Unit Limited 20164
The path to self-disruption
The nine steps of a digital transformation journey
	 What were once constraints are now becoming serious liabilities as nimble, cloud-
based insurgents challenge traditional firms for the market. Incumbents must identify
their technology liabilities and make plans to replace them where necessary.
6.	 Building out the IT architecture: As firms redesign their technology, an emerging
model is that of “dual-speed IT.”
	 Legacy firms often find they cannot abandon the legacy technologies that house
their customer lists, product information, and back-office systems. At the same time
their customers, whose digital expectations have been set by LinkedIn and
Facebook, are expecting nothing less than an outstanding digital interface.
	 A practical result of the audit is the emergence of co-existing IT architectures—dual-
speed IT. “Organizations need to overhaul their support model to adjust to this new
paradigm. A critical element is recognizing that IT needs two speeds of service
delivery,” says Antoine Gourevitch, managing partner at the Boston Consulting
Group.3
While this model will present significant integration challenges, it is a
practical solution to the back-office realities of many firms.
Secure the enterprise
The world is a dangerous place, and in technology it is becoming more dangerous. The
fluid nature of the transformation journey presents risks during the journey but also an
opportunity to improve overall security standards.
7.	 Setting the data security strategy: The EIU asked 700 firms, split equally between
traditional firms and digital disruptors, what the greatest challenge was in the digital
journey. They said data security is No. 1.
	 A data security strategy must be designed not for the present, but for the future
business and the projected level of threats. This requires a new degree of flexibility
and scalability in security strategies. Data security used to consist of high firewalls
and locking down the firm. With the increased sophistication and frequency of
cyber attacks, it is accepted that the bad guys are going to get in. The new security
must have the flexibility to be scaled up and modified for the cyber risk of tomorrow,
which can only be expected to escalate and become more sophisticated.
8.	 Maintaining security during transformation: The transformation journey is a period of
elevated data security risk. By its nature, transformation brings new entities—some of
which may not have equivalent standards—within the firewalls. New devices, new
networks, and new employees all present potential entry points. These require an
aggressive data security program that keeps pace with and is an essential part of
the journey.
3	 Two-Speed IT: A Linchpin for Success in a Digitized World, Boston Consulting Group, 2012.
© The Economist Intelligence Unit Limited 20165
The path to self-disruption
The nine steps of a digital transformation journey
9.	 Transformation as an opportunity: Just as the transformation stage presents risk, it
also presents an opportunity to escalate the security standards of the enterprise.
	 In most legacy firms, security consists of passwords, firewalls, and software and
remains the domain of the IT professionals. But with the new sophistication and
frequency of attacks, security needs to be woven into the fabric of the entire
enterprise. Disruption can be turned into an advantage in data security. It provides
an opportunity to integrate standards into every part of the firm.
Accelerate the timeline for disruption
Clearly there is no “right” schedule for setting up a new digital business—every firm and
industry will dictate its own.
But one element is clear. The agility of the new disruptors and the potential agility of
competitors means that digital transformation cannot be business as usual. One thing
is for sure—new digital competition is going to force you to move fast. A rule of thumb
held by some industry experts is that most business transformations should take place
within six to 12 months.
This is light-speed for setting up a new business. But there are certain characteristics of
the digital world that can enable a faster than usual approach:
l	 Take advantage of agile new technologies—cloud, hybrid cloud, virtualized
systems—that present lower development times and allow rapid modification.
l	 Co-opt the insurgents: Absorbing your most potent digital competitors can bring a
ready-made business model, culture, and employees into your enterprise.
l	 Select and engage strong partners. It is a reality that your current personnel may not
have the experience or incentive to create the new business; outside resources can
bring expertise and resources to bear.
Summary
We live in an era where technology enables new businesses to come to market faster
and cheaper than ever before. A digitally transformed company can speed its time to
market, operate from a lower cost basis, and out-innovate its competition.
But this kind of transition will not occur in an overnight big bang. The process must be
deliberate, modular, planned, and built into an aggressive timeline. That is the reality of
self-disruption and of the digital transformation journey.
This is one of a series of Economist Intelligence Unit discussions, sponsored by Hewlett Packard Enterprise,
on the digital transformation journey. For in-depth analyses of securing the internet of things and
managing legacy technology, please click on these links.

Contenu connexe

Tendances

Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low resMichael McManamon
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
Every company is a technology company
Every company is a technology companyEvery company is a technology company
Every company is a technology companyVishal Sharma
 
Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Anant Desai
 
Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Thierry Labro
 
Keeping security relevant amid digital transformation
Keeping security relevant amid digital transformationKeeping security relevant amid digital transformation
Keeping security relevant amid digital transformationSymptai Consulting Limited
 
Forecasting in a digital world
Forecasting in a digital worldForecasting in a digital world
Forecasting in a digital worldaakash malhotra
 
Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Syed Ahmed
 
The ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesThe ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesLivingstone Advisory
 
Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Akhil Parthasaraty
 
Building a Smarter Organization
Building a Smarter OrganizationBuilding a Smarter Organization
Building a Smarter OrganizationSrinivas Koushik
 
Digital Transformation ROI Survey From Wipro Digital
Digital Transformation ROI Survey From Wipro DigitalDigital Transformation ROI Survey From Wipro Digital
Digital Transformation ROI Survey From Wipro DigitalWipro Digital
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?BMC Software
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthDigital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthBMC Software
 

Tendances (20)

Cleveland Sight Center_low res
Cleveland Sight Center_low resCleveland Sight Center_low res
Cleveland Sight Center_low res
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
 
Deloitte University Press Tech Trends 2014
Deloitte University Press Tech Trends 2014Deloitte University Press Tech Trends 2014
Deloitte University Press Tech Trends 2014
 
Tech trends-2014 final-electronic-single.2.11
Tech trends-2014 final-electronic-single.2.11Tech trends-2014 final-electronic-single.2.11
Tech trends-2014 final-electronic-single.2.11
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
Every company is a technology company
Every company is a technology companyEvery company is a technology company
Every company is a technology company
 
Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)
 
Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014Dtt en wp_techtrends_10022014
Dtt en wp_techtrends_10022014
 
Keeping security relevant amid digital transformation
Keeping security relevant amid digital transformationKeeping security relevant amid digital transformation
Keeping security relevant amid digital transformation
 
Forecasting in a digital world
Forecasting in a digital worldForecasting in a digital world
Forecasting in a digital world
 
Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015Accenture-Start-your-Career-with-Accenture-English2015
Accenture-Start-your-Career-with-Accenture-English2015
 
The ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologiesThe ‘success trap’ of new, emerging and disruptive technologies
The ‘success trap’ of new, emerging and disruptive technologies
 
Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?Is Your Network Ready for Digital Transformation?
Is Your Network Ready for Digital Transformation?
 
Building a Smarter Organization
Building a Smarter OrganizationBuilding a Smarter Organization
Building a Smarter Organization
 
Digital Transformation ROI Survey From Wipro Digital
Digital Transformation ROI Survey From Wipro DigitalDigital Transformation ROI Survey From Wipro Digital
Digital Transformation ROI Survey From Wipro Digital
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthDigital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
 

Similaire à The path to self-disruption

Solving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategySolving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategyThe Economist Media Businesses
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...Rick Bouter
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Fabio Mittelstaedt
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
Digital strategy during coronavirus crisis
Digital strategy during coronavirus crisisDigital strategy during coronavirus crisis
Digital strategy during coronavirus crisisAgileTech Vietnam
 
Mc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMarco Crudo
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governanceBen Gilchriest
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 
Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Vivekin
 
Digital Strategy In A Time Of Crisis
Digital Strategy In A Time Of CrisisDigital Strategy In A Time Of Crisis
Digital Strategy In A Time Of CrisisBruno A. Bonechi
 
Business agility imperatives smarter solutions-transformation-icty 2011-1
Business agility imperatives smarter solutions-transformation-icty 2011-1Business agility imperatives smarter solutions-transformation-icty 2011-1
Business agility imperatives smarter solutions-transformation-icty 2011-1zslmarketing
 
Modern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First WorldModern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First WorldSWC Technology Partners
 
The power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationThe power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationIBM Software India
 

Similaire à The path to self-disruption (20)

The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Solving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategySolving the CIO's disruption dilemma—the blended IT strategy
Solving the CIO's disruption dilemma—the blended IT strategy
 
Governance a central component of successful digital transformation - capg...
Governance    a central component of successful digital transformation - capg...Governance    a central component of successful digital transformation - capg...
Governance a central component of successful digital transformation - capg...
 
201605 R&P on Digitization
201605 R&P on Digitization201605 R&P on Digitization
201605 R&P on Digitization
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy Being Digital, Fast-forward to the Right Digital Strategy
Being Digital, Fast-forward to the Right Digital Strategy
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
Digital decodedv1.1
Digital decodedv1.1Digital decodedv1.1
Digital decodedv1.1
 
Digital strategy during coronavirus crisis
Digital strategy during coronavirus crisisDigital strategy during coronavirus crisis
Digital strategy during coronavirus crisis
 
Mc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insuranceMc ky digital-disruption-in-insurance
Mc ky digital-disruption-in-insurance
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governance
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 
Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24Tech trends-2014 final-electronic-single.2.24
Tech trends-2014 final-electronic-single.2.24
 
Digital Strategy In A Time Of Crisis
Digital Strategy In A Time Of CrisisDigital Strategy In A Time Of Crisis
Digital Strategy In A Time Of Crisis
 
Business agility imperatives smarter solutions-transformation-icty 2011-1
Business agility imperatives smarter solutions-transformation-icty 2011-1Business agility imperatives smarter solutions-transformation-icty 2011-1
Business agility imperatives smarter solutions-transformation-icty 2011-1
 
Modern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First WorldModern IT: Keeping Pace in a Cloud-First World
Modern IT: Keeping Pace in a Cloud-First World
 
The power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovationThe power of Cloud - Driving business model innovation
The power of Cloud - Driving business model innovation
 

Plus de The Economist Media Businesses

Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANThe Economist Media Businesses
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...The Economist Media Businesses
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayThe Economist Media Businesses
 
Intelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyIntelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyThe Economist Media Businesses
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...The Economist Media Businesses
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...The Economist Media Businesses
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsThe Economist Media Businesses
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...The Economist Media Businesses
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionThe Economist Media Businesses
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsThe Economist Media Businesses
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityThe Economist Media Businesses
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowThe Economist Media Businesses
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesThe Economist Media Businesses
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEAThe Economist Media Businesses
 

Plus de The Economist Media Businesses (20)

Food for thought: Eating better
Food for thought: Eating betterFood for thought: Eating better
Food for thought: Eating better
 
Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEAN
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
 
Next-Generation Connectivity
Next-Generation ConnectivityNext-Generation Connectivity
Next-Generation Connectivity
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking away
 
How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation
 
Intelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyIntelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and society
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
 
Communication barriers in the modern workplace
Communication barriers in the modern workplaceCommunication barriers in the modern workplace
Communication barriers in the modern workplace
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schools
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruption
 
Infographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimensionInfographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimension
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocations
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and Responsibility
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For Now
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to Equities
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEA
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

The path to self-disruption

  • 1. © The Economist Intelligence Unit Limited 20161 A report from The Economist Intelligence Unit The path to self-disruption Nine steps of a digital transformation journey Digital disruption is a top-of-mind issue in the C-suites of every industry. Senior executives of traditional firms are looking over their shoulders and wondering if they are in the crosshairs of a digital insurgent. Far-sighted executives are asking how they can disrupt themselves by creating a new digital business—and responding with their own digital transformation journey. Journeys demand roadmaps, and execution requires deadlines. While each business’s transition will be unique and complex, it may be helpful to present nine key steps that are consistent across different industries. These are thought starters for those who are planning to disrupt themselves and launch their own digital journeys. Sponsored by Transformation roadmap and timeline Envision the end state Determine where you are now Define how you will get there 1. Design your own disruptive business The end-game business model Gap analysis and strength assessment Determine the change vehicle 2. Architect the new technology Optimal IT architecture Legacy technology audit IT architecture buildout 3. Secure the enterprise Data security strategy Transformation security Building security into transformation Accelerate the timeline 6-12 months
  • 2. © The Economist Intelligence Unit Limited 20162 The path to self-disruption The nine steps of a digital transformation journey Design your own disruptive business The first step is to design the end-game business model—the future enterprise that technology and data security structures will be designed against. 1. Creating the end-game business model: One long-time expert on disruption is Geoffrey Moore, author of “Crossing the Chasm.” He recently advised, “Every decade or so you must get your company into one net new line of business that has exceptionally high revenue growth.”1 This means disruption. However, the future business model may be such a radical departure from the business that the planning process may not work, and traditional planners may feel threatened by the results. Here are three starting points: l Begin with your own digital assets. Every company has a series of digital initiatives already ongoing—these should be catalogued, reviewed, and used as the starting base. l Begin a process of innovation to design the new model. The use of cloud capabilities can provide an environment in which experimentation can be rapid and failure can be low-cost. This can enable a process of continuing, innovative transformation. l Finally, a useful model for future digital business may be the very insurgents that are driving transformation in the first place. In 2015, the EIU asked 350 bankers2 what they thought were the most valuable competitive advantages of their digital challengers. Here are the key findings. These are attributes that these traditional firms will need to build into their digital business model. If you need to disrupt your own business, look to those who are trying to disrupt you from the outside for a blueprint. 1 Zone to Win: Organizing to Compete in an Age of Disruption, 2015 2 The Disruption of Banking, Economist Intelligence Unit, October 2015. Banks’ assessment of the competitive strengths of disruptive insurgents % citing very or somewhat important, 2015 Agility and speed to market Capacity to innovate Lower cost structure Absence of legacy systems Focus on single product Source: Economist Intelligence Unit survey, 2015 87 87 84 72 64
  • 3. © The Economist Intelligence Unit Limited 20163 The path to self-disruption The nine steps of a digital transformation journey 2. Gap analysis and strength assessment: The legacy firm does not start from a blank slate—the second step is to assess its current assets and liabilities against the future business model. Much of today’s dialogue on disruption focuses on the weaknesses of traditional firms—legacy technologies, inability to attract tech talent, etc. But the traditional firm should not underestimate the strengths it brings to the table. Some firms appear to have an inferiority complex when dealing with digital disruption. These incumbent companies bring enormous assets to the table, such as big customer bases, big brand names, or regulatory approvals. These are strengths that can be built into their new digital businesses. 3. Execution—vehicle for digital change: The final step is execution. Some traditional firms are turning to acquisitions and partnerships as a vehicle for digital change. Often incumbents struggle to build new cultures and businesses, particularly those that threaten the existing franchise. New insurgents—for all of their hubris—often need the assets and branding of their larger competitors to break out from their many rivals. Finally, combination with the insurgent challenger can accelerate time-to-market for the new enterprise—a critical advantage in the digital space. In its research on disruption, the EIU found that 45 percent of traditional firms and 53 percent of digital challengers believed that the best strategy was for them to join forces as partners or acquisitions. Digital disruption is not always a zero-sum game—a combination of forces may be the best and fastest route forward. Architect the new technology Disrupting your firm therefore requires the creation of a new architecture structured for a new business. 4. Defining the optimal IT architecture: The central choice in self-disruption is whether and how many applications should be shifted to the cloud. After all, many of the new disruptive firms are premised on the low costs and technical agility that cloud can provide. Some providers depict this as a stark cloud versus on-premise decision. This is a false choice. Each firm will make its own decision on public, private, and on-premise solutions according to its business and security needs. This hybrid solution is not a compromise—it is a means of combining cloud agility with traditional IT predictability. 5. The legacy technology audit: Once the end game is defined, the incumbent must examine its current networks, processes, and personnel not only as assets but as liabilities. For example, early technology leaders such as insurance companies and airlines find that their proprietary, server-based systems are holding them back.
  • 4. © The Economist Intelligence Unit Limited 20164 The path to self-disruption The nine steps of a digital transformation journey What were once constraints are now becoming serious liabilities as nimble, cloud- based insurgents challenge traditional firms for the market. Incumbents must identify their technology liabilities and make plans to replace them where necessary. 6. Building out the IT architecture: As firms redesign their technology, an emerging model is that of “dual-speed IT.” Legacy firms often find they cannot abandon the legacy technologies that house their customer lists, product information, and back-office systems. At the same time their customers, whose digital expectations have been set by LinkedIn and Facebook, are expecting nothing less than an outstanding digital interface. A practical result of the audit is the emergence of co-existing IT architectures—dual- speed IT. “Organizations need to overhaul their support model to adjust to this new paradigm. A critical element is recognizing that IT needs two speeds of service delivery,” says Antoine Gourevitch, managing partner at the Boston Consulting Group.3 While this model will present significant integration challenges, it is a practical solution to the back-office realities of many firms. Secure the enterprise The world is a dangerous place, and in technology it is becoming more dangerous. The fluid nature of the transformation journey presents risks during the journey but also an opportunity to improve overall security standards. 7. Setting the data security strategy: The EIU asked 700 firms, split equally between traditional firms and digital disruptors, what the greatest challenge was in the digital journey. They said data security is No. 1. A data security strategy must be designed not for the present, but for the future business and the projected level of threats. This requires a new degree of flexibility and scalability in security strategies. Data security used to consist of high firewalls and locking down the firm. With the increased sophistication and frequency of cyber attacks, it is accepted that the bad guys are going to get in. The new security must have the flexibility to be scaled up and modified for the cyber risk of tomorrow, which can only be expected to escalate and become more sophisticated. 8. Maintaining security during transformation: The transformation journey is a period of elevated data security risk. By its nature, transformation brings new entities—some of which may not have equivalent standards—within the firewalls. New devices, new networks, and new employees all present potential entry points. These require an aggressive data security program that keeps pace with and is an essential part of the journey. 3 Two-Speed IT: A Linchpin for Success in a Digitized World, Boston Consulting Group, 2012.
  • 5. © The Economist Intelligence Unit Limited 20165 The path to self-disruption The nine steps of a digital transformation journey 9. Transformation as an opportunity: Just as the transformation stage presents risk, it also presents an opportunity to escalate the security standards of the enterprise. In most legacy firms, security consists of passwords, firewalls, and software and remains the domain of the IT professionals. But with the new sophistication and frequency of attacks, security needs to be woven into the fabric of the entire enterprise. Disruption can be turned into an advantage in data security. It provides an opportunity to integrate standards into every part of the firm. Accelerate the timeline for disruption Clearly there is no “right” schedule for setting up a new digital business—every firm and industry will dictate its own. But one element is clear. The agility of the new disruptors and the potential agility of competitors means that digital transformation cannot be business as usual. One thing is for sure—new digital competition is going to force you to move fast. A rule of thumb held by some industry experts is that most business transformations should take place within six to 12 months. This is light-speed for setting up a new business. But there are certain characteristics of the digital world that can enable a faster than usual approach: l Take advantage of agile new technologies—cloud, hybrid cloud, virtualized systems—that present lower development times and allow rapid modification. l Co-opt the insurgents: Absorbing your most potent digital competitors can bring a ready-made business model, culture, and employees into your enterprise. l Select and engage strong partners. It is a reality that your current personnel may not have the experience or incentive to create the new business; outside resources can bring expertise and resources to bear. Summary We live in an era where technology enables new businesses to come to market faster and cheaper than ever before. A digitally transformed company can speed its time to market, operate from a lower cost basis, and out-innovate its competition. But this kind of transition will not occur in an overnight big bang. The process must be deliberate, modular, planned, and built into an aggressive timeline. That is the reality of self-disruption and of the digital transformation journey. This is one of a series of Economist Intelligence Unit discussions, sponsored by Hewlett Packard Enterprise, on the digital transformation journey. For in-depth analyses of securing the internet of things and managing legacy technology, please click on these links.