18
Building a strong platform strategy: IT and cybersecurity implications November 15, 2018

Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting [email protected] 248-223-3259 ... • Identify

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Building a strong platform strategy:IT and cybersecurity implications November 15, 2018

Page 2: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Today’s Presenters

2

Craig Zampa

Principal, technology consulting

[email protected]

248-223-3703

Learn more about Craig

Mike Lipinski

Principal, cybersecurity consulting

[email protected]

248-223-3259

Learn more about Mike

Page 3: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

About Plante Moran

Plante Moran is one the nation’s largest certified public accounting and business advisory firms providing tax, audit, transaction advisory, technology, operations, and strategy services.

3

1924 26

1,500+20,000+

3,100+year founded professionals

private equity and portfolio company clients

offices

affiliates including investment bank, PMCF

clients

10

Page 4: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Key objectives

4

• Identify key considerations when building an effective

platform

• Understand the critical IT and cybersecurity elements

related to platform investing

• Implement an IT and cybersecurity risk mitigation

strategy.

Page 5: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Portfolio to platform

5

• Add-on volume increase

• Common to see add-ons prior to platform strategy

• Develop and communicate investment thesis early

Page 6: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Polling question

6

How many platform investments/add-on acquisitions have you executed over the past three years?

▪ 0

▪ 1-5

▪ 6-10

▪ 11+

Page 7: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Start with strategy

7

Page 8: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Set the platform growth strategy

8

• Where and how?

• Product and service expansion?

• Centralize operational teams?

• What will be the management or resource gaps?

Page 9: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Set the IT/cybersecurity strategy

9

• Structure IT/cybersecurity leadership and PMO

• Governance

• Plan IT support and service providers

• Rationalize and centralize business applications

Page 10: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

10

Set the IT/cybersecurity strategy

• Perform infrastructure and cybersecurity gap

analysis

• Develop key IT/cyber policies, procedures, and

standards (i.e. support, on-/off-boarding,

hardware)

• Develop detailed improvement and future

assimilation plan

Page 11: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Considerations & gaps

11

Page 12: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

IT considerations

12

• Current tools and resources adequate?

• Employ people and tools for “future state”

• Does cloud technology fit into the strategy?

▪ Elastic IT to support growth

▪ Time zone impact

▪ Reduced disruption impact

▪ Cloud platform considerations

Page 13: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Cybersecurity considerations

13

• Will add-on strategy introduce new regulatory compliance

issues?

• Mobility considerations for decentralized/deployed users

• Cloud security strategy

• Privacy regulations

• Fraud/Insider threat

• Cybersecurity resilience

• Devaluation for a cyber event

Page 14: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Identify critical gaps

14

• Technology capabilities/ limitations

• Service level agreement (SLA) best practice

• Key performance indicator (KPI) best practice

• Business continuity planning verification & testing

• Risk assessment

• Regulatory/compliance

• Policy/procedures

• Budget & planning

• Staffing

• Training

• Vendor management program

• Incident response capabilities

• Scalable/effective

• IT & cybersecurity testing

• Vulnerability issues

• Logging & monitoring

Strategic Operational Tactical

Page 15: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Importance of the right timing

15

Page 16: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Know the timing

16

YEAR 4YEAR 3YEAR 2YEAR 1

Implementation & stabilization

Technology selection

Assimilate add-on

Assimilate add-on

Assimilate add-on

IT leadership &PMO stabilization

Page 17: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Manage for risk

17

• External firms can help but dedicate internal assimilation team

▪ Build roles within an assimilation charter

▪ Backfill resources as needed for appropriate commitment

▪ Add-ons cannot assimilate themselves, provide leadership and presence from central business

• Every platform is unique, avoid cookie-cutter approach

• Invest upfront to avoid reduced value at exit

Page 18: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify

Questions

18

Craig Zampa

Principal, technology consulting

[email protected]

248-223-3703

Mike Lipinski

Principal, cybersecurity consulting

[email protected]

248-223-3259