Kenya Coconut Production Presentation by Dr. Lalith Perera
The Path to Self-Disruption
1. THE PATH TO SELF-DISRUPTION
Nine steps of a digital transformation journey
Sponsored by
2. C-Suite executives in every industry must set the right pace for digital innovation. Move too fast and you can undermine
still-valuable business processes and threaten your customer franchise. Move too slow, and established enterprises risk being
“Ubered” by aggressive newcomers that steal business and gain competitive advantage. A balanced approach is paced,
modular and risk-adjusted – but executed with a sense of urgency. The following nine steps, broken down into three main
stages, can guide change agents as they design their own transformative businesses and use the latest technology to create
modern architectures—all while securing the enterprise.
START YOUR OWN DISRUPTION
3. This means disruption. However,
the future business model may
be such a radical departure from
the business that the planning
process may not work, and
traditional planners may feel
threated by the results. Here are
three starting points:
• Begin with your own digital
assets. Every company has a
series of digital initiatives already
ongoing – these should be
catalogued, reviewed and used
as the starting base.
• Begin a process of innovation
to design the new model. The
use of cloud capabilities can
provide an environment in which
experimentation can be rapid
and failure can be low-cost.
• Finally, a useful model for future
digital business may be the
very insurgents that are driving
transformation in the first place.
You cannot copy them, but you
can emulate their best practices
in technology and business
model.
DESIGN STEP 1:
Develop the end-game
business model.
4. Because legacy firms do not
start from a blank slate, they
must assess their current
assets and liabilities against
the future business model.
Many of the discussions
about transformation
focus on the weaknesses
of traditional firms – legacy
technologies, inability to
attract tech talent, etc. But
traditional firms should not
underestimate the strengths
they bring to the table.
“Some firms have almost
an inferiority complex
when dealing with digital
disruption,” says Scott
Sparks, a former executive
at the Proxima Group, a
disruptive firm that provides
digitized alternatives to
traditional procurement
departments. “These are
companies that bring
enormous assets to the
table – big customer
bases, big brand names,
regulatory approvals. These
are strengths that they can
build into their new digital
businesses.”
DESIGN STEP 2:
Perform a gap analysis
and strength assessment.
5. Some traditional firms are turning to acquisitions and partnerships as vehicles for digital change. This approach addresses
the struggle incumbents often face when building new cultures and businesses, particularly those that threaten the existing
franchise. Insurgents – for all of their hubris – often need the assets and branding of their larger competitors to break out
from their many competitors. Thus, by combining with the insurgent challenger, established enterprises can accelerate
time-to-market for the new enterprise, which is critical in the digital space. In its research on the financial industry, the EIU
found that 45% of traditional firms and 53% of digital challengers believed that the best strategy was for them to join forces
as partners or acquisitions. Digital disruption is not always a zero-sum game – a combination of forces may be the best and
fastest route forward.
DESIGN STEP 3:
Weigh M&As for digital change.
6. The central choice in self-disruption is whether—or how many—applications should be shifted to the cloud. After all, many of
the new disruptive firms capitalize on the low costs and technical agility that clouds can provide. Some providers depict this
as a stark cloud versus “on-prem” decision. This is a false choice. Each firm will make its own decision on public, private and
on-premise solutions, according to its business and security needs.
The bottom line: don’t look at hybrid cloud as a compromise, it can be a valuable way to combine cloud agility with
traditional IT predictability.
ARCHITECTURE STEP 1:
Define the optimal IT architecture.
7. Once the end-game is defined, the incumbent must examine its current networks, processes and personnel, not only as assets
but also as liabilities. Early technology leaders, such as insurance companies and airlines, have found that their proprietary,
server-based systems are holding them back. What were once constraints are now becoming serious liabilities as nimble,
cloud-based insurgents challenge traditional firms for the market. Incumbents must identify their technology liabilities and make
plans to replace them where necessary.
ARCHITECTURE STEP 2:
Conduct a legacy technology audit.
8. As firms redesign their
technology, an emerging
model is that of “dual-speed
IT.” Legacy firms often find
they cannot abandon the
legacy technologies that
house their customer lists,
product information, and
back-office systems. At the
same time, customers, whose
digital expectations have
been set by Amazon and
Facebook, are expecting
nothing less than an
outstanding digital interface.
The most realistic option may
be to embrace co-existing IT
architectures. “Organizations
need to overhaul their
support model to adjust to
this new paradigm. A critical
element is recognizing that IT
needs two speeds of service
delivery,” says Antoine
Gourevitch, Managing Partner
at the Boston Consulting
Group. While this model will
present significant integration
challenges, it is a practical
solution to the back-office
realities of many firms.
ARCHITECTURE STEP 3:
Build out the IT architecture.
9. SECURITY STEP 1:
Define a data security
strategy.
In an EIU survey of over 700
disrupting and disrupted firms,
the majority of executives said
data security was the number
one challenge.
Clearly, a data security
strategy must be designed
not just for the present, but for
the future business and the
projected level of threats in
the years ahead.
This requires a new degree
of flexibility and scalability
in security strategies. Data
security used to consist of high
firewalls and other tools for
locking down the firm. With
the increased sophistication
and frequency of cyber-
attacks, security managers
now accept that the bad
guys are going to get in,
which puts new emphasis
on containment and fast
remediation. New security
strategies must be flexible
enough to be scaled up and
modified for the cyber risks of
tomorrow, which can only be
expected to escalate and
become more sophisticated.
10. The transformation journey
is a period of elevated data
security risk. By its nature,
transformation brings new
entities – some of which
may not have equivalent
standards – within the firewall.
New devices, new networks,
and new employees all
present potential entry points
for hackers. These require
an aggressive data security
program that keeps pace
with and is an essential part of
the journey.
SECURITY STEP 2:
Maintain security during
transformation.
11. Just as transformation
presents risks, it also presents
an opportunity to escalate
the security standards of the
enterprise. In most legacy
firms, security consists of
passwords, firewalls, and
software, and remains the
domain of the IT professionals.
But with the new sophistication
and frequency of attacks,
security needs to be woven
into the fabric of the entire
enterprise. Disruption can be
turned into an advantage for
data security.
The digital transformation
journey is a fluid time, when
new systems can be adopted
and new cultures created. This
is an opportunity to weave
security into the DNA of the
enterprise.
SECURITY STEP 3:
Turn transformation into
an opportunity.
12. No industry will escape disruption. And the timeline for disruption will not be set by you -- it will be set by your new competitors.
Rapid mobilisation will require a ramp-up of resources. Some of your best employees will welcome disruption and become
its leaders. The complexity and urgency should make you carefully screen and select your partners. The stakes – which can
include the survival of the firm – demand that you recruit the support of you C-Suite and Board.
You have time to do it right, but no time to lose. Start disrupting yourself now, before others do it for you.
URGENCY
Time to do it right, but no time to lose.
This is one of a series of EIU discussions, sponsored by Hewlett Packard Enterprise, on the digital transformation
journey. For in-depth analyses of technology disruption, securing the Internet of things, and managing legacy
technology, please click on these links.