building a strong platform strategy: it and cybersecurity ... building r12nov.pdf · principal,...
TRANSCRIPT
![Page 1: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/1.jpg)
Building a strong platform strategy:IT and cybersecurity implications November 15, 2018
![Page 2: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/2.jpg)
Today’s Presenters
2
Craig Zampa
Principal, technology consulting
248-223-3703
Learn more about Craig
Mike Lipinski
Principal, cybersecurity consulting
248-223-3259
Learn more about Mike
![Page 3: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/3.jpg)
About Plante Moran
Plante Moran is one the nation’s largest certified public accounting and business advisory firms providing tax, audit, transaction advisory, technology, operations, and strategy services.
3
1924 26
1,500+20,000+
3,100+year founded professionals
private equity and portfolio company clients
offices
affiliates including investment bank, PMCF
clients
10
![Page 4: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/4.jpg)
Key objectives
4
• Identify key considerations when building an effective
platform
• Understand the critical IT and cybersecurity elements
related to platform investing
• Implement an IT and cybersecurity risk mitigation
strategy.
![Page 5: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/5.jpg)
Portfolio to platform
5
• Add-on volume increase
• Common to see add-ons prior to platform strategy
• Develop and communicate investment thesis early
![Page 6: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/6.jpg)
Polling question
6
How many platform investments/add-on acquisitions have you executed over the past three years?
▪ 0
▪ 1-5
▪ 6-10
▪ 11+
![Page 7: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/7.jpg)
Start with strategy
7
![Page 8: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/8.jpg)
Set the platform growth strategy
8
• Where and how?
• Product and service expansion?
• Centralize operational teams?
• What will be the management or resource gaps?
![Page 9: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/9.jpg)
Set the IT/cybersecurity strategy
9
• Structure IT/cybersecurity leadership and PMO
• Governance
• Plan IT support and service providers
• Rationalize and centralize business applications
![Page 10: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/10.jpg)
10
Set the IT/cybersecurity strategy
• Perform infrastructure and cybersecurity gap
analysis
• Develop key IT/cyber policies, procedures, and
standards (i.e. support, on-/off-boarding,
hardware)
• Develop detailed improvement and future
assimilation plan
![Page 11: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/11.jpg)
Considerations & gaps
11
![Page 12: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/12.jpg)
IT considerations
12
• Current tools and resources adequate?
• Employ people and tools for “future state”
• Does cloud technology fit into the strategy?
▪ Elastic IT to support growth
▪ Time zone impact
▪ Reduced disruption impact
▪ Cloud platform considerations
![Page 13: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/13.jpg)
Cybersecurity considerations
13
• Will add-on strategy introduce new regulatory compliance
issues?
• Mobility considerations for decentralized/deployed users
• Cloud security strategy
• Privacy regulations
• Fraud/Insider threat
• Cybersecurity resilience
• Devaluation for a cyber event
![Page 14: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/14.jpg)
Identify critical gaps
14
• Technology capabilities/ limitations
• Service level agreement (SLA) best practice
• Key performance indicator (KPI) best practice
• Business continuity planning verification & testing
• Risk assessment
• Regulatory/compliance
• Policy/procedures
• Budget & planning
• Staffing
• Training
• Vendor management program
• Incident response capabilities
• Scalable/effective
• IT & cybersecurity testing
• Vulnerability issues
• Logging & monitoring
Strategic Operational Tactical
![Page 15: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/15.jpg)
Importance of the right timing
15
![Page 16: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/16.jpg)
Know the timing
16
YEAR 4YEAR 3YEAR 2YEAR 1
Implementation & stabilization
Technology selection
Assimilate add-on
Assimilate add-on
Assimilate add-on
IT leadership &PMO stabilization
![Page 17: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/17.jpg)
Manage for risk
17
• External firms can help but dedicate internal assimilation team
▪ Build roles within an assimilation charter
▪ Backfill resources as needed for appropriate commitment
▪ Add-ons cannot assimilate themselves, provide leadership and presence from central business
• Every platform is unique, avoid cookie-cutter approach
• Invest upfront to avoid reduced value at exit
![Page 18: Building a strong platform strategy: IT and cybersecurity ... Building R12Nov.pdf · Principal, cybersecurity consulting mike.lipinski@plantemoran.com 248-223-3259 ... • Identify](https://reader033.vdocument.in/reader033/viewer/2022043021/5f3d5986f105d24be76a3395/html5/thumbnails/18.jpg)
Questions
18
Craig Zampa
Principal, technology consulting
248-223-3703
Mike Lipinski
Principal, cybersecurity consulting
248-223-3259