Appleton Greene News

Service objectives


The following list represents the Key Service Objectives (KSO) for the Appleton Greene Risk Management service.

Risk Planning

The objective of risk planning is to produce the risk management plan which is a document that will define the framework for the risk management activities that is to be conducted by the project team throughout the respective phases in the system development life cycle. The risk management plan lays down the groundwork for how risk management will be carried out in a project. It serves as guidance for the risk process, its thresholds, its formats, defining the roles and responsibilities of stakeholders in governing the risk activities. It is notable that the risk management plan is not a listing of specific risks and is not used to establish the particular strategies for risks, once they are identified. The risk management plan is shared with project stakeholders to clarify their roles and responsibilities in the risk management process and to identify when specific potential risks are truly of concern to the organization. It also outlines the risk budgeting process, detailing how and when risk contingency funds may be allocated and applied. There are a number of steps involved in the development of the risk management plan. A risk management plan template will be easier to start with including the organization policies and the risk tolerance level of the stakeholders. The first step begins with having a firm commitment to the entire risk management approach from all project stakeholders. This commitment ensures that adequate resources will be in place to properly plan for and manage the various risks of the project. These resources may include time, people, and technology. Based on the size, impact, and priority of the project, a budget may need to be established for the project risk management activities. A project with high priority and no budget allotment for risk management activities may face uncertain times ahead. A realistic dollar amount is needed for risk management activities if the project is to be successful. The roles and responsibilities identify the groups and individuals who will participate in the leadership and support for each of the risk management activities within the risk management plan. The duties of project steering committee, project manager, and the project team must be clearly defined. Responsibilities may include information on who will identify risks, as well as who should evaluate them and develop strategies for those that are of the greatest significance. Stakeholders also must be committed to the process of identifying, analyzing, and responding to threats and opportunities. Too often plans are disregarded at the first sign of trouble, and instinctive reactions to situations can lead to perpetual crisis management. In addition to commitment, risk planning also focuses on preparation. It is important that resources, processes, and tools be in place to adequately plan the activities for project risk management. Systematic preparation and planning can help minimize adverse effects on the project while taking advantage of opportunities as they arise. The risk management process needs a schedule to determine how often and when risk management activities should happen throughout the project. If risk management happens too late in the project, then the project could be delayed because of the time needed to identify, assess, and respond to the risks. A realistic schedule should be developed early in the project to accommodate risks, risk analysis, and risk reaction. A clearly defined scoring system and interpretation of the scoring system must be in place. Altering the scoring process during risk analysis or from analysis to analysis can skew the seriousness of a risk, its impact, and the effect of the risk on the project. The project manager and the project team must have clearly defined scores that will be applied to the analysis to ensure consistency throughout the project. The risk management plan shall include detail on the frequency of risk identification, assessment, and response development, as well as the appropriate application of any tracking processes or documentation. As risk management activities are induced, they will need to be documented. The documented actions and their results will support ongoing decisions within the current project (as well as future projects) and will serve as information for management, the project team, the customers, and other stakeholders. The Risk Management Plan should provide the project steering committee with clear statements of the project risks and the proposed risk management strategies to enable ongoing management and regular review.


Risk identification

Risk identification is the process of identifying the threats and opportunities that could occur during the life of the project along with their associated uncertainties. The life of the project means the complete life cycle of the project, not just the time the project team is in place, the time until the final acceptance by the customer, or even the end of the warranty period. Risks should be considered through the useful life of the product or service that we are providing by doing this project. The risk of corrosion causing a catastrophic product failure during the useful life of a product that we have designed and built should be considered, and corrective action should be taken in accordance with the seriousness of the threat. Risks can be identified in a large number of ways, and all of the productive and economical ways should be employed. We shall start with recognizing the areas of the project where the risks can occur. This means that we will have to investigate the following areas: Scope – we must look at the work of the project. The work breakdown structure (WBS) will be useful here. The project scope must be clearly defined in terms of both the deliverables and the work that must be done to deliver them. Errors and omissions on the part of the project team and the stakeholders must be minimized. As always, the WBS will be very helpful in doing this; Schedule – estimates for the duration of the project and the duration of the project tasks must be done accurately and reliably. The sequence of work must be identified, and the interrelationships between the tasks must be clearly defined; Cost – estimates for tasks must be done accurately and reliably. All associated costs must be considered and reported accurately. Life-cycle costs should be considered as well as maintenance, warranty, inflation, and any other costs. Customer expectations – estimates of project success must be considered in terms of customer needs and desires. The ability of the project to be scaled up or manufactured in different quantities or for different uses and sizes must also be considered; Resources – this involves the quantity, quality, and availability of the resources that will be needed for the project. Skills must be defined in the roles that will be necessary for the project; Organization – This is the ability to interface with the stakeholder’s organization in terms of communications and knowledge. The Risk Management plan developed earlier will be the primary input into this process, many people both inside and outside the project will also be useful input into this process. This includes input not only from the project team and all of the stakeholders but also from project managers who have managed this type of project before and even consultants who have special expertise about certain kinds of risks. It may be necessary to organize the types of risks into categories so that separate teams of people can be brought together more efficiently. Many of the risks that will affect the project are risks that have happened in one form or another on other projects of this type. Utilizing the information available in the previous project’s lessons-learned documents will be very helpful in identifying risks for this project. An organized review of past projects should be done as part of the risk identification process. Since much of the risk identification process will involve large numbers of people, formal group dynamics techniques should be used. It is, therefore, important that the project manager and team guide the risk management process. Risk identification should include the project team and other stakeholders who are familiar with the project’s goal and objectives. Using one or more of the following tools, the project risk framework introduced earlier in this course can provide direction for identifying the threats and opportunities associated with the project. Tools and techniques that will be applied to this process include brainstorming, Delphi technique, SWOT analysis, interviewing, and Ishikawa diagram.


Risk Assessment

The framework introduced in the previous section provides tools for identifying and understanding the nature of risks to projects. The next step requires that those risks be analyzed to determine what threats or opportunities require attention or a response. Risk assessment provides a systematic approach for evaluating the risks that the project stakeholders identify. The purpose of risk assessment is to determine each identified risk’s probability and impact on the project and prioritizing them so that an effective risk strategy can be formulated. In short, which risks require a response? To a great degree, this will be determined by the project stakeholders’ tolerances to risk. Risk assessment is the process of evaluating the risks that have been identified and developing the data that will be needed for making decisions as to what should be done about them. Risk management is done from very early in the project until the very end. For this reason, the qualitative analysis should be used at some points in the project, and quantitative techniques should be used at other times. The objective of risk assessment is to establish a way of arranging the risks in the order of importance. In most projects, there will not be enough time or money to take action against every risk that is identified. The severity of the risk is a practical measure for quantifying risks. Severity is a combination of the risk probability and the risk impact. In its simplest form, the risks can be ranked as high and low severity or possibly high, medium, and low. At the other extreme, the probability of the risk can be a percentage or a decimal value between zero and one, and the impact can be estimated in dollars. When the impact in dollars and the probability in decimal are multiplied together, the result is the quantitative expected value of the risk.
In short, which risks require a response? To a great degree, this will be determined by the project stakeholders’ tolerances to risk. There are two basic approaches to analyzing and assessing project risk. The first approach is more qualitative in nature because it includes subjective assessments based on experience or intuition. Quantitative analysis, on the other hand, is based on mathematical and statistical techniques. Each approach has its own strengths and weaknesses when dealing with uncertainty, so a combination of qualitative and quantitative methods provides valuable insight when conducting risk analysis and assessment.


Risk Strategy

It is not feasible or advisable to respond to each and every threat identified because avoiding all threats or requires resources to be diverted away from the real project work. Furthermore, the cost that needs to be allocated for contingencies and mitigations will reach to the point where it will not make any sense to justify the implementation of the project. Risk strategies are the responses we can make to dealing with the risks we have identified and quantified during risk assessment. In the section on risk quantification, we discussed evaluating the risk in terms of its impact and probability in such a way that we would be able to rank risks in their order of importance. This is what we called severity, the combination of impact and probability. Risk response strategy is really based on risk tolerance. Risk tolerance in terms of severity is the point above which a risk is not acceptable and below which the risk is acceptable. There are many reasons for selecting one risk strategy over another, and all of these factors must be considered. Cost and schedule are the most likely reasons for a given risk to have a high severity. Other factors may affect our choice of risk strategy. For example, if a schedule risk is identified for a task in the project, and if this task has many other tasks depending on it, its severity may be calculated as being lower than is apparent, and the severity should be adjusted even though the schedule impact due to the disruption may be difficult to judge. The strategy should be appropriate for the risk it is intended for. The output of this process is the risk response plan which is a detailed plan that describes the actions that will be taken in regards to responding to a particular risk. It is also called the risk register and will include identified risks and descriptions, areas of the affected project, causes of identified risks, and impact on project objectives, risk owners and assigned responsibilities, results from the qualitative and quantitative risk analysis processes, agreed responses including avoidance, transference, mitigation, or acceptance for each risk in the risk response plan, the level of residual risk expected to be remaining after the strategy is implemented, specific actions to implement the chosen response strategy, budget and times for responses, contingency plans and fall back plans. The approach to developing this plan is through meetings with all project stakeholders and obtain project sponsor to sign off prior to approval by the project steering committee.


Risk Control

Once the risk response plan is created, the various risk triggers must be continually monitored to keep track of the various project risks. In addition, new threats and opportunities may present themselves over the course of the project, so it is important that the project stakeholders be vigilant. The purpose of risk control is to determine whether or not risk responses have been implemented as planned, and risk response actions are as effective as expected, or if new responses should be developed. The process of monitoring and keeping track of the identified and unidentified risks is called risk control. In this process, we hope to identify risks that are no longer possible and risks that are coming due, as well as any new risks that may become evident. We will also monitor risk activity to make sure the risk plans have been carried out successfully. Problems that have been found out in the risk management plan can help us adjust the plans for future risk activities. Risk control is part of the risk management processes and must be started early in the project and continued until the end. As the project progresses, we will find that many of the risks will change, some will no longer be possible, others will happen and be disposed of, and new risks will be identified. The level of risk tolerance should be monitored as well. The attitude of the stakeholders will change during the course of the project. Communication with all stakeholders is important since it gives us a means of assessing changes in their risk tolerance. Risk control may involve changing the way we look at risk. There are several reasons why this might take place. The risk tolerance of the stakeholders may change; the risk tolerance of the project team may change. As the project progresses toward its completion, certain risks that were thought to be very important to the success of the project may become risks that are no longer thought of as being so important. There are several methods to control risks, they can be achieved by performing: Project risk response audits – Risk auditors examine and document the effectiveness of the risk response in avoiding, transferring, or mitigating risk occurrence as well as the effectiveness of the risk owner. Risk audits are performed during the project life cycle to control risk; Periodic project risk reviews – Risk ratings and priorities may change during the course of the project and may require additional qualitative or quantitative analysis; Earned value analysis – Used for monitoring overall project performance against a baseline plan. If earned value analysis (or comparable tool) shows a significant deviation from the baseline, updated risk identification and analysis should be performed.; Technical performance measurement – Compares technical accomplishments during project execution to the project plan’s schedule of technical achievement. The deviation can imply a risk to achieving the project’s objectives; Additional risk response planning – May be required for unanticipated risks or for risks where the impact was greater than expected.

This service is primarily available to the following industry sectors:

166637347
Consultancy

Companies offering consultancy services in various areas of the industry that include engineering, construction, information technology, banking and financial services, have enjoyed good revenues and remain profitable in recent years in comparison with other services sector. Taking a closer look at IT consultancy services for a software project development, for example, there exist a high demand for an experienced IT consultant with skills as a solution architect, project manager, business analyst, risk consultant, and much more. The customer does not want to invest in human capital because the skill set is only required for the duration of the project. The majority of the resources are no longer required after completion of the project. There will always be demand for these professionals regardless of the industry sector as long as customers are embarking on new IT related projects or replacing old systems with fresh technologies. Companies that operate globally are the ones that are heavily dependent on external consultants for project implementations. Cost-savvy companies usually engage a dedicated risk consultant to work alongside a project manager to ensure that the project team remains focus at delivering the project deliverables and leave the responsibilities of managing threats to the risk consultant. The risk consultant will support the project team in the preparation of risk management plan, monitoring and respond to the risk based on the plan, reporting, and escalation to senior management where appropriate. The trend has started since early 2000 to recruit a dedicated risk consultant for the project-related role and this trend is going to continue beyond 2020.


149108996
Banking & Financial Services

The shift towards more intrusive, fragmented and data-intensive regulatory regimes requires firms to push the envelope to achieve economies of scale, operational consistency, and transparency to be embedded as much as possible in financial services business models. Alongside the weight of industry reform focused on risk, capital, and compliance requirements, financial institutions face a new world where the forces of industrialization and innovation intermingle, set against potential fallouts from the recent tide of identity politics around populism and nationalism. Project risks are now important considerations for risk managers. Not immune to the broader cost reduction agenda, risk and compliance functions are required to align to a bank’s strategic responses and contribute to firm-wide efficiency and cost-cutting targets, with the near-term focus on keeping regulators at bay and keeping the lights on. More financial institutions are pursuing efforts to reduce inefficiencies in risk and compliance activities and to optimize an institution’s total cost of risk. The “industrialization of supply chains” which include risk data, risk models, and information production and reporting processes will require firms to invest in emerging innovations, technologies, IT paradigms, and financial technology partnerships in order to achieve a meaningful step change. There has been constant pressure to reduce operational cost and reducing wastage. Banks are continuously moving toward digital banking services, anything that can offer cheaper operating cost and increase profitability. Risk and compliance are one of the areas of where these costs can be reduced specifically project liabilities and ongoing maintenance charges for applications licensing and upkeep of storage and computing devices. Information technology projects are their primary focus since IT spending has been on the rise since the introduction of several technologies associated with mobile devices. The demand for risk management consulting services are increasing steadily in recent years and this positive outlook will continue to grow in parallel with the advancement of information technology.


Technology

Information technology is another term for computing, which is the use of computers and other devices for exchanging, retrieving, storing, and networking of electronic data. Information technology consultants advise companies of all sizes, from startups to large international corporations, on the fastest, most efficient, and cost-effective information technology systems for their business. The specialty areas that information technology consultants may focus on include hardware, software, networks, communications, and web design, among others. The IT consulting industry consists of companies that offer IT specialized consulting services that include business process management, project management, risk management, as well as other business services to technology companies. The specific products of the IT consulting industry are computer systems design, development, and integration; computer application design and development; information technology technical support services; IT risk management, IT network and infrastructure design; and IT technical consulting services. The state of the economy affects companies’ spending on consulting services. During the economic recession in the late 2000s, many companies tightened their budgets and held off on information technology upgrades and replacements, thus scaling back on IT consulting services. The economy has been improving the past few years and the need for information technology consultants is on the rise. The industry’s steady growth is attributed to the strong performance from major markets such as financial services and insurance providers. And the outlook from 2016 through 2021, demand for information technology consultants increasing due to increasing mergers and acquisitions in other industries. As more companies consolidate, IT risk management consultants will be needed to help with the integration of accounting, business process reengineering, information technology transformation, cloud computing, and other technology systems. Successful companies recognize that risk management is important because achieving a project’s goals depends on planning, preparation, results, and evaluation that contribute to achieving strategic goals.


470658729
Education

Businesses today must do everything possible to stay competitive and maintain a highly skilled, motivated staff. Despite today’s very competitive job market, employees often have a little hesitation when it comes to searching for a new job if they become unhappy with their current employer. In order to keep employees satisfied, boost morale, and remain competitive, employers need to be aware of the need for continual employee training and education. One of the most important reasons to offer further training and education to employees is to ensure that work skills stay current. Keeping employees up-to-date with software applications, the latest thinking on logistical methods, and ways to improve efficiency are all necessary to keep businesses on a level playing field with competitors. Training is also an excellent way to retain the best employees. An unsuccessful company is one that does not keep up with trends in business, that is reluctant to change, and that has an unmotivated job staff with stagnant skills. There are many training companies that provide similar training program e.g. soft skills training, technical skills, and leadership program. However, a specialist and unique training program e.g. “risk management training associated with IT projects” will certainly attract a lot of interest. Companies are willing to invest in quality training programs that will bring in high value toward the company businesses, increases productivity, and targeted at developing a specific skill set for their employees. There are huge demands for custom-designed training programs that are related to business processes like risk management, project management, and quality management. The outlook for this sector is very promising, the target market is companies or corporations with IT organization employing a minimum of 100 IT staff.


100906450
Telecommunication

The telecom sector continues to be at the epicenter for growth, innovation, and disruption for virtually any industry. Mobile devices and related broadband connectivity continue to be more and more embedded in the fabric of society today and they are key in driving the momentum around some key trends such as video streaming, Internet of Things (IoT), and mobile payments. The number of “connected things” continues to grow as mobile and “smart” device utilization and connectivity continues to expand which will ultimately shape and define the IoT space. This is a big deal for all sectors within the telecom industry including wireless and wireline/broadband carriers, network equipment, infrastructure companies, and device manufacturers who are all critical components of this key ecosystem. As the number of embedded devices that require mobile connectivity grows, telecommunications companies will be looking for opportunities to increase revenue through their core businesses such as network connectivity, sale of network equipment and devices, all of which this emerging ecosystem will require, as well as through new products and services that are enabled by these core businesses.

Carriers need to continue to focus on providing data and voice services that are high quality, reliable, and affordable. Data usage has been growing dramatically, particularly due to streaming services, and is expected to continue that path in the year ahead. Wi-Fi usage will continue to be key, especially as carriers look to offload more mobile traffic onto broadband networks (especially fiber). Operators are essentially moving away from proprietary, hardware-based network equipment to software-based network functions which should allow them to manage their networks more efficiently and effectively. Massive data consumption will continue to grow with the expansion of IoT and more streaming of content, especially video. The outlook for risk consulting services for this market is positive in 2016 for several years ahead as the telecom sector investing in content-based applications as their core revenues.


Bronze Service

470658621


Monthly cost: USD $1,500.00
Time limit: 5 hours per month
Contract period: 12 months

Bronze service includes:

01. Email support
02. Telephone support
03. Questions & answers
04. Professional advice
05. Communication management

470658631

SERVICE DESCRIPTION
The Bronze Client Service (BCS) for Risk Management provides clients with an entry level option and enables client contacts to become personally acquainted with Dr. Shamsuddin over a sustainable period of time. We suggest that clients allocate up to a maximum of 5 Key Employees for this service. Your Key Employees can then contact the consultant via email, whenever they feel that they need specific advice or support in relation to the consultant’s specialist subject. The consultant will also be proactive about opening and maintaining communications with your Key Employees. Your Key Employees can list and number any questions that they would like to ask and they will then receive specific answers to each and every query that they may have. Your Key Employees can then retain these communications on file for future reference. General support inquiries will usually receive replies within 48 hours, but please allow a period of up to 10 business days during busy periods. The Bronze Client Service (BCS) enables your Key Employees to get to know their designated Appleton Greene consultant and to benefit from the consultant’s specialist skills, knowledge and experience.

Silver Service

162417170


Monthly cost: USD $3,000.00
Time limit: 10 hours per month
Contract period: 12 months

Bronze service plus

01. Research analysis
02. Management analysis
03. Performance analysis
04. Business process analysis
05. Training analysis

119866942

SERVICE DESCRIPTION
The Silver Client Service (SCS) for Risk Management provides more time for research and development. If you require Dr. Shamsuddin to undertake research on your behalf, or on behalf of your Key Employees, then this would understandably require more time and the Silver Client Service (SCS) accommodates this. For example, you may want your consultant to undertake some research into your management, performance, business, or training processes, with a view towards providing an independent analysis and recommendations for improvement. If any research and development, or business analysis is required, then the Silver Client Service (SCS) is for you.

Gold Service

126440658


Monthly cost: USD $4,500.00
Time limit: 15 hours per month
Contract period: 12 months

Bronze/Silver service plus

01. Management interviews
02. Evaluation and assessment
03. Performance improvement
04. Business process improvement
05. Management training

153681171

SERVICE DESCRIPTION
The Gold Client Service (GCS) for Risk Management is intended for more detailed evaluation and assessment, that may require your Key Employees to have monthly meetings or interviews with Dr. Shamsuddin. These meetings and interviews can be conducted over the telephone, Skype, or by video conference if required. The consultant can also attend your business premises, an Appleton Greene office, or another mutually beneficial location, but please note that clients are responsible for the costs of any disbursements separately, including travel and accommodation. This service enables you to integrate the specific skills, knowledge and experience of your designated consultant into your Key Employee management team. The Gold Client Service (GCS) can also incorporate training workshops, business presentations and external meetings with customers, suppliers, associations, or any other business-related stakeholders.

Platinum Service

76756445


Monthly cost: USD $6,000.00
Time limit: 20 hours per month
Contract period: 12 months

Bronze/Silver/Gold service plus

01. Project planning
02. Project development
03. Project implementation
04. Project management
05. Project review

162417170

SERVICE DESCRIPTION
The Platinum Client Service (PCS) for Risk Management is our flagship service and will be required if you need Dr. Shamsuddin to facilitate the planning, development, implementation, management, or review of a particular project relating to his specialist subject, which would obviously require more time and dedication. This service enables you to reserve up to 12.5% of the consultant’s working month and provides a more hands-on service as and when required. If you need more time than this, then this can always be arranged, subject of course to the consultant’s ongoing availability. The benefit of having an external consultant involved in projects is they provide an independent perspective and are not influenced by internal politics, day-to-day responsibilities, or personal career interest. They provide objectivity, specific knowledge, skills and experience and will be entirely focused upon the tasks at hand. The Platinum Client Service (PCS) will provide your organization with a valuable resource as and when you need it.

Benefits

Information Technology
  1. Risk governance
  2. Increase productivity
  3. Efficient operations
  4. Reduce risk
  5. Quality outcomes
  6. Improved processes
  7. Reduce wastage
  8. Improved teamwork
  9. Increased profitability
  10. Cost-benefit realisation
Management
  1. Project governance
  2. Cost control
  3. Risk management
  4. Information management
  5. Improved decision-making
  6. Quality information
  7. Capital allocation
  8. Accurate budgeting
  9. Reduced cost
  10. Improved communications
E-business
  1. Transaction security
  2. Data management
  3. Improved assessment
  4. Process optimization
  5. Reduced risk
  6. Improved effectiveness
  7. Data security
  8. Information security
  9. Enhanced processing
  10. Quality data

Clients

This service’s current clients or employers include:

Oracle
Oracle

Oracle offers an integrated array of applications, databases, servers, storage, and cloud technologies to empower modern business. For most companies, flexibility is critical. Oracle provides a wide choice of software, systems, and cloud deployment models—including public, on-premises, and hybrid clouds—to ensure that technology flexes to the unique needs of a business. Oracle Cloud is a complete, integrated stack of the platform, infrastructure, and application services. With advanced scalability and security, Oracle Cloud enables technical agility across the enterprise, connects people to information for clearer insights, and fosters efficiency through simplified workflows. More than 420,000 customers across 195 countries and territories have harnessed Oracle technology to accelerate their digital transformation. Modern cloud services help companies seize new business opportunities and innovate faster. Oracle delivers the most comprehensive portfolio of integrated cloud solutions for business, IT, and development needs, including software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), and data as a service (DaaS). Oracle Cloud helps businesses offload IT management so that they can focus on their priorities. Designed for cloud computing, the world’s #1 database enables the consolidation and management of databases as cloud services. Companies can accelerate analytical performance—while achieving new levels of efficiency and availability. Oracle Database can be rapidly provisioned and ready to use in minutes. With just a few clicks, customers can set up new database instances in a complete development environment. Best of all, there are no application changes when customers move their legacy databases to Oracle’s secure and optimized cloud platform. MySQL is the world’s most popular open source database, enabling cost-effective delivery of reliable, high-performance, and scalable web -based and embedded database applications. Oracle’s integrated middleware platform for the enterprise and the cloud enables companies to create and run agile, intelligent business applications while optimizing IT efficiency through full utilization of modern hardware and software architectures. Companies of all sizes rely on Oracle’s complete, modern, and secure portfolio of enterprise and industry applications to connect the entire organization and provide data-driven intelligence. Oracle offers maximum personalization and choice, including SaaS applications for customer experience, enterprise performance management, enterprise resource planning, human capital management, supply chain management, and more. Oracle’s enterprise solutions support all types of cloud scenarios, including public, private, and hybrid clouds. Oracle’s dedicated industry organizations provide deep industry expertise and best-of-breed technologies for running a customer’s core business— on-premises or in the cloud. Key industries include communications, education, financial services, health sciences, hospitality, public sector, retail, utilities, and more. Oracle’s integrated systems combine Oracle hardware and software, engineered and optimized to work together to cut complexity and cost. This results in extreme performance, easier deployment and upgrades, and more efficient systems management. Oracle’s enterprise servers deliver advanced security, high performance, simplified management, and high availability at a low cost of ownership. The systems and Oracle software are co-engineered for performance and provide built-in redundancy for maximum uptime and continuous service. Oracle’s application-engineered storage is designed to accelerate application performance, increase efficiency, and improve management. These advanced storage solutions let enterprises simplify IT environments so they can operate more cost-effectively and be more responsive to dynamic business needs. Oracle services help companies optimize their technology investments and resources. Oracle Advanced Customer Support Services and Oracle Premier Support deliver tailored, mission-critical support for complex IT environments to help maximize performance, achieve higher availability, and reduce risk. Oracle Consulting provides deep expertise to help customers succeed with architecture, planning, implementation, upgrade, and migration across the Oracle stack. Oracle Financing offers expertise and insight—along with proven processes and streamlined execution—to help organizations with their IT investments. Oracle Managed Cloud Services enable organizations to extend their Oracle investments into the cloud with greater value, choice, and confidence. Oracle University provides a world-class educational experience, with the best instructors in the industry.

Oracle – Click Here


Hewlett Packard
Hewlett Packard

The full name for the company is Hewlett Packard Enterprise Company, which drops the hyphen that previously existed between the “Hewlett” and “Packard” of the former Hewlett-Packard Company. During and since the separation, many media outlets have incorrectly named the new organization with some using “HP Enterprises” or “HP Enterprise. Hewlett Packard Enterprise Company (commonly referred to as Hewlett Packard Enterprise or HPE) is an American multinational enterprise information technology company based in Palo Alto, California, founded on 1 November 2015 as part of the splitting of the Hewlett-Packard Company. HPE is a business-focused organization with four divisions: Enterprise Group, which works in servers, storage, networking, consulting and support; Services; Software; and Financial Services. The split was structured so that the old Hewlett-Packard changed its name to HP Inc. and spun off Hewlett Packard Enterprise as a newly created company. HP Inc., which retained the old HP’s personal computer and printing business, retained the old HP’s stock price history and the original NYSE ticker symbol for Hewlett-Packard, while Enterprise trades under its own ticker symbol: HPE. HP Enterprise Services was the business and technology services subsidiary of the Hewlett Packard Enterprise strategic business unit. It was formed by the combination of Hewlett-Packard’s legacy services consulting and outsourcing business and the integration of acquired Electronic Data Systems, which had defined the outsourcing business when it was established in 1962 by H. Ross Perot. It was merged with Computer Sciences Corporation to create a new IT services company DXC Technology in April of 2017. On May 13, 2008, Hewlett-Packard confirmed that it had reached a deal with Electronic Data Systems to acquire the company for $13.9 billion.[3] The deal was completed on August 26, 2008. EDS became an HP business unit and was renamed EDS, an HP company.[4] Ronald A. Rittenmeyer, EDS chairman, president, and CEO, remained at the helm and reported to HP CEO Mark Hurd until his retirement. By September 2009, EDS began calling itself HP Enterprise Services, a name change which came one year after HP announced the acquisition.[5] By the end of 2009, HP Enterprise Services managed more than 380,000 servers in 60 countries, the largest locations being the United States, India and the UK. It was ranked as one of the largest service companies on the Fortune 500 list with around 2,000 clients. In 2010, HP Enterprise Services was ranked first in Corporate Responsibility Magazine’s “Corporate Citizens in Government Contracting” listing. HP ES operates in 60 countries, centered in the metropolitan areas of Dallas-Fort Worth; Detroit; Des Moines and Clarion, Iowa; Salt Lake City; Indianapolis; Winchester, Kentucky; Tulsa, Oklahoma; Boise, Idaho; and Northern Virginia in the United States. Other major facilities are in Bulgaria, Romania, Argentina, Colombia, Panama, Costa Rica, India, Brazil, Mexico, Canada, Egypt, Germany, the United Kingdom, Australia, New Zealand, Hungary, Slovakia, Spain, Israel, South Africa, Italy, Malaysia and the Philippines. Its services include: Infrastructure Technology Outsourcing (ITO) – includes maintaining the operation of part or all of a client’s computer and communications infrastructure such as networks, mainframes, “midrange” and Web servers, desktops and laptops, and printers; Applications & Business Services (ABS) – involves the developing, integrating, modernizing, and/or maintaining of applications software for clients; Industry Services, including Business Process Outsourcing (BPO) – addresses the core business challenges of clients in five key industries: healthcare, transportation, communications, government, and financial services, among others. BPO involves performing a business function for a client, like payroll, call centers, insurance claims processing, and so forth. HP Enterprise Services promotes products of HP Enterprise Business, sharing its marketing.programs.

Hewlett Packard – Click Here


IBM
IBM

International Business Machines Corporation (commonly referred to as IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries. The company originated in 1911 as the Computing-Tabulating-Recording Company (CTR) and was renamed “International Business Machines” in 1924. IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology. IBM is also a major research organization, holding the record for most patents generated by a business (as of 2017) for 24 consecutive years. Inventions by IBM include the automated teller machine (ATM), the PC, the floppy disk, the hard disk drive, the magnetic stripe card, the relational database, the SQL programming language, the UPC barcode, and dynamic random-access memory (DRAM). The IBM mainframe, exemplified by the System/360, was the dominant computing platform during the 1960s and 1970s. IBM has continually shifted its business mix by commoditizing markets focusing on higher-value, more profitable markets. This includes spinning off printer manufacturer Lexmark in 1991 and selling off its personal computer (ThinkPad/ThinkCentre) and x86-based server businesses to Lenovo (2005 and 2014, respectively), and acquiring companies such as PwC Consulting (2002), SPSS (2009), and The Weather Company (2016). Also in 2014, IBM announced that it would go “fabless”, continuing to design semiconductors, but offloading manufacturing to GlobalFoundries. Nicknamed Big Blue, IBM is one of 30 companies included in the Dow Jones Industrial Average and one of the world’s largest employers, with (as of 2016) nearly 380,000 employees. Known as “IBMers”, IBM employees have been awarded five Nobel Prizes, six Turing Awards, ten National Medals of Technology and five National Medals of Science. Products and services InterConnect, IBM’s annual conference on cloud computing and mobile technologies. Blue Gene was awarded the National Medal of Technology and Innovation in 2009. IBM has a large and diverse portfolio of products and services. As of 2016, these offerings fall into the categories of cloud computing, cognitive computing, commerce, data and analytics, Internet of Things, IT infrastructure, mobile, and security. IBM Cloud includes infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS) offered through public, private and hybrid cloud delivery models. For instance, the IBM Bluemix PaaS enables developers to quickly create complex websites on a pay-as-you-go model. IBM SoftLayer is a dedicated server, managed hosting and cloud computing provider, which in 2011 reported hosting more than 81,000 servers for more than 26,000 customers. IBM also offers Cloud Data Encryption Services (ICDES), using cryptographic splitting to secure customer data. IBM also hosts the industry-wide cloud computing and mobile technologies conference InterConnect each year. Hardware designed by IBM for these categories include IBM’s POWER microprocessors, which are employed inside many console gaming systems, including Xbox 360, PlayStation 3, and Nintendo’s Wii U. IBM Secure Blue is encryption hardware that can be built into microprocessors, and in 2014, the company revealed it was investing $3 billion over the following five years to design a neural chip that mimics the human brain, with 10 billion neurons and 100 trillion synapses, but that uses just 1 kilowatt of power. In 2016, the company launched all-flash arrays designed for small and midsized companies, which includes software for data compression, provisioning, and snapshots across various systems. IT outsourcing also represents a major service offered by IBM, with more than 40 data centers worldwide. AlphaWorks is IBM’s source for emerging software technologies, and SPSS is a software package used for statistical analysis. IBM’s Kenexa suite provides employment and retention solutions and includes the BrassRing, an applicant tracking system used by thousands of companies for recruiting. IBM also owns The Weather Company, which provides weather forecasting and includes weather.com and Weather Underground. Smarter Planet is an initiative that seeks to achieve economic growth, near-term efficiency, sustainable development, and societal progress, targeting opportunities such as smart grids, water management systems, solutions to traffic congestion, and greener buildings. Services offerings include Redbooks, which are publicly available online books about best practices with IBM products, and developerWorks, a website for software developers and IT professionals with how-to articles and tutorials, as well as software downloads, code samples, discussion forums, podcasts, blogs, wikis, and other resources for developers and technical professionals.

IBM – Click Here



RHB Bank
RHB Bank

Fourth largest fully integrated financial services group in Malaysia. Core businesses are streamlined into the following business pillars, Group Retail Banking, Group Business & Transaction Banking, Group Wholesale Banking, Group Shariah Business, Group International Business, Group Insurance, Group Wholesale Banking consists of Corporate Banking, Investment, Client Coverage, Group Treasury & Global Markets, Asset Management, Private Equity. Main subsidiaries: RHB Investment Bank Berhad, RHB Islamic Bank Berhad, RHB Insurance Berhad. Asset Management and Unit Trust businesses are undertaken by RHB Asset Management Sdn Bhd, RHB Islamic International Asset Management Berhad. The Group’s regional presence now spans ten countries including Malaysia, Singapore, Indonesia, Thailand, Brunei, Cambodia, Myanmar, Hong Kong (with a representative office in China), Vietnam and Lao PDR. Pursuant to the Group Corporate Restructuring Plan, RHB Bank Berhad is now the ultimate holding company of the RHB Banking Group effective 13 June 2016. It has been listed (in place of RHB Capital Berhad, the former ultimate holding company of RHB Banking Group) on the Main Market of Bursa Malaysia Securities Berhad on 28 June 2016. RHB Bank is the country’s oldest and first local bank with the incorporation of the Kwong Yik (Selangor) Banking Corporation (Kwong Yik Bank) in July 1913. The Group is involved in commercial banking and finance related business, Islamic banking, investment banking, stock broking, leasing, offshore banking, offshore trust services, property investment, general insurance, unit trust management, asset management and nominee and custodian services. RHB Bank today has over 380 delivery channels including a network of branches and offices located regionally in Malaysia, Singapore, Thailand, Brunei, Cambodia, Laos, Myanmar and Vietnam and its award winning EASY by RHB platform. As at June 2016, RHB Bank has a total of 334 branches located regionally in Malaysia, Singapore, Thailand, Brunei, Cambodia, Laos, Myanmar and Vietnam. RHB Investment Bank Berhad (“RHBIB”) is a leading player in the Malaysian capital markets with presence in Singapore, Hong Kong / Shanghai, Indonesia, Thailand, Cambodia and Vietnam. A wholly-owned subsidiary of RHB Bank Berhad, RHBIB is also the largest investment bank in Malaysia by asset size. Supported by an award-winning team of research analysts, RHBIB offers a complete suite of capital market solutions, securities broking, asset management and trustee services to a wide range of corporate, institutional, retail and high net worth clients. RHBIB continues to win industry awards and accolades which recognise its leading roles in successfully completing numerous landmark capital market transactions locally and regionally. Established in 2005, RHB Islamic Bank Berhad is the first full-fledged Malaysian Islamic bank that has matured from an Islamic banking window operations. As a wholly-owned subsidiary of RHB Bank Berhad, it is the key driver of Shariah business for the entire RHB Banking Group offering a full suite of shariah compliant financial products and solutions to all retail, commercial and corporate customers. RHB Insurance Berhad (“RHB Insurance”) is a subsidiary of RHB Bank Berhad. Established since 1979, the company has close to four decades of experience in providing a full range of general insurance products and services to its customers. The company offers its products and renders its services via a wide network of RHB Insurance branches, RHB Bank Berhad branches and Easy-by-RHB outlets, Pos Malaysia Bhd offices and more than 1780 authorized agent offices throughout Malaysia. RHB Asset Management Sdn Bhd (“RHBAM”) is a wholly-owned subsidiary of RHB Investment Bank Berhad. On 1 December 2013, RHB Asset Management Sdn Bhd officially merged with OSK Investment Management Berhad and the merged entity now operates under the legal entity name of RHB Asset Management Sdn Bhd. RHB Group Asset Management enjoys a significant presence in the ASEAN and Greater China region, with offices in Malaysia, Hong Kong, Indonesia, and Singapore where we offer customers close to 30 years’ worth of expertise and knowledge in asset management.

RHB Bank – Click Here


CIMB Bank
CIMB Bank

CIMB Group is a leading KL-headquartered ASEAN universal bank, one of the largest investment banks in Asia and one of the largest Islamic banks in the world. As the fifth largest banking group in ASEAN, we have around 39,000 staff in 15 countries across ASEAN, Asia and beyond. CIMB Investment Bank provides market-leading conventional and Islamic financial advice for a tailored delivery of banking solutions to our clients. We have structured and executed award winning deals which showcase our ability to innovate and help our clients achieve their goals. CIMB also has an extensive retail banking network of over 900 branches serving more than 12 million customers. Beyond ASEAN, we also have presence in China & Hong Kong, India, Sri Lanka, Korea, the US and the UK.
CIMB is ranked among the top banks in ASEAN, garnering numerous awards across the years such as the 2016 Islamic Bank of the Year – Global award by The Banker magazine, Best Bank 2016 and Best Investment Bank in Malaysia 2016 by FinanceAsia Country Awards and many others. With over 1,000 branches, we have the widest retail banking network in ASEAN. We operate also in 15 markets around the globe – with over 40,000 staff serving and connecting our 13 million customers. Brunei, Indonesia, Singapore, United States, Cambodia, Laos, Sri Lanka, United Kingdom, Hong Kong & China, Malaysia, South Korea, Vietnam, India, Myanmar, Thailand. CIMB’s brand promise is reflected in the expression of Forward. This reflects our commitment towards enabling our customers to achieve their dreams, goals and aspirations. Through our products, services, solutions, innovations and advice, we enable our customers and clients to navigate the opportunities and obstacles they face as they move forward toward their goals. From all corners of ASEAN we draw on our people, knowledge and insights to bring the best of the region toward propelling our stakeholders and our organization forward. We believe in embracing diversity and have always welcomed differences in thought, opinion, culture and language, and draw upon our regional capabilities to advance our customers Forward. Our brand architecture reflects how we deliver value in different ways to enable our customers to move forward to their goals. 2009 – New Headquarters for CIMB Bank and CIMB Islamic. The 39-storey Menara Bumiputra-Commerce houses CIMB Group’s consumer banking franchises — CIMB Bank and CIMB Islamic. Officiated by the Seri Paduka Baginda Yang di-Pertuan Agong Tuanku Mizan Zainal Abidin Ibni Al-Marhum Sultan Mahmud Al-Muktafi Billah Shah and Seri Paduka Baginda Raja Permaisuri Agong Tuanku Nur Zahirah, the building site was partly chosen to preserve the Bank’s historical links to the area where the headquarters of the Bank’s predecessors, Bank Bumiputra and the United Asian Bank, were located. 2009 – CIMB Thai officially launched. CIMB Thai’s new brand and logo were unveiled to the public in May 2009 by Khun Korn Chatikavanji, Thailand’s Minister of Finance. The rebranding launch, which was also attended by Dr Tarisa Watanagese, Governor of the Bank of Thailand, was part of CIMB Thai’s transformation into becoming a financial institution that offers innovative products and service to the Thai market, backed by the resources of a leading regional universal banking group. 2009 – Launch of CIMB Bank Singapore. CIMB Group set up consumer banking services in Singapore in September 2009. Through its strong service propositions, CIMB Bank Singapore has brought innovative products that maximise value for money in a competitive environment. The retail banking component complements CIMB Group’s existing securities, advisory and corporate lending businesses in Singapore. 2013 – CIMB Group expands to Taiwan, India & Korea. CIMB Group completes its Asia Pacific investment banking platform with new operations in Taiwan and India and Korea. The Group moves into its new headquarters in Menara CIMB, located at the high-tech hub of Kuala Lumpur Sentral. 2014 – CIMB Group begins operations in Lao PDR. CIMB Group begins operations in Lao PDR with the opening of CIMB Thai – Vientiane Branch. This is CIMB Thai’s first foreign branch and extends CIMB Group’s presence to 9 out of 10 ASEAN nations. 2014 – CIMB Group launches new headquarters. CIMB officially launches its 40-storey headquarters in conjunction with the 40th anniversary of CIMB Group’s investment banking franchise. The ceremony was officiated by Prime Minister Dato’ Sri Najib Tun Razak, whose father Tun Abdul Razak Hussein had launched CIMB’s precursor bank in 1974.

CIMB Bank – Click Here

Locations

This service is primarily available within the following locations:

Jakarta 2
Jakarta ID

Digital transformation plays a key role in fuelling the growth of the banking industry in Indonesia. Banks started to direct their focus at implementing business support applications following the recent rise in credit risk in the country. Although Indonesia is the most attractive market for financial services in Southeast Asia, despite what people may think, the most immediate prospects for business growth and economic growth are not the main attractions but rather, the longer-term potential of a large, growing market with current low banking penetration. The banking industry in Indonesia is undergoing a significant transformation driven by technology. Technology will be the main driver of transformation in the majority of Indonesian banks over the next three to five years. Technology is seen by many especially mid-size banks as a way to level the playing field with larger banks by providing new access to customers while driving down the cost of acquisition and servicing. Traditional banking through branches and automated teller machines and kiosks, physical branches currently account for more transactions than digital channels, some banks are already witnessing a shift in the last two years. In 2015 survey, 75% said more than half their transactions were via the branch, whereas this year, it was down to 45%. In contrast, in 2015, only a quarter of transactions were made via a mobile device or over the internet, which is now up to 48%. Nevertheless, a key concern still persists with relation to the outlook for growth, as almost all bankers see credit risk as the biggest challenge to loan growth and more than one-third are either undecided or feel that NPLs will remain at the same level according to a survey conducted by Bloomberg late last year. In order to address this situation, the banking sector is looking at new banking applications to assist in the process of credit processing with stricter controls. With so many solutions available in the market, the process of selecting the right software and choosing the right vendor for a successful implementation has created another problem. Which solutions offer the minimum risk? Lack of risk expertise in the information technology organization creates another problem in the process of selection and evaluation of the right solution provider. The market for risk management consultancy services specifically in the information systems project development and implementation has seen a significant increase since early 2016. Statistics indicate that quite a number of failed software projects in recent years are due to lack of expertise in risk management. Banking and financial institutions suffered the most because of the large number of applications that they need to deploy to support their business and operations. Other sectors that are severely affected are the government ministries where their departmental support applications need to be custom-designed and develop because of the unique processes. Searching for the right ready-made software is almost impossible. The construction of any bespoke applications poses major threats during the various stages of the design and development. Risk management consulting services will be required across all the phases of the software development life cycle. There are several hundred banks in the country, the prospects for IT risk management consulting services in project implementations are in demand today and will continue to grow for as long as there are demands for new IT applications.


Bangkok
Bangkok TH

To help modernize the economy, the government has earmarked ?27.9 billion of investment for 2017-21 in four digital areas: commerce, entrepreneurship, innovation, and content. In 2018, Thailand’s first technological innovation park is scheduled to open in Chonburi province, southeast of Bangkok. The ?10-billion project will promote Thai tech start-ups and hopes to attract global tech companies to invest in data servers and research and development as a hub for the Association of Southeast Asian Nations member countries. The information technology industry is growing from 2017 for the next 5 years to ensure that the government key performance objectives are realized. Just like any other country, the country saw an increase in the number of aging population that affected its growth. This open doors to expatriates with skills and knowledge to provide technical services in strategic areas primarily in information technology. Business-to-consumer applications are getting popular due to the increasing number of online traders and buyers annually. E-commerce through the Internet has generated great demand for expertise in web development, computer graphics and design, mobile applications, and advertising. The financial institutions are developing a secure e-commerce platform to support the increasing number of online consumers. The government provides loans to support the growing number of young entrepreneurs that require some start-up capital to design and build content-based applications. While more complex and large IT-based projects have been awarded by the government in recent years to major tech companies to develop the e-commerce infrastructure and to provide secure hosting platforms for the small medium enterprises. Most of these tech companies engage foreign consultants to undertake a leading role in the project particularly in business process management, risk management, and project management. The scope of consulting services need to focus on business process management associated with IT risk governance specifically for software development, bid management, implementation of project risk management methodology, provision of consultancy services for IT and risk management integration, and training associated with the risk management processes specifically for software project management.


Manila (Philippines)
Manila PH

IT transformation has been the theme of outsourcing market since the start of 2016. More end users have been engaged in outsourcing projects in 2016 because of the need to consolidate resources and scale down IT infrastructure cost. Hosted services have been driving the growth of overall outsourcing market. SMEs are more conventional on their ICT priorities, focusing on the improvement of their basic infrastructure, while large enterprises are taking into account the enhancement of new technology requirement, hence more project-based (e.g. Systems Integration (SI) and IT consulting) and managed services (e.g. data center outsourcing) opportunities. Project-oriented services, as a proportion of total services spend in the country, increased. This can be attributed to the demand for consulting and systems integration services for data center deployments, the movement to cloud, and need for Big Data and analytics-centric projects. Enterprises are increasingly opting for outsourcing to reduce costs, have faster service delivery, better manage their finances, and integrate business processes easily. Furthermore, growth was enhanced by the expansion of global BFSI and manufacturing companies. As a result, there was an increased demand for colocation services, server hosting, and cloud-based services. SIs in the Philippines are very traditional, which are still hardware-centric. Most SIs are still transitioning to becoming solutions providers, and some have just started infusing 3rd Platform technologies in their products. In addition, they plan to expand outside of Metro Manila and other regions like ASEAN and North America. Key promotion and pricing strategies are tied with the principals for most of them. Some end users are in wait-and-see mode in terms of technology adoption, but they prefer vendors that they trust and work with. One of the strategies is to work with local system integrators that have over the years established strong connections with end users in the financial services, telecommunications, and manufacturing industries. Leading IT vendors like IBM, HP, Oracle have established a strong presence in this country with local partners like Questronix, Fountainhead Technologies, Jupiter Systems, AMTI are some of the best names in the local IT industry. There is a huge market for risk management consultancy services in association with IT projects, either directly working with customers or via system integrators.


Kuala Lumpur MY 2
Kuala Lumpur MY

The Malaysian ICT market is going through a lot of changes and will gain momentum. Capabilities will be built in digital content, software development and testing, Internet of Things (IoT), data centers and cloud services, cyber security and big data analytics (BDA). The Government has taken the special interest in developing the Internet of Things (IoT) sector, which has resulted in several market partnerships. The commercialization of ‘smart city’ infrastructure, applications, and services such as smart highways, intelligent traffic management systems and advanced energy management systems are expected to drive IoT adoption across key social and economic sectors. Over the last five years, the data center industry has grown rapidly to support 26 data center service companies and nearly 200 specialized service providers capable of providing affordable, scalable and high-quality remote data storage and retrieval services to the growing numbers of multinational corporations looking to establish regional headquarters in the country. Cloud computing is expected to gain momentum with growing investments in data centers and ICT infrastructure in Malaysia. Multimedia Super Corridor (MSC) Malaysia has named cloud computing as the most important of its top 10 strategic technology priorities. The government hopes that adoption of cloud computing, building on the national broadband initiative, could accelerate Malaysia’s development into an advanced economy. In Malaysia, Software-as-a-Service (SaaS) has the highest adoption of cloud computing followed by Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Hybrid Clouds remain the dominant form of deployment by enterprises and this model has been recognized by service providers as a key growth market. While the adoption of cloud computing offers multiple potential benefits, there are also concerns regarding bandwidth consumption, lack of maturity of cloud environments, latency, data security and privacy guarantees from service providers. Ministry of Science, Technology, and Innovation (MOSTI) identified R&D in cyberspace security as a critical issue for the continued development of its IT and telecoms sectors. MOSTI stated the imperative of reducing the vulnerability of critical infrastructures such as power grids, air traffic control systems, military and financial systems. More focus will be given to key areas such as secure communications to protect the confidentiality and integrity of information during transmission and storage, high availability systems to ensure continuous and uninterrupted operations of critical IT software projects, network surveillance to detect and respond to incidents of system disruption, secure access to protect the ICT system from unauthorized entry, and system integrity controls to ensure that a system and its data are not illicitly modified or corrupted. These changes in growth are attributed to the move from traditional computers to smaller ICT devices and wearable gadgets, the increasing amount of real-time and interactive multimedia content supported by mobile technology, the rising popularity of cloud computing, Big Data Analytics, software-as-a-service (SaaS), social media applications, Internet of Things (IoT) and wearable technology, the integration of systems and processes and ICT services by and with the people and institutions and service providers. Currently, its share to gross domestic product (GDP) is 17.3 percent (USD 62 billion in current prices) in 2016. Despite the slower economy in 2016, the ICT industry registered 14.2 percent growth, based on the 12.5 percent growth that the industry experienced in 2015. The outlook for consultancy services remains bullish specifically in the risk management associated with cloud computing projects, Internet of Things (IoT) projects, e-commerce, and security systems.


Singapore Garden
Singapore SG

Despite Singapore’s low unemployment rate, skills challenges exist in a number of key growth industries as a result of the ongoing structural changes in the economy, the impact of disruptive technologies. The industries in Singapore most in need of skilled workers include the information and communications technology sector, which currently employs about 150,000 workers. The government forecasted that by 2017, the ICT industry will require an additional 15,000 workers, particularly in the areas of cyber security, data analytics, software development and network infrastructure, a number that could rise to 30,000 by 2020. A lack of necessary work experience and specialist skills, and the perceived uncompetitive pay are the main reasons why engineers are shunning the industry. The skills gap is set to widen as Singapore moves towards an innovation-driven economy, especially in newer engineering fields like robotics and digital manufacturing. The outlook for ICT services, particularly in risk management looks promising in 2017 onwards because the business processes and methodology will be applied across any of the ICT program initiatives i.e. cloud computing, Internet of Things, security applications, and data center services. The government is considering moderating the pace of change in targeting new sectors for growth. Industries will be given time to mature to gain scale and depth and achieve international competitiveness. This would also allow time for skilled workers to keep up with changing demands. Given the dynamic nature of Singapore’s economy, demands for specialist services continue to grow specifically resources with specialized skills in project and risk management, evaluation of risks in software projects, risk governance, and the implementation of risk and compliance processes. Most technology companies and software houses are competing with one another to obtain the best-skilled resources. Banking and financial institutions share the same situation, lack of qualified and skilled IT resources have affected their plans to transform into a full-fledged digital banking. Lots of opportunities for experienced professionals in areas related to IT project management and risk management. The value to be derived from the investments in these new digital technologies needs to be assessed including technological risks and operational risk after implementation. An understanding of risk and the application of risk assessment methodology is essential to being able to efficiently and effectively create a secure computing environment. Unfortunately, this is still a challenging area for information professionals due to the rate of change in technology, the relatively recent advent and the explosive growth of the Internet, and perhaps the prevalence of the attitude that assessing risk and identifying the return on investment is simply too hard to do. It is vital to managing risks to systems. Understanding risk, and in particular, understanding the specific risks to a system allow the system owner to protect the information system commensurate with its value to the organization. The fact is that all organizations have limited resources and risk can never be reduced to zero. So, understanding risk, especially the magnitude of the risk, allows organizations to prioritize scarce resources.

Achievements

Oracle
Oracle

Oracle Corp Malaysia applications consulting division has achieved better project risk management where senior management also benefits from knowledge of the risks associated with proposed projects through identification of areas of redundancy and inefficiency which allows financial and human capital to be allocated more effectively. Oracle improved its operational effectiveness, where the net effect of all the activities above means governance, risk and compliance activities are directed to the appropriate people and departments. Decision-making by the pre-sales support team improved drastically after applying the knowledge of the risks involved in a project. The knowledge gained from the training and coaching had improved their assessment of contingencies that actually reflect the risks and that also tend to discourage the acceptance of financially unsound projects. The overall performance with a reduction in costs had contributed to the overall return on investment gains represented by effective governance and risk compliance activities.


IBM
IBM

IBM Malaysia professional services division has achieved improvement in risk assessment, an increased understanding of the project risks which in turn leads to the formulation of more realistic plans in terms of both cost estimates and project delivery schedule. One of the remarkable achievement is the higher quality information, this is achieved through integrating governance and risk information that allows management to make intelligent decisions more accurately and rapidly. Incorporating risk management the important function of project governance had provided the project team with a framework for accurate budgeting, where the cost of all expenses including allocation for contingencies associated with project risks can be easily accounted for, hence reduce unnecessary wastage during the budgeting process. Higher quality information was achieved through integrating governance and risk information that allows management to make intelligent decisions more rapidly. Statistical information, contribute to the build-up of historical information of risks that will assist in the modeling of future projects.


Hewlett Packard
Hewlett Packard

Hewlett Packard outsourcing services division had achieved higher quality information through integration of governance and risk information that allows management to make intelligent decisions more rapidly. Disaster recovery services is a risky business. Disaster recovery that represents one of the business portfolios of HP outsourcing services comprised of a number of business processes where these are delivered to the customer in the form of a service. Each service process carries a risk, they are minimized through process optimization. The non-value-added activities are eliminated and value-added activities are streamlined to reduce lag time and undesirable variation where these risks are reduced significantly. Lower costs contribute to the overall return on investment gains represented by effective governance and risk compliance activities. Improved risk assessment, an increased understanding of the risk impacting the disaster recovery services which in turn leads to the formulation of more realistic service delivery plans in terms of both cost estimates and project schedule.


RHB Bank
RHB Bank

RHB Bank IT division has achieved significant benefits from the application of risk management processes in their IT transformation projects, one of which was the contact center and electronic banking services project. Opportunities exist to transform governance, risk and compliance program to realize cost savings and improve mission and business performance. RHB Bank IT have achieved successful results by focusing on shifting risk management focus to a cross–functional approach aligned to strategic risks and business performance measures. RHB Bank focuses on standardizing governance risk and compliance processes to enhance decision making and avoid unnecessary costs. They also embraced governance risk and compliance technology to execute processes effectively and efficiently. Improved effectiveness, where the net effect of all the activities above means governance, risk and compliance activities are directed to the appropriate people and departments. RHB Bank achieved cost reduction in internal and external risk activities, including monitoring and remediation. A significant reduction in disruption to the business and improvement in business performance and innovation via value–based risk management.


CIMB Bank
CIMB Bank

CIMB Bank achieved significant benefits from the implementation of program risk management. Program risk management has brought a positive impact to the bank with a number of benefits, including reduced contingency budgets, the ability to focus resources on top risks for the program and not just for individual projects, identifying inconsistencies, identifying systemic risks, and, last but not least, cost savings by mitigating risks at program level. The assessment of project risk to determine its viability and the cost of risks were easily known via this tool that had facilitated the IT project team in managing and controlling the project expenditure, reducing wastage and increase accuracy in the budgeting process. By implementing risk management processes in the information technology division, CIMB Bank achieved success by minimizing and eliminating negative risks so projects can be completed on time. This enables the bank to meet its budget and fulfill its targeted objectives. Formerly without the risk management strategies in place, projects get exposed to problems and become vulnerable. Effective risk management strategies helped the bank to maximize profits and minimize expenses on activities that do not produce a return on investment.

Personal Profile

Mr Chicles is an approved Certified Learning Provider (CLP) at Appleton Greene who is a business leader and strategist with broad experience in the global multi-industrial, aerospace and defense sectors. He is a seasoned operational leader of global industrial businesses, leading transformational strategies in highly competitive markets.

As a senior, C-suite strategist for multiple major industrial corporations he has led multiple mergers, acquisitions, divestitures and restructurings, as well as corporate break-ups and spin-offs. He has a distinguished track record of successful transformations of complex organizations in dynamic and uncertain market conditions while engendering the trust and buy-in of employees, customers, vendors, owners, corporate leadership and boards of directors.

A highly engaged leader at the personal and team level he has demonstrated the ability to engender effective senior teams and boards. He’s also an active mentor, teacher and community leader.

Mr Chicles is an active board member with AES Seals, global leader in sustainable reliability engineering, and Micro Technologies Inc, an electronics and advanced manufacturing company. He is a principal partner with ProOrbis Enterprises®, a management science consultancy with premier clients such as the US Navy and PwC, as well as the principal of Xiphos Associates™, a management and M&A advisory. Recently, he served as Board Director and Chairman of Global Business Development with Hydro Inc. the largest independent pump and flow systems engineering services provider in the world.

He was President of ITT’s Industrial Process / Goulds Pumps business segment a global manufacturer of industrial pumps, valves, monitoring and control systems, and aftermarket services for numerous industries with $1.2 billion in revenue, 3,500 employees and 34 facilities in 17 countries. Preceding this role he served as Executive Vice President of ITT Corporation overseeing the creation of a newly conceived ITT Inc. following the break-up of the former ITT Corporation to establish its strategy and corporate functions such as HR, communications, IT and M&A, building the capabilities, policies and organizations for each.

He joined ITT Corporation’s executive committee as its strategy chief in 2006 and instituted disciplined strategic planning processes and developed robust acquisition pipelines to respond to rapidly changing markets. Created successful spin-offs of 2 new public corporations Exelis Inc. and Xylem Inc. ITT Corporation was named one of “America’s Most Respected Corporations” by Forbes for exemplary management and performance during his tenure there.

Before joining ITT, Mr Chicles served as Vice President of Corporate Business Development and head of mergers and acquisitions for American Standard / Trane Companies, where he initiated and closed numerous transactions and equity restructurings globally.

Additionally, he created and led the corporate real estate function which entailed more than 275 real estate transactions around the world.

He began his career at Owens Corning rising through the ranks in various operational roles to Vice President of Corporate Development.

Recently, he taught advanced enterprise strategy at Stevens Institute of Technology as an adjunct professor and still supports start-ups through the Stevens Venture Center. He continues to be active as the Founding Board Member with several successful start-up technology businesses and non-profit organizations. A community leader, Mr Chicles has held the role of President of the Greek Orthodox Cathedral in Tenafly, N.J., He also led trips abroad to Cambodia and Costa Rica to build sustainable clean-water solutions and affordable housing.

His formal education includes earning a Masters of Business Administration from The Wharton School at the University of Pennsylvania, and a Bachelors in Finance from Miami University.

(CLP) Programs

People 3

Appleton Greene corporate training programs are all process-driven. They are used as vehicles to implement tangible business processes within clients’ organizations, together with training, support and facilitation during the use of these processes. Corporate training programs are therefore implemented over a sustainable period of time, that is to say, between 1 year (incorporating 12 monthly workshops), and 4 years (incorporating 48 monthly workshops). Your program information guide will specify how long each program takes to complete. Each monthly workshop takes 6 hours to implement and can be undertaken either on the client’s premises, an Appleton Greene serviced office, or online via the internet. This enables clients to implement each part of their business process, before moving onto the next stage of the program and enables employees to plan their study time around their current work commitments. The result is far greater program benefit, over a more sustainable period of time and a significantly improved return on investment.

People 4

Appleton Greene uses standard and bespoke corporate training programs as vessels to transfer business process improvement knowledge into the heart of our clients’ organizations. Each individual program focuses upon the implementation of a specific business process, which enables clients to easily quantify their return on investment. There are hundreds of established Appleton Greene corporate training products now available to clients within customer services, e-business, finance, globalization, human resources, information technology, legal, management, marketing and production. It does not matter whether a client’s employees are located within one office, or an unlimited number of international offices, we can still bring them together to learn and implement specific business processes collectively. Our approach to global localization enables us to provide clients with a truly international service with that all important personal touch. Appleton Greene corporate training programs can be provided virtually or locally and they are all unique in that they individually focus upon a specific business function. All (CLP) programs are implemented over a sustainable period of time, usually between 1-4 years, incorporating 12-48 monthly workshops and professional support is consistently provided during this time by qualified learning providers and where appropriate, by Accredited Consultants.

Executive summary

Key Knowledge Transfer

Acquisitive Growth

In today’s context of changing markets, technologies and business models, and in conjunction with historic levels of available capital, acquisitive growth has emerged as an increasingly compelling approach to transformational growth. However, as has been empirically proven growth through acquisitions is fraught with pitfalls and inherently risky. Successfully acquisitive growth requires the confluence of many factors that go beyond the traditional phased steps of a typical process. In my experience success is a function of bringing together the elements of people, processes, and technologies into a set of capabilities that are custom-made for an organization’s particular strengths, circumstances and aspirations. Winning in today’s dynamic markets demands bold, unique and sustainable strategies. The following are the stages of such an approach that I have found to create high probability, profitable growth that stands the test of time.

Additionally, while the M&A industry has many advisors available, they tend not to be operating executives who have lived through all the elements I will lay out below. Many simplistic guidelines exist, however what its clear is that the difference between success and failure with acquisitive growth is not in rote adherence to some set of processes, rather it is found in the combination of process discipline and strong application of experiential, practical knowhow. The nature of this knowhow is to apply and allocate the elements below in a smart, efficient manner to achieve exemplary outcomes for the specific client’s unique situation and circumstances.


Strategy Development: Whether at the corporate level or in a specific business unit, clients would be taken through steps to clarify the markets and segments where they currently compete and where they want to go in the future, what differentiates them from competition, where capabilities need to be refined or built, and the various functional elements (e.g. systems, processes, structures, etc.) critical to sustain profitable growth. Approach would be a combination of review of current strategies/capabilities, interviews and facilitated discussions and structured workshops. Outcomes might be a strategy to bring a particular business into a new growth phase or to meet changing competitive environments, or at the enterprise level might entail “platform building” whereby new businesses, sectors or legs are build from the ground up through foundational initial acquisitions and subsequent organic and inorganic initiatives.

Market Focus: Where will we hunt for acquisition targets? If a company allows too-wide of a scope will find themselves suffering from expensive resource drains/distractions and/or dilute efforts. Therefore, following the alignment of enterprise/business strategies the process will seek to focus the market segments and the business criteria to qualify a company to be elevated to possible target.

Research Possible Targets: Simply put, take the descriptions and criteria from above and create lists of potential targets that might fit. Each such company is researched for available information, any currently available knowledge the client might have, etc. Output is a gross list of possible targets.

Target Approach: Utilizing a number of possible approaches, one that is appropriate for the client is determined. For example, some companies may have business development or sales teams who could participate in this stage, or on the other hand for reasons such as confidentiality, resource scarcity, etc this might need to be put into the hands of specific individuals (senior executives, dedicated M&A executives, 3rd party services, etc.). Each company is different, so this is an exercise of matching needs with capabilities. The objective is to screen the gross target list to elminate those who have “killer facts” such as big contingent liabilities, prohibitive complexity such as a company with a complex ownership structure, our any other aspects that renders a target not acceptable for the next step.

Cultivation: This is a very critical part of the overall process. The essence of this authentic, genuine and meaningful relationship-buidling which requires a combination of individuals with certain skill-sets to ‘sell’ the prospects on being acquired, patience and persistence. I have many approaches, processes and techniques that I have and continue to use to great effect in this regard. Output is a short list of interested targets who have moved to active discussions and in-person meetings.

Target Assessment: During the cultivation phase as it gets more advanced, a critical success factor for effective acquisitive growth is the ability to narrow the list with limited amounts of information. This is important because the next phase is quite intensive so any company can not practically thoroughly assess all such targets. In other words, how does a client gain the insights needed to do this? Some might consider this the ‘phase I due diligence’ whereby, prior to the engagement of expensive resources such as lawyers, accountants, etc., an overview of a target’s current status is determined. Through structured and open discussions, the client engages in discussions with the targets to learn as much as possible..

Preliminary Offer: Structuring of a term sheet or letter of intent based on finding to date. Depending on these findings, certain terms may be included to lay out a) value expectations; b) focus for due diligences and commitment to support it; and c) various legal terms typical for these agreements. This tend to be non-binding agreements meant to establish exclusivity of dealings for a period of time, high level terms that both parties agree to, and confidentiality. Given my background, I have the abilility to craft these documents with minimal legal cost.

Due Diligence: This is yet another element of acquisitions that can take several different forms. Depending on the situation and capabilities of both clients and targets, due diligence activites tend to have different scopes and approaches that match each particular circumstance. A simple example would be a private company target versus a public company. With the latter, sellers often limit potential acquirers to only publicly available information whereas private companies may have limited information at their disposal. Therefore, each approach must be designed for purpose, with the output being a customized plan for a particular target. This leads to both more efficient and cost effective processes as well as deeper insights to help with final decisions.

Deal Making: After the due diligence phase, and with a set of terms already agreed, the negotiations begin to finalized the terms of value, liabilities and the myriad legal and busses considerations that must be addressed and finalized. Whether as chief negotiator or as a trusted advisor to the same, I would bring my experience and talent to bear on this phase as well as some structured approaches/guidelines.

Integration Planning: Concurrent with the commencement of due diligence, full attention is required to determine the structure, resources, plans and teams for post-closing integration. Specific approaches and processes would be employed here to ensure that a proper integration leader is named (critical), robust but prioritized integration plans (e.g. IT and Finance integration might be a first priority for some companies), organizational and assimilation plans, and specific actions in several other area. Among the more difficult and critical elements of integration is culture. While culture is a key consideration in the pre-offer phases, it tends to be among the more challenging aspects to successful acquisitions and an area where experience from a career of hands-on accountability of acquisitions brings valuable insights. Several pro-active approaches can be introduced to the clients to determine which is best to employ with any particular integration.

Execution: From plans to execution requires much more than a roadmap. While such roadmaps are critical, it is the confluence of leadership and human capital, prioritized focused actions to achieve specific results, and finally sustainable integration to bring into the client’s company the full potential of the value creation possible. Tools exist and can be created to provide structure and management support to achieve this consistently.


Appleton Greene

Important And Strategic Elements Of A Growth By Acquisition Approach

This program has thus far concentrated on the role that acquisition strategies play in driving growth.

However, this assumes that the acquisitions are carried out properly on its own. Experience has shown that acquisitions may both produce and destroy value, with the execution of the transaction typically making the difference.

The following are crucial and strategic elements that support successful acquisitions:

• Considering strategic fit: Purchasing merely for the sake of purchasing is little more than management hubris. The target businesses should in some manner meet the needs of the buyer’s company strategy (i.e. product or service line, geographic reach, etc.).

• Addressing culture fit: Due to cultural mismatches between the two merging organizations, some of the largest mergers in history have failed. It is important to take into account a company’s culture because it directly affects how it creates value.

• Doing thorough due diligence: This guarantees that the buyer “looks beneath the hood” of the company they are buying and that the price they are looking to pay for the company reflects its intrinsic value.

• Integration: Even when the share purchase agreement’s ink dries, the deal is not finalized. The two businesses must now start an integration process to ensure that they grow into something greater than the sum of their individual parts.


Appleton Greene

Advantages Of Growth Acquisition

10 advantages of expanding your company through acquisition

If you’re deciding whether to enter into an acquisition contract, you might wish to take into account the following list of acquisition benefits:

1. Strengthens a failing business

The company you work for might be going through a period of underperformance, and an acquisition might be the answer. The ability to work together as a team rather than alone may be a key factor in the business’ success. As you get to share resources with the company you’re merging with, this can assist keep the business from failing.

2. Secure financing for growth

By making an acquisition, a company might gain access to money or other important assets that it might not otherwise have at its disposal. You can easily acquire these assets with the aid of an acquisition. The firm and its employees may benefit from collaborating with a company that has sufficient resources because the development of the enterprise is the ultimate objective.

3. Have access to skilled personnel of high caliber

An acquisition can aid in boosting both the amount and quality of employees who are knowledgeable about the demands of the company. The experienced staff often stays on the firm payroll after an acquisition is completed so they can integrate. Their business acumen contributes to the companies’ success after the merger.

4. Expand the company’s market.

The corporation may diversify its offerings of goods and services as a result of the acquisition. You can make a variety of goods and distribute them to various target consumers. An acquisition often aids in a company’s development and growth.

5. Increase market influence

When you enter a new market, making an acquisition might help you combine market forces and exercise control. The synergy it offers increases your market presence and market share. If you plan to establish branches or subsidiary businesses, an acquisition may assist you lessen competition and preserve market dominance.

6. Make sure more capital is available.

Because the company is now larger after an acquisition, access to cash is improved. Higher cash and funds are available and accessible as a result of the arrangement. Amountable capital may be extended to both companies according on the agreement the companies come to when making the purchase.

7. A decrease in training expenses

Through an acquisition, your company may be able to cut internal training costs by using resources from the other acquired company. The cost of employee training is not necessary if the acquired firm develops its resources. You can use the company’s resources, depending on their state of development, to train other employees so they can develop their skill set.

8. Boost the competitiveness of your business

A purchase can take care of the requirement to adhere to higher standards as a result of the development in technical advancements. By joining forces with a smaller company that possesses the required technologies, a larger corporation can maintain its competitive position. Long-term gains from this may accrue to both businesses.

9. Lower production expenses

If you can use another company’s production facilities, facilities, and storage space, merging with them can save your production expenses. Building these kinds of facilities can be expensive, but if the business expands, it might be necessary. Sharing resources could significantly affect the budget and production costs.

10. Enable you to fulfill stakeholder expectations

Stakeholders could have expectations for the company’s growth, and making an acquisition is an effective strategy to achieve such expectations. An purchase increases the likelihood of investment returns, which may gratify the stakeholders. The pressure from the stakeholders can be handled more easily by making an acquisition, and you can even surpass their expectations.


Appleton Greene

What To Watch Out For During The Entire Acquisition Growth Process

Investigating less evident problems within the target company is the goal of the due diligence procedure.

This ranges from contracts with sizable clients that are about to expire to potential legal proceedings resulting from past business decisions.

But there are a few things that the buyer should watch out for on a more strategic level.

They consist of the following:

• Culture: Even if this phrase keeps coming up, it is crucial to the success of M&As. The culture of the target company should be thoroughly researched by prospective buyers in order to have a sense of what they are getting into.

• Competitive Edge: Is the target company “plain vanilla” or does it engage in any activities that offer it a competitive advantage (which we’ll define as the capacity to produce above-market value over the long term)?

• Leadership: Would the target company’s leadership complement your own leadership team in a positive way? Spend some time with them while conducting your research to see whether this might be the case.

• Possibilities: Are there any prospects that the target firm can take advantage of that your business won’t be able to in the near future? Let’s say it’s because of a service or product line they offer that is expected to see rapid expansion.

• Synergies: Where do your two companies’ synergies lie? Are they really complementary, or does purchasing the target company actually run the danger of causing some of your company’s income streams to be cannibalized?

Program Objectives

The following list represents the Key Program Objectives (KPO) for the Appleton Greene Acquisitive Growth corporate training program.

Acquisitive Growth – Part 1- Year 1Appleton Greene

  1. Part 1 Month 1 Business Assessment – Assessments can be incredibly valuable tools for organizations of all sizes. A comprehensive assessment methodology can help you evaluate your organization across multiple dimensions. But what are business assessments, what do they entail, and what are the benefits? Business assessments can help you identify areas of improvement and potential acquisitive growth. By taking a comprehensive approach, you can get an accurate picture of your organization’s strengths and weaknesses. Assessments can also help you develop actionable plans to improve your business. At their core, business assessments are all about providing clarity. When you’re feeling overwhelmed by the day-to-day details of running a business, it can be difficult to step back and get a clear picture of where your company is headed. That’s where assessments come in. By taking a comprehensive look at your company’s strengths and weaknesses, you can develop a clear road map for success. Assessments are an essential part of any business plan. By evaluating your company’s strengths and weaknesses, you can develop a roadmap for growth. Furthermore, assessments can help identify areas where your company may be at risk. By addressing these risks early on, you can avoid potential problems down the road. In addition, assessments can help you benchmark your company’s performance against others in your industry. This benchmarking process can give you valuable insights into areas where your company may need to improve. Ultimately, regular business assessments are a crucial tool for any organization that is looking to grow and thrive.
  2. Part 1 Month 2 Strategic Aspiration – A Winning Aspiration defines the purpose of your enterprise, its guiding mission and aspiration, in strategic terms. The first choice of the strategic choice cascade is winning aspirations. Here we ask, “what is our winning aspiration.” Strategically, our winning aspiration defines our purpose. Aspirations are a view of the future. Qualified with “winning,” it is the ideal future that we strive to achieve. Unless you deliberately set out to win, it is impossible to do so. A business that only wants to participate rather than succeed will invariably fall short of making the difficult decisions and large investments necessary to succeed. Aspirations that are too modest rather than lofty are much more harmful. Most businesses fail because they have low expectations.
  3. Part 1 Month 3 Segment Focus – Every company aspires to grow. But, in a market where competition is fierce, inorganic business growth requires insight and innovation. Segmenting the market and customers is among the most effective techniques to promote acquisitive growth. Yet as numerous businesses have shown, artful segmentation can result in a significant competitive advantage. The purpose of segmentation is to inform your marketing approach. Using this method, it is feasible to recognize and categorize groups of potential clients based on their shared preferences, needs, and interests. This method effectively identifies the demographics most likely to value a specific good or service you provide. Furthermore, it may assist you in positioning that service so that it outperforms that of your rivals.
  4. Part 1 Month 4 Targeted Offerings – Everything the market offers, be it products or services or any experience, is known as a market offering. Market offerings are also divided among themselves based on the nature of the offering. Read along to understand the role and value of market offerings. Individuals within a market have different wants and needs. As a result, businesses in the market offer various products and services. The ultimate aim of businesses is to fulfill all the varying wants and needs of the population. Providing better target offerings and standing out in the market will eventually lead to more loyal customers and a broader customer base. People expect businesses to add value to their lives in various ways, precisely the purpose of market offerings – satisfying customer needs.
  5. Part 1 Month 5 Target Pool – The purpose of this workshop is to map out the offerings that one wants to develop or enhance for the focus segments defined by WDP3. A target pool is at the intersection of Targeted Offerings and Focused Segments. For example, if your strategy is focused on growing a currently manufactured product beyond your existing markets, you’ll want to know all the players who make these products in the markets where you don’t currently play but aspire to. In this simple case, the target pool would be derived by researching the current suppliers in these focus segments and profiling them for certain things such as size, channels to market, etc. The approach of this workshop is to take the Targeted Offerings and in a way and ‘map’ them with the Segment Focus areas we developed previously. In reality you might only need to do one or few of these approaches, but the workshop can develop the understanding and skills to do this work, which is in essence synthesizing the ‘strategic play’ associated with any acquisitive growth program.
  6. Part 1 Month 6 Target Identification – Target identification in acquisitive growth is the process of identifying potential companies or assets that align with the strategic objectives of the acquiring company. It involves conducting comprehensive research, market analysis, and due diligence to evaluate various factors such as financial performance, growth potential, synergies, industry trends, competitive landscape, and cultural fit. The goal is to identify targets that offer strategic value and can contribute to the acquirer’s growth, profitability, market position, or diversification objectives. This process requires careful evaluation, consideration of risks, and alignment with the acquiring company’s overall M&A strategy to ensure successful integration and value creation.
  7. Part 1 Month 7 Target Approach – All business investors are “financial” investors – the real question is how “strategic” is their ability to leverage the assets of the target. Providing practical guidance on approaching a business target and conducting initial due diligence depends on the investor’s criterion, competencies, and execution bandwidth. At this point, you will have identified a target or group of targets and you are attempting to learn enough about the target to determine whether to proceed with developing a meaningful indication of interest. Of course, an active seller is likely prepared for the sale process and represented by an advisor who is postured to provide the financial and operating information necessary for investors to quickly determine the suitability of a deal (i.e., a pitchbook and defined protocols for communication and information access). However, many desirable targets may not be seeking a sale because business conditions are favorable, and their businesses have been managed to provide options to the owners regarding continued independence and turn-key ownership and management succession. If the former, you, as a prospective buyer may have already pinged on the radar of the seller, and if the later, you have mined for target opportunities and are ready for the next step to accomplish an acquisition.
  8. Part 1 Month 8 Deal Approach – The M&A landscape is becoming increasingly competitive and the balance of power is shifting further in favour of buyers. For attractive businesses, however, sellers may wish to make divestments through an auction process which is designed to elicit competitive bidding among interested parties to facilitate the sale of a business or stake in a company at the highest price and on the best possible terms. Not all transactions require collaboration between the buyer and the seller, however. In many instances, an auction is still a better approach than a negotiation. The trick is in knowing which process to use when. To make that choice, you need to clearly understand your potential buyers, the characteristics of the asset in question, your own priorities, and the relative importance of speed and transparency to obtaining the best price.
  9. Part 1 Month 9 Cultivation – (non-auction)
  10. Part 1 Month 10 Cultivation – (organized process)
  11. Part 1 Month 11 Confirm Target – Assuming initial contact and conversations go well, the acquirer asks the target company to provide substantial information (current financials, etc.) that will enable the acquirer to further evaluate the target, both as a business on its own and as a suitable acquisition target. After producing several valuation models of the target company, the acquirer should have sufficient information to enable it to construct a reasonable offer; Once the initial offer has been presented, the two companies can negotiate terms in more detail.
  12. Part 1 Month 12 Talent Assessment – Talent decisions can be made with less precision, discipline, and data but frequently require more complexity than other integration decisions (such as decisions about goods, markets, or customers). M&A leaders must “up their game” in talent assessment if they want to succeed. In the end, the acquirer must decide if current employees from the target (the acquired company) are the most qualified to carry out the goals of the new organization.

Acquisitive Growth – Part 2- Year 2Appleton Greene

  1. Part 2 Month 1 Talent Strategy – There are numerous tactics available for talent acquisition. But not every organization benefits from every method or strategy. When developing your strategy, consider the following factors: industry, size, development trajectory, types of positions, leadership, and more.
  2. Part 2 Month 2 Integration Strategy – The process of integrating a buyer and seller to the extent required to realize the anticipated benefits from a merger or acquisition is known as an M&A integration. An M&A integration plan outlines the merger’s goals, top priorities, performance indicators, non-negotiables, and scope.Getting agreement among your leaders on the integration strategy is the first stage in an M&A integration. At least two to three months before the deal closes, they should make it clear.
  3. Part 2 Month 3 Business Plan – Lack of a business strategy before an acquisition is one of the main mistakes that many M&A practitioners make. When considering an M&A, the business strategy is a vital resource. It provides comfort to those funding the deal that the reasoning behind it is sound and that the decision to acquire is not being made on a whim, as well as a roadmap for what you’re looking for in a business acquisition.
  4. Part 2 Month 4 First 90-Day Plan – HR must be quick and efficient when acquisition is at the core of a company’s growth strategy. The first 90 days are crucial for the organisation’s long-term performance as well as for the retention of individual employees. We can win hearts and minds by day 90 and have a better probability of them becoming productive team members if we have a robust acquisition plan.
  5. Part 2 Month 5 Valuation – One of the biggest challenges in negotiating a business acquisition is typically price haggling. The intricacy of business valuation makes this more challenging because a fair value cannot be determined without thoroughly examining the company’s financial data, sales trends, customer and supplier base, and many other factors.
  6. Part 2 Month 6 Synergy Analysis – A significant driver of value in M&A transactions is the potential for establishing synergies. A synergy is the idea that two businesses might be valued more highly when united than when valued separately. Knowing the possible synergies in an M&A transaction is crucial to any agreement, for both the buyer and the seller.
  7. Part 2 Month 7 Due Diligence (Foundational – Foundational due diligence is an organization’s baseline due diligence requirements that they must have on file for every vendor relationship, regardless of risk level, in order to do business with them. With origins in the private-sector world of business and finance, the term “due diligence” refers to the process through which an investor (or funder) researches an organization’s financial and organizational health to guide an investment (or grantmaking) decision. The decision to fund or not to fund is based upon a balance of objective data analysis, insight into the general state of organizational health and stability, and intuition. A sound and thorough due diligence review is the process through which all the factors that make up that equation are uncovered and understood. It is the process in which a program officer seeks the “truth” about an organization. Foundation program officers are faced with multiple challenges in assessing whether to recommend a grant to their board or decision-making committee. First, they must ascertain whether and to what extent the proposed activity coincides with the foundation’s guidelines and priorities. Next, they must assess the worth of the proposed activity itself — does it advance the fi eld, provide needed services or generate new learning? If the proposal survives this initial scrutiny, it must then be weighed for its relative merits beside many other worthy proposals. This process requires a great deal of skill and sensitivity. Due diligence protects a foundation’s investments and reputation and advances its mission and overall strategy.
  8. Part 2 Month 8 Due Diligence (Business Plan) – When you receive a proposal on your desk, the first step of proposal review is generally a consideration of the alignment of the applicant organization and proposed project with your foundation’s guidelines and interests. If this initial review is positive, due diligence typically commences with broad research and information gathering to provide a good understanding of the organization, how it fits into the field and the way in which this project will advance your foundation’s strategy. You might also contact colleagues for their view of the organization and its work. Then, you move on to get to know the applicant on a deeper level, including interviews with some combination of the executive director, board chair, other board members and staff members key to the proposed project. Each of these activities is covered in depth in this tool.
  9. Part 2 Month 9 Deal-Making (Direct Negotiation) – Direct negotiations are a deal making process in which an agency may contact a single contractor of its choice to submit a quote or tender without having first gone through a genuine competitive process.
    A variation to an existing contract can also be a direct negotiation. Bargaining between buyer and contractor is a critical element of the process. The objective is to reach agreement on all terms and conditions and to obtain the goods and services at a price that is fair and reasonable to both the contractor and the agency. Direct negotiations are not intended to avoid competition or to discriminate against any organization and must be conducted in a manner consistent with the standards of behavior and requirements. A suitable assessment, based on comprehensive knowledge gained through specific market research, will need to be made to justify direct negotiation.
  10. Part 2 Month 10 Deal-Making (Auctions) – Many (if not most) complex deals between buyers and sellers—from home sales to purchasing auctions to corporate mergers—qualify as auction deal making. Deal making (auctions) give sellers the opportunity to avoid making the difficult tradeoffs of traditional negotiations or auctions— competition versus value creation, for example, or many versus few bidders. In fact, sellers can take the best of both worlds— negotiations and auctions—to ensure they get a great deal. Auction deals have the following features: 1. One-on-one negotiations. At some stage of the deal making process, the seller engages one or more buyers in private discussions about the asset on the table. 2. One or more rounds of bidding. The seller also pits potential buyers against one another in an auction. 3. Several, but not too many, potential buyers. Deal making at auctions need enough parties to spark an auction but not so many that one-on-one negotiation would be difficult for the seller to manage. 4. Process ambiguity. In a traditional auction, the seller determines the process (whether there will be a single round of bidding or multiple rounds, for instance), and buyers are passive participants. In auction deal making, by contrast, the process is up for grabs. Buyers can try to shape the process to their advantage, as in the case of an auction contestant who approaches a seller about negotiating privately to move beyond the single issue of price. In general, whether you are the process setter or a bidder in an auction that has features of a negotiation, don’t assume that the rules are set in stone. Instead, change the game by thinking about how you can influence the rules, parties, and assets to your advantage.
  11. Part 2 Month 11 Documentation – The paperwork phase of a merger or acquisition is crucial. It might be regarded as the merger and acquisition process’s soul. With due diligence complete, parties make the final decisions on moving forward to execute the transaction. For legal teams, this comes with several responsibilities. Corporate or pre-clearance filings must be made in advance of the closing date. These include merger filings, amendments, ordering of good standings, or issuance of bring-down letters.
  12. Part 2 Month 12 Communications – An increase in M&A activity indicates a potential deal for entrepreneurs, business owners, and C-suite executives. In the event that a tempting deal is successful, it would be advisable to view an employee communication plan as a crucial component.

Methodology

145120386

Acquisitive Growth

It’s challenging to make this kind of acquisition successful. Seven fundamental operating principles are used by profitable corporate and financial purchasers, according to research. Almost all phases of the acquisition process, from the selection of candidates through post-merger management, are impacted by these ideas.

• Insist on cutting-edge operating tactics.
• If you can’t identify the leader, don’t make the deal.
• Provide top executives with significant incentives.
• Connect pay to variations in cash flow.
• Accelerate the rate of change.
• Encourage lively interactions between the board, managers, and owners.
• Employ the top acquirers.


Appleton Greene
Insist On Cutting-Edge Operating Tactics

High-profile leveraged buyouts like those of Duracell International, Uniroyal, and RJR Nabisco have garnered a lot of attention since the early 1980s. Prices, clever financial arrangements, and bargaining strategies have received a lot of attention. However, the other 2,200+ buyouts that took place during that time period and the fundamental changes in operational procedures that led to profitable outcomes for many of those businesses have received little attention. Although many observers think that LBO enterprises find hidden treasures in the market, more often than not, they only concentrate on enhancing operations.

Two acquisitions, Sunglass Hut International and Snapple Beverage Corporation, show that operating performance—rather than financial leverage, market timing, or industry selection—is the main driver of value creation in successful acquisitions.

Desai Capital focused on accelerating sales growth and developed a new strategy to achieve so when it acquired Sunglass Hut. By acquiring smaller stores in turn and introducing a new store model, Sunglass Hut has expanded from 150 locations to more than 800 since the initial acquisition in 1988. This growth has led to an astounding 37% yearly return. The business introduced a broad product selection rather than depending on two or three popular lines, replaced clerks with limited knowledge of sunglasses with educated customer-service specialists, and implemented a low-cost regional approach.


Appleton Greene

Another illustration of operating improvements is the 1992 purchase of Snapple by renowned financial acquirer Thomas H. Lee Company. Snapple launched an aggressive growth strategy based on quick global expansion and product range extensions shortly after the takeover. The business immediately established its production and distribution network since it anticipated that rivals will soon release their own natural teas and fruit juices. It entered into contractual agreements with bottling and distribution businesses that had excess production capacity, allowing it to launch its product one year before major rivals like Fruitopia (from the Minute Maid division of Coca-Cola Company) and achieve a competitive advantage.

As the Snapple case demonstrates, innovative operating methods help acquirers succeed in fiercely competitive markets like the American food and beverage sector. The takeaway: Don’t limit your search for success to high-growing industries.