Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Imagine a Day Without Water

Imagine a Day Without Water

Many Americans take our access to freshwater for granted. It is typically only in moments of crisis, due to drought or contamination, that we truly understand the value of our water. That’s why the annual Value of Water Campaign, led by the American Water Works Association, is asking us all to imagine a day without water.…

Read More
Blog Series – Part 1: DOE’s Grid Resiliency Pricing Rule

Blog Series – Part 1: DOE’s Grid Resiliency Pricing Rule

A Wrench in the Wholesale Electricity Market On September 28, 2017, the Department of Energy (DOE) issued a Notice of Proposed Rulemaking (NOPR) titled, “Grid Resiliency Pricing Rule.” This first blog in a series summarizes the NOPR and discusses the fundamental issue behind the rule: The DOE seeks action within 60 days (by November 27, 2017) from the Federal Energy Regulatory Commission...

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Here’s the deal with digital.

Here’s the deal with digital.

Leading companies across numerous industries are abuzz with going “digital.” At West Monroe, we believe going digital—or digitizing information so it can be transmitted, stored, and analyzed to gain new insights and efficiencies—is a key enabler and accelerator of an organization’s strategy. But what does a utility have to gain from this digital revolution?…

Read More
Living the Entrepreneurial Dream: Celebrating 15 Years in Business

Living the Entrepreneurial Dream: Celebrating 15 Years in Business

  One of America’s finest defining characteristics is our longstanding history and tradition of entrepreneurship: Going out on your own. Hanging out a shingle. Taking the risk to start something new. That is exactly what Dean Fischer, Susan Stelter, Matt Rager and I did, 15 years ago. With a clean slate and no clients, we met at Miller’s Pub in Chicago.…

Read More
The Layman’s Guide to Bitcoin, Alt-Coins, and Blockchain, and What it Means for the Digital Customer Experience

The Layman’s Guide to Bitcoin, Alt-Coins, and Blockchain, and What it Means for the Digital Customer Experience

Bitcoin – we’ve heard so much of the term from news outlets, various blogs, and social media regarding how great (and risk-fraught) of an investment vehicle it’s become. From humble beginnings as a simple depiction of a virtual currency with the usage characteristics of real cash and the potential to become the de facto currency for worldwide transactions, to a storage of wealth that’s grown...

Read More
Top 6 Ways to Combat Change Fatigue

Top 6 Ways to Combat Change Fatigue

When I read Bill’s blog “Where’s the Snooze Button on Change?” I was inspired to write my own perspective on managing change. And then I hit my own snooze button a few times in the last few months due to some competing priorities. Change fatigue is real – and something I observe often at clients.…

Read More
Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

We spend a lot of time these days talking with private equity investors about the importance of cyber security for their target and portfolio companies. While there is general agreement that it is critical to identify and mitigate potential cyber security risks, those efforts often focus only on the most obvious targets—companies dealing in credit card data, personal financial information, or...

Read More
Coffee & Change, Episode 6: Managing Change in Environmental Affairs

Coffee & Change, Episode 6: Managing Change in Environmental Affairs

Bill Kirst, our West Coast organizational change management lead in Seattle, shares the sixth episode of his podcast series on the topic of change management. In this episode, Bill interviews Brandon Ray, a graduate student at the University of Washington who studies Marine and Environmental Affairs and International Studies. They discuss the importance of understanding stakeholders in...

Read More
Day in the Life: Operations Excellence Intern Edition

Day in the Life: Operations Excellence Intern Edition

At West Monroe, we approach internships differently. To be the best, we need the best, meaning our interns accepted the challenge to go beyond the typical internship. Our interns took on an array of engaging, transformative challenges, ranging from assisting on client sites/projects, to developing new and innovative software. Specifically, our Operations Excellence interns had something to say...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons