4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

4 Trends for Private Equity Operating Partners: Unclean Data, Cyber in a Box, Hoping for a Downturn, and Driving Digital Change

Recently, several members of our M&A practice participated in the PEI Operating Partners Forum in New York City, where the private equity community gathered to share best practices on value creation. Here are four takeaways we found interesting and wanted to share: Behavior adaptability is insanely important to digital transformation. And they don’t mean adaptable businesses, they mean...

Read More
4 Tips for Private Equity Firms to Maximize the Value of Digital Transformation

4 Tips for Private Equity Firms to Maximize the Value of Digital Transformation

The ability to transform businesses through digital is one of the greatest value creation tools available to private equity. While time constraints may present a challenge, prioritizing and implementing the right digital investments can be a highly effective way to deliver efficiency improvements, revenue and earnings growth, and drive a high return at exit.…

Read More
4 Ways to Manage and Retain Talent Through an Integration

4 Ways to Manage and Retain Talent Through an Integration

With 1 million more job openings than unemployed workers in the United States, retaining talent through an integration is more critical than ever. Whether your acquisition was driven by the desire to “acquihire” talent or retain existing talent to drive growth and business strategy, here are four tips to ensure you don’t lose your greatest assets during the deal process: If you didn’t...

Read More
Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity Diligence in Private Equity Transactions: A Q&A with Experts Who Have Completed Hundreds of Deals

Cybersecurity. It’s something that you need to be aware of both when you’re looking to acquire and once you’ve acquired in the continued day-to-day operations of the company. You don’t want to risk your data being exposed, being embarrassed, or suffering financial loss. Alex Agran, host of the Private Equity Technology Podcast, recently interviewed two West Monroe...

Read More
Four Takeaways from the 2018 TOPO Sales and Marketing Summit

Four Takeaways from the 2018 TOPO Sales and Marketing Summit

This year’s annual TOPO Summit was billed as “the only event where the world’s best sales and marketing leaders share exactly what they do to achieve scalable revenue growth.” The specificity of that statement, it turns out, was quite accurate. The two-day event featured a one-hour welcome and broad industry overview from TOPO CEO Scott Albro, but the remaining time focused on breakout...

Read More
Winning the Battle for Customers: A Dinner Conversation with Bay Area Financial Services Leaders

Winning the Battle for Customers: A Dinner Conversation with Bay Area Financial Services Leaders

A dinner conversation among Bay Area execs about winning the battle for customers generates a surprising level of passion and intensity.  We saw this in spades at a recent gathering of financial services leaders at Prospect in San Francisco.  Once we were satisfied with the sharing of two vintages of our Director’s Reserve Cabernet, Don Peppers (formerly of Peppers and Rodgers) and Paul Hagen...

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Top 6 Ways to Combat Change Fatigue

Top 6 Ways to Combat Change Fatigue

When I read Bill’s blog “Where’s the Snooze Button on Change?” I was inspired to write my own perspective on managing change. And then I hit my own snooze button a few times in the last few months due to some competing priorities. Change fatigue is real – and something I observe often at clients.…

Read More
Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

Protecting M&A Portfolios from Cyber Threats – It’s Not Just the Obvious Targets

We spend a lot of time these days talking with private equity investors about the importance of cyber security for their target and portfolio companies. While there is general agreement that it is critical to identify and mitigate potential cyber security risks, those efforts often focus only on the most obvious targets—companies dealing in credit card data, personal financial information, or...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons