All posts by MSS

Podcast: The Art of Getting What You Need with Karen S. Walch, PhD


Dr. Karen S. Walch shares with David Lee real life examples of Quantum Negotiation and the Art of Getting What You Need.

In the context of negotiation, we are all connected.  To get what you need you must clearly understand the emotions and sense of purpose that drive your decision making and that of your counterpart. That clarity will help you align with the intentions of your counterpart to develop a relationship that will guide you both through the negotiation process to ultimately get what you need.



How Adaptive Is Your Supply Chain?

Utilizing a Digital Modular Supply Chain to Respond to Change

The outlook for American consumer spending appears to us to be improving, with consumer confidence growing, and a labor market and wages trending higher. Consumers preferences are changing and the fast-paced customer-driven market has raised the bar for speed and quality for new products and customer service.  So how can companies anticipate, adapt, and respond quickly to changes in consumer demand and trends?  Gartner’s 2017 Supply Chain Top 25 identified digital-modular supply chain services as a key trend that is accelerating the ability of supply chains to adapt and respond quickly to different business needs and outcomes.

Read the full article

The Energizing Myth: The Greatest Tool of Transformational Leaders

Have you ever had a thought turning in your head but were unable to describe it? And then someone turns a single phrase and you jump, “That’s it!” This happened to me on a recent trip to Europe.

For a while now, I have been looking for something to describe an intangible capability that great, transformational leaders have that the rest of us seem to lack. Until now, it has been hiding behind concepts like vision, charisma, and purpose laying just out of reach. Then, while listening to an online course on the Italian Renaissance the lecturer referred to the concept of the “energizing myth,” and I was inspired.

Continue to the full article

Podcast – Cyber Security: Not a Technology Issue – A Transformational Business Strategy

cyber security podcast

Airing on December 5, 2017, this podcast provides C-level perspective on building a transformational cyber security strategy that creates value for the organization while protecting its most valuable – nonhuman – asset; its data. Our expert panelists address the ubiquitous nature of the cyber security issue, how to set and achieve expectations from your cyber security strategy, what to expect from a Chief Information Security Officer, and how cyber security adds value in business terms.

Dr. Roméo Farinacci is a senior security consultant with Terra Verde Services, specializing in security program development, risk management, security architectures, and risk assessments. He brings over 20 years dedicated IT/Security experience and 5 years consultation of complex enterprise infrastructures in public, private, and government sectors. Roméo’s passion in cyber security enables him to effectively develop and communicate change strategies for improving the security posture of organizations. His education portfolio includes a Doctorate in Management with an emphasis in Information Systems Technology, an MBA in International Business and an MS in Information Technology. He also has the following professional certifications: CISSP, CISM, PMP, GSLC, and Six Sigma Green Belt / Lean.

Kim L. Jones is a 31-year intelligence, security, and risk management professional with expertise in information security strategy; governance & compliance; security operations; and risk management. Professor Jones is a former Chief Security Officer who has built, operated, and/or managed information security programs within the financial services, defense, healthcare, manufacturing, and business outsourcing industries. Jones holds a Bachelors Degree in Computer Science from the United States Military Academy at West Point, and a Masters Degree in Information Assurance from Norwich University.  He also holds the CISM and CISSP certifications.

Download the podcast


OCM podcast

Podcast: Supply Chain – from Process to Integrated Performer


This Podcast discusses supply chain the transformation point of view. Specifically, we are considering what organizations can do to ensure that their supply chain is adaptable and able to absorb disruptive forces. We exist in volatile and uncertain times with high variability that can have massively disrupting impacts. How does a leader prepare and transform its organization to thrive in such an environment?

Dr. Greg Grindey heads the Public Sector Solutions Department at LLamasoft, Inc. overseeing projects in the military, Government, and Global Health spheres. He joined LLamasoft in October, 2008 after working for the previous 6 years at Northrop Grumman, and has worked for the past fourteen years as a senior analyst for the United States Transportation Command at Scott Air Force Base, Illinois, first under the Strategy, Policy, Programs, and Logistics directorate (J5/4), and most recently with the Joint Distribution Process Analysis Center (JDPAC).

Sr. Director of Planning & Procurement at Katerra, Heather Tammelleo is an APICS Certified Supply Chain Professional and S&OP certificate holder, and a graduate of Arizona State University. She has nearly 15 years of progressively responsible supply chain experience across a number of organizations and industries. Throughout her supply chain career, Heather has focused on development of meaningful metrics that drive organizational focus and action. Among these are inventory management, customer fill rates, forecast accuracy, etc.  Additionally, she is an experienced leader in driving the development and implementation of, and continuous improvements to Sales & Operations Planning (S&OP) processes.

Download the full Supply Chain podcast


Not IF but WHEN You are Hacked: Intel-Driven Incident Response Strategies

“Luck is what happens when preparation meets opportunity” -Seneca.

The count-down for when you will be hacked is always running!

Breaches and Hacks are two different concepts in cybersecurity with the latter being more difficult to manage than the former. Breaches can be mitigated through security policies enforced by security awareness training, asset inventory, hardware and software configuration best practices, and various security tools/technologies. A breach, mostly associated with accidental spill of sensitive data, is best exploited by lack of internal processes, procedures, and training. Thus, breaches result in more executive terminations than hacks do because many of them are preventable.

Read the full article here

Planning is Imperative Within a #ResponsiveOrg

However, as the pace of change accelerates, the challenges we face are becoming less and less predictable.”¹ To many organizations, the norm has become not knowing what is happening in their markets. According to ResponsiveOrg’s Manifesto, the following are tensions which most organizations must evaluate today, which you can see for yourself at

I have pondered these ideas and thought about their implications, and even started some dialogue about the topics on their group-wide Slack that has almost 2,000 members.

My main preoccupation was with the idea, “Why would planning generally be considered the opposing force of experimentation in the manifesto?”

Continue to full article

From Around the Web: Cybersecurity and the IoT

Glenn Schulke (IoT expert, writer of IoT: A Tidal Wave of Trouble) recently shared with us what hackers could be able to do once cities reach a connected society. We thought of many petty pranks such as:

  1. Requesting your smart fridge to order 20 jars of pickles
  2. Adjusting the smart fridge temperature to 60 degrees Fahrenheit (spoiled food)
  3. Changing the smart thermostat every five minutes (higher electricity bill)
  4. Turning off the hot water heater from 5:30AM to 8:30AM (cold showers)
  5. Scheduling a time to turn the smart lights on and off at 3AM every night (haunted house)

It reminded us of haunted houses. Once you are out of a haunted house you can separate the scary events from reality and move on with your life. While many of the petty pranks above are relatively harmless, the results of hacking could be much more malicious. According to CNBC, in 2016 “cybercrime cost the global economy over $450 billion, over 2 billion personal records were stolen and in the U.S. alone over 100 million Americans had their medical records stolen.” The results of these cybersecurity breaches are horrifying and heart-breaking to those businesses and individuals affected. With IoT, this reality is coming to fruition, fast. However, business owners can protect themselves by taking necessary precautions with cybersecurity.

Read the full article here

From Around the Web: Office Politics and Generational Gaps

Like it or not, most people have inherent biases, certain opinions or judgments which have developed over time, which affect relationships within the workplace. Like complacency, strong opinions and biases can plague friendly business relationships and great customer service. Office politics can become a true stumbling block for project communications and organizational effectiveness. A lack of organizational transparency discourages innovation and achievement. From this behavior, collaboration and team dynamics can be strained creating a negative corporate culture, ultimately affecting your clients. Getting buy-in from leadership to be transparent within the organization, setting a standard, and uprooting negative habits when they occur can change the corporate culture for the better. Charles Zulanas, Senior Consultant for MSS Business Transformation Advisory, shares many articles from around the web that offer advice on how to overcome biases in the workplace that could be beneficial for overcoming office politics as well as generational gaps.

Click here to read more.

Generals vs Conductors in the Evolution of Leadership

The author uses Mozart in the Jungle to explain the study in the evolution of the leaders from the previous conductor dealing with a new reality to the new conductor trying to reach his potential as well as the potential of the organization they are leading. Looking at what it takes to be a leader in today’s exponentially changing environment, leaders must also look at the evolution of leadership. The author covers a brief history of organizational development and the evolution of leadership theory, and how it relates to being a conductor of a symphony. The author uses studies about command and control environments and how they affect productivity short-term and long-term. Ultimately, leaders account for at least 70% of the variance in employee engagement scores. The author highlights their personal stories of working with two different leaders and analyzes who would be a better fit for business in today’s complex world.

Click here to read more.