article thumbnail

Why Law Firms Need IT Policies

Kraft Kennedy

The rules and procedures that govern how organizations use technology to conduct business, Information technology (IT) policies are crucial to security, efficiency and productivity and shouldn’t be considered optional, static or one-size-fits all.

article thumbnail

Why Are We Still Classifying Companies by Industry?

Harvard Business

They have expanded far beyond the “Information Technology” tag attached to them by GICS. Today, technology is just a standard part of corporate infrastructure, like operations or marketing. But Information Technology doesn’t seem like the right category to group them into.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTI Consulting Interviews and Culture

Management Consulted

Litigation technology. Intellectual property. Intellectual Property. Intellectual Property. Information Technology. Telecom, Media & Technology (TMT) Transportation. These include: Disputes Advisory Services. Global Risk and Investigations in Asia. Litigation discovery.

article thumbnail

The Brattle Group Interviews and Culture

Management Consulted

Intellectual property. Professional Services: At Brattle group the professional services include Accounting, Legal, Human resources, Business support services, Marketing, Information Technology, Business Analysis etc. Each day at The Brattle Group brings opportunities to make an impact. Practice Areas. Product liability.

Groups 100
article thumbnail

Why Leaders Are Still So Hesitant to Invest in New Business Models

Harvard Business

Today, the majority of market value is made up of intangible assets (networks, platforms, intellectual property, customer relationships, big data) more than physical assets. In fact, it’s not even close: intangible assets make up over 80% of the S&P 500’s market value — a complete reversal from 1975.

article thumbnail

Data Breaches Aren’t Just an IT Issue - SPONSOR CONTENT FROM VERIZON

Harvard Business

Cyber-espionage : Attacks carried out by state-affiliated actors, often targeting intellectual property. Point-of-sale (POS) intrusions : Attacks that capture payment data from POS systems. Payment card skimmers : Attacks that intercept card data by installing a physical device on an ATM, a gas pump, or a POS terminal.

Data 28
article thumbnail

The Real Reason Superstar Firms Are Pulling Ahead

Harvard Business

One answer to that first question shows up in study after study: superstar firms are succeeding in large part due to information technology. Are they out-competing their rivals, or are they using their size and influence to avoid competition altogether? This hypothesis is bolstered by another recent paper.