The Tech Strategy Podcast podcast

The 3 Steps of a Digital Attacker Strategy (214)

0:00
37:32
Retroceder 15 segundos
Avanzar 15 segundos

This week’s podcast is about a common playbook for a digital attacker (whether a digital native or incumbent).

You can listen to this podcast here, which has the slides and graphics mentioned. Also available at iTunes and Google Podcasts.

Here is the link to the TechMoat Consulting.

Here is the link to the Tech Tour.

Here are the 3 steps of the digital attacker strategy.

  • Step 1: A new digital tool enables a superior service to emerge. This is used to break into an existing business. This often causes an unbundling of the existing offerings.
  • Step 2: Existing value chains get transformed. Everyone scrambles to grab the valuable positions.
  • Step 3: The new leaders add services, complements and bundles.

------------

I write, speak and consult about how to win (and not lose) in digital strategy and transformation.

I am the founder of TechMoat Consulting, a boutique consulting firm that helps retailers, brands, and technology companies exploit digital change to grow faster, innovate better and build digital moats. Get in touch here.

My book series Moats and Marathons is one-of-a-kind framework for building and measuring competitive advantages in digital businesses.

This content (articles, podcasts, website info) is not investment, legal or tax advice. The information and opinions from me and any guests may be incorrect. The numbers and information may be wrong. The views expressed may no longer be relevant or accurate. This is not investment advice. Investing is risky. Do your own research.

Support the show

Otros episodios de "The Tech Strategy Podcast"