Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

ARTICLE NAME:

Four logics of Corporate strategy &


How to develop strategy for execution

Presented By:

GROUP – 5
Mayur rathod 20182037
Niraj sahlot 20182038
Dhaval shah 20182040
Diya shah 20182041
Nihal shah 20182043
INTRODUCTION
“Corporate strategy encompasses a firm’s corporate actions
with the aim to achieve company objectives while achieving
a competitive advantage”.

• It is the set of choices that diversified corporations


such as IBM, Walt Disney, and Tata Group to create
and capture value across their businesses over time.

• It is a crucial driver of financial performance for


multi-business enterprises.
• According to McKinsey & Co. survey, reallocation of
resources is the single biggest driver.

• According to a separate survey of nearly 20%


executives said their company had an effective
process for developing and revising corporate strategy.

• Organizations often struggle with corporate strategy


because executives lack clarity on how the parts of the
corporation fit together to create and capture
economic value.
FOUR LOGICS OF CORPORATE STRATEGY
ASSESSING THE LOGIC OF YOUR CORPORATE STRATEGY
ASSESSING THE LOGIC OF YOUR CORPORATE
STRATEGY
STRATEGIES BY QUADRANT
HOW TO DEVELOP STRATEGY FOR
EXECUTION ?

• Link to Corporate vision, identify critical


vulnerabilities & focus on what matters most.
• 3 questions that management should
address is:
a. What is our vision?
b. What is our critical vulnerabilities?
c. And what should we prioritize?
WHAT IS OUR VISION?

• Linking strategic priorities to long term aspiration.


• Describing corporate vision & mission.
• Discuss what is working, access current challenges,
project legacy business and prioritise activities.
WHAT ARE OUR CRITICAL
VULNERABILITIES?
➢Avoidance of complexity
➢Creating visual map
➢Draw lines to show the interdependencies
WHAT SHOULD WE PRIORITIZE?

• Figure out how to best address vulnerabilities

• Teams sometimes respond to wide range of options

• Before discussing priorities, pull together a data pack


on each of vulnerabilities so that the team members
works from the same facts.

You might also like