Loading...

The Integrator's ToolBox: Building a Company Culture

  • Room: GS 10
Thursday,May 19, 2022:8:00 AM -10:15 AM

Speaker(s)

Speaker
Andrew Lanning
Co-Founder
Integrated Security Technologies
Speaker
Christine Lanning
President
Integrated Security Technologies

Description

Owners and senior managers have a variety of leadership tools to choose from in order to help them lead their organizations for optimal productivity. As companies evolve, the tools required can change, or their value can grow or diminish. Regardless, all companies thrive when their teams work with core values that build trusted relationships. This roundtable discussion will dive deeply into the implementations that have led to successful outcomes for Integrated Security Technologies. We will also discuss tools that had less valuable outcomes. This discussion will encompass the tools used for value creation across the spectrum of business practices to include accounting, business management, client engagement, employee engagement, project management, key performance indicators, professional development and metrics utilization.


Track(s)


Super Track(s)


Methodology

Integrated Security Technologies owners will present their business growth in a historical timeline that shows the implementation of tools along the way, and demonstrates their impact (positive and negative) over time.
We will also engage the audience during each step of the presentation to share their success/failure stories that align with the current topic.
This presentation will clearly introduce the audience to tools and experiences with those tools, that they may not be aware of, including implementation costs, timelines, pitfalls, and outcomes.
The presenters anticipate learning as much from the audience as they will share with the audience, and they expect everyone to walk away with newly actionable tool set ideas, to-do's, and implementations.

Learning Objectives

1. Examine a variety of tools that have been implemented to successfully grow and manage a security integration company
2. Research a variety of tools that have been implemented to successfully grow and manage a security integration company's client base
3. Investigate a variety of tools that have been implemented to successfully grow and manage a security integration company's staff