SlideShare a Scribd company logo
1 of 3
Download to read offline
A Proven
Thought
Leadership
Model
As president of Precursor LLC, a consultancy specializing in
the identification and mitigation of cyber systemic risk, also
referred to as internetization, Scott Cleland is a proven
thought leader, a leading internetization strategist, and an
individual recognized as an authority on how internetization
affects companies' risks and opportunities.
Being called to testify before Congress a total of sixteen times
on a variety of forward-thinking public policy issues relating to
the internet is just one example of Scott Cleland’s thought
leadership.
Precursor’s model for thought leadership as it pertains to the
Internet includes the following components:
1 - Anticipating - recognizing emerging changes in internet-
related competition.
2 - Seeing the world as a whole - distinguishing which
changes will affect competition, policy, ideology, economics,
and technology.
3 - Spearheading thinking - influencing the understanding of
the emerging risk, what its effects will be, and how they can
be alleviated.
The effectiveness of the model has been shown repeatedly in
the identification of emergent risks, such as the systemic risks
from Google’s dominance and the risks to the facilities-based
broadband industry due to the failure of FCC policies.

More Related Content

Similar to A Proven Thought Leadership Model

CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
mary772
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
jasoninnes20
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
10 Looking ForwardMike HouseholderAssociated PressLea.docx
10 Looking ForwardMike HouseholderAssociated PressLea.docx10 Looking ForwardMike HouseholderAssociated PressLea.docx
10 Looking ForwardMike HouseholderAssociated PressLea.docx
hyacinthshackley2629
 

Similar to A Proven Thought Leadership Model (20)

Covid 19: Understanding the context using systems thinking techniques webinar...
Covid 19: Understanding the context using systems thinking techniques webinar...Covid 19: Understanding the context using systems thinking techniques webinar...
Covid 19: Understanding the context using systems thinking techniques webinar...
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
WRFY Exponential Organizations
WRFY Exponential Organizations WRFY Exponential Organizations
WRFY Exponential Organizations
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceGRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
 
E-environment
E-environmentE-environment
E-environment
 
New expectations for ai. intro by venkat vajradhar _ medium
New expectations for ai. intro    by venkat vajradhar _ mediumNew expectations for ai. intro    by venkat vajradhar _ medium
New expectations for ai. intro by venkat vajradhar _ medium
 
CIOReview
CIOReviewCIOReview
CIOReview
 
Three Macrotrends Impacting the Journey to 2030: Super Humans, Fluid Organiza...
Three Macrotrends Impacting the Journey to 2030: Super Humans, Fluid Organiza...Three Macrotrends Impacting the Journey to 2030: Super Humans, Fluid Organiza...
Three Macrotrends Impacting the Journey to 2030: Super Humans, Fluid Organiza...
 
How to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdfHow to navigate token launch risks - a16z crypto.pdf
How to navigate token launch risks - a16z crypto.pdf
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
10 Looking ForwardMike HouseholderAssociated PressLea.docx
10 Looking ForwardMike HouseholderAssociated PressLea.docx10 Looking ForwardMike HouseholderAssociated PressLea.docx
10 Looking ForwardMike HouseholderAssociated PressLea.docx
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 

More from Scott Cleland

More from Scott Cleland (12)

stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
stop-section-230s-uncivil-war-destroying-democracy-in-america-rui-research-10...
 
Common Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxCommon Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptx
 
Responsible Internet Measures
Responsible Internet MeasuresResponsible Internet Measures
Responsible Internet Measures
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional Investors
 
A Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google EmergesA Convincing Antitrust Suit against Alphabet-Google Emerges
A Convincing Antitrust Suit against Alphabet-Google Emerges
 
Amazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist TendenciesAmazon, Google, and Monopolist Tendencies
Amazon, Google, and Monopolist Tendencies
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization Strategy
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms Consumers
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal Documents
 

Recently uploaded

internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
AllTops
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
SandaliGurusinghe2
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 

Recently uploaded (16)

Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
Group work -meaning and definitions- Characteristics and Importance
Group work -meaning and definitions- Characteristics and ImportanceGroup work -meaning and definitions- Characteristics and Importance
Group work -meaning and definitions- Characteristics and Importance
 
thesis-and-viva-voce preparation for research scholars
thesis-and-viva-voce preparation for research scholarsthesis-and-viva-voce preparation for research scholars
thesis-and-viva-voce preparation for research scholars
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Spring-2024-Priesthoods of Augustus Yale Historical Review
Spring-2024-Priesthoods of Augustus Yale Historical ReviewSpring-2024-Priesthoods of Augustus Yale Historical Review
Spring-2024-Priesthoods of Augustus Yale Historical Review
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 

A Proven Thought Leadership Model

  • 2. As president of Precursor LLC, a consultancy specializing in the identification and mitigation of cyber systemic risk, also referred to as internetization, Scott Cleland is a proven thought leader, a leading internetization strategist, and an individual recognized as an authority on how internetization affects companies' risks and opportunities. Being called to testify before Congress a total of sixteen times on a variety of forward-thinking public policy issues relating to the internet is just one example of Scott Cleland’s thought leadership. Precursor’s model for thought leadership as it pertains to the Internet includes the following components:
  • 3. 1 - Anticipating - recognizing emerging changes in internet- related competition. 2 - Seeing the world as a whole - distinguishing which changes will affect competition, policy, ideology, economics, and technology. 3 - Spearheading thinking - influencing the understanding of the emerging risk, what its effects will be, and how they can be alleviated. The effectiveness of the model has been shown repeatedly in the identification of emergent risks, such as the systemic risks from Google’s dominance and the risks to the facilities-based broadband industry due to the failure of FCC policies.