Our Story, Part 2: We Build Trust through Collaboration

Our Story, Part 2: We Build Trust through Collaboration

Our Story, Part 2: We Build Trust through Collaboration

We tell our story to share who we are as a company. This blog is the second in a series that highlights how our strategy and culture lead to positive results for our clients and employees.

The most successful companies know that building trusted relationships is the key to continued growth and success. Productive collaboration with our clients (and with each other internally) leads to long-term success. At Arc Aspicio, we build long-term, collaborative relationships with our client that allows us to work with clients at all levels of Government develop and implement innovative solutions to address mission-critical challenges.

One of our very valued long-term relationships is with the Federal Emergency Management Agency (FEMA). The story begins in 2008, when we won our first contract with FEMA, which was also our first prime contract. Since then, we have worked on more than 50 distinct projects at the agency – at the senior level and hands-on in specific programs throughout the organization. “FEMA Flexible” is a phrase we know well!

As the result of our first project, the Department of Homeland Security (DHS) recognized Arc Aspicio with the prestigious Small Business Achievement Award and we were thrilled. Since then, we have worked in every mission area at FEMA and in all regions with their leaders, employees, and stakeholders. When we supported the FEMA Regional Office Review, we interviewed 165 FEMA leaders from across mission areas and all 10 regions; emergency management leaders from 38 states, 31 tribal nations, and 5 territories; and representatives from 15 partner agencies and organizations, generating tremendous buy-in from across the whole community. We engaged more than 100 FEMA leaders in interactive workshops that enabled the agency to co-create actionable solutions for strengthening its Regional Offices.

Our work supporting in their national continuity mission managing the continuity for the entire Executive Branch and providing emergency alerts for weather disasters and terrorist incidents and Amber alerts for law enforcement has also been a rewarding and long-term partnership. Our people love the mission and projects! The relationships that we built and our extensive knowledge of the FEMA mission that results from it increases trust in our partnership and significantly reduces risk on projects by reducing the learning curve and helping FEMA unify its efforts. As we build relationships with people across FEMA in different mission areas, we stay in contact. The ability to go back to a colleague for their opinion or expertise is a big asset – trust matters!

 

By applying our innovation methods and connecting FEMA internally and with other agencies, we have delivered a wide range of complex consulting services in management, strategy, data analysis, Design Thinking, and information technology (IT). Our 22 IT projects at FEMA include data and enterprise analytics, strategic foresight, data governance, application development, and classified network implementation. Do what you say you are going to do and complete it when you say you will complete it sounds simple enough, but is a major factor in building trust. We consistently achieve our goals and produce our deliverables ahead of schedule, further strengthening the trust that FEMA has in our teams. Our extensive knowledge of FEMA’s IT landscape, current systems, and architecture challenge helps us understand the clear direction needed for IT modernization plans and necessary IT innovations.

Our long-standing collaboration helps us consistently deliver innovative solutions and our mission knowledge has led to this trusted partnership at FEMA, similar to clients at other agencies within the Department of Homeland Security. With great collaboration and consistent delivery of high-quality solutions, our clients trust us, which allows us to be more innovative and to take more calculated risks.

This story’s happy ending doesn’t end here. As we help FEMA look to adapt (and shape) future trends in emergency management in the next 20 years, make data-based decisions, support new mission areas, and transform technology, we look forward to continue building and maintaining trust with our clients.

About Arc Aspicio
Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. As a rapidly growing company, Arc Aspicio has a bold strategy for 2016-2018 that drives growth through new capabilities in strategy, design, human capital, data analytics, information sharing, cybersecurity, and strategic communications. The company is known for a strong, collaborative culture that values gratitude – for its clients and its great team. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com

Blog Our Story

Contributors

Erin Krause |

Erin Krause is a Proposal Senior Associate at Arc Aspicio. Erin graduated with Bachelor’s degrees in English Professional Writing and Legal Studies from Elizabethtown College in 2016 and brings experience in political science, writing, and business.

Reinventing Strategy

Reinventing Strategy

Since the GPRA Modernization Act in 2010, agencies across the Federal Government have raced to establish new Strategic Plans in response to incoming Presidential Administrations and agency leaders. Developing a new Strategic Plan is incredibly exciting for an agency. Leaders can redefine priorities, frontline managers can improve mission performance, and employees can better engage with the mission. Strategy, however, is so much more than just a Strategic Plan.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Affect Action

Behavioral Science – Using Behavioral Science to Affect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.