The Situation
A Fortune 500 entertainment and hospitality company asked me to lead legacy enterprise product EOL & replacement for Finance—support agreements were expiring in 6-9 months.
I asked for a week to evaluate before executing. That week changed everything.
I found data systems transferring information only through SFTP flat files, multiple applications with overlapping features, no unified data layer. The presenting problem was "replace declining products." The actual problem was architectural fragmentation.
The Reframe
I went back to my executive director with a proposal: instead of point-to-point legacy replacement, build a platform that could unify workflow, compliance, and data across these systems.
The Constraint: The "Trojan Horse" Architecture
The company had recently experienced a major data breach. On my first Friday, I met with the VP of Architecture—a 19-year veteran who had blocked every cloud integration attempt.
Direct confrontation would have failed. Instead, I designed a hypothesis to test his risk tolerance without exposing the core.
The Pivot: Rather than argue about cloud security philosophy, I proposed building AP's digitized invoice workflow with Okta integration enabling O365 mailbox approvals.
The Outcome: He gave us the chance. That single decision—a low-risk architectural "Trojan Horse"—unlocked O365 integration enterprise-wide and cleared the path for the broader transformation.
The $600M Breakdown
| Category | Value | What It Represents |
|---|
| Hard Cost Savings | $300M | Licensing consolidation, server retirement, decommissioning 23 legacy systems |
| Strategic Value | $300M | Productivity gains (headcount reallocation), risk mitigation (automated audit controls) |
| Total | ~$600M | |
7 core systems unified: Azure, Salesforce, Oracle ERP, Workday, O365, Okta, ServiceNow—integrated for the first time in company history.
What This Taught Me
The ask is rarely the opportunity.
"Replace legacy products" was a project. "Build an enterprise platform that connects them" was a product.
Beachheads validate before you scale.
The right first use case de-risks everything that follows.
Security concerns are requirements to design for.
One testable hypothesis turned blockers into partners.