The North Star Method

How we co-create with you.

We approach every engagement the same way: understand the real problem before recommending solutions, design something that fits your actual context, and deploy it iteratively — with value at every cycle. The examples below show what The North Star Method looks like in practice.

The North Star Method

Three phases. Discover · Design · Deploy. Built for value at every cycle.

Whether the work is a four-week assessment or a two-year transformation, the structure is the same: discover what's actually going on, design something that fits your context, deploy it iteratively. At every cycle, you have something you can use.

A note on how we deliver

Many clients have lived through consulting engagements that disappear into a six-month black box and emerge with a 200-page report nobody reads. We don't work that way. Our engagements are structured in two-to-four-week cycles, and at the end of every cycle, you have something you can actually use — a finding, a quick-win recommendation, a working prototype, a documented process, a decision-ready briefing. Value compounds along the way; nobody waits for the final reveal.

This is sometimes called "agile" or "iterative" delivery. The technical name doesn't matter. What matters is: at every point of engagement, you're getting something useful.

Phase 1 — Discover

Typically 2–6 weeks, fixed fee

  • Stakeholder interviews (board, leadership, frontline staff)
  • Technology, process, and risk audit
  • Funding and procurement landscape review
  • Cycle deliverables: Findings memos at each two-week checkpoint
  • Final deliverable: Comprehensive Assessment Report with prioritized findings

Phase 2 — Design

Typically 4–12 weeks, project fee or short retainer

  • Prioritized remediation or build plan
  • Quick-win identification — what we implement during this phase, not after it
  • Vendor and tooling recommendations (vendor-neutral)
  • Funding pathway analysis (grants, contract vehicles, capacity-building funds)
  • Final deliverable: 12-month transformation roadmap with funding strategy

Phase 3 — Deploy

Typically 6–24 months, retainer

  • Hands-on implementation support
  • Vendor selection and oversight
  • Staff training and change management
  • Fractional leadership functions where useful
  • Ongoing measurement against the roadmap
  • Cycle deliverables: Quarterly business reviews, monthly status reports
The sequencing principle: stabilize → modernize → optimize.

Most engagements share a sequence. First, stabilize — fix what's broken, close the bleeding wounds, get the foundation onto solid ground. Then modernize — replace aging or ill-fitting infrastructure with what the next stage requires. Finally, optimize — layer in AI, automation, and the higher-leverage tools that compound returns once the foundation is stable. Skipping the first two steps is how AI implementations fail.

Why phased?

Each phase justifies the next. Clients who only need Phase 1 get a real deliverable they can act on without us. Clients who go further do so because the work earned it. Nobody is locked in.

The North Star Method in practice

The following scenarios show how The North Star Method applies to four common engagement types. Situations are composites drawn from real-world contexts; the engagement structures show how we'd structure the work.

Example 1

Cybersecurity Recovery for a Mid-Size Public Agency

The situation.

A mid-size public agency had been experiencing cyber attacks for three years. The previous CEO had circumvented digital financial systems by requiring handwritten receipts — creating untraceable access points and an audit trail that didn't exist. A new CEO was inheriting an organization with active cybersecurity exposure, financial controls failure, and unknown depth of damage.

Our reframe.

Most firms would have positioned this as a cybersecurity engagement. We saw three compounding problems: an active or persistent cyber threat, an internal financial controls failure, and a leadership transition where the new CEO needed clarity before making any major decisions. The engagement scope wasn't "fix the IT" — it was a trust, governance, and infrastructure reset.

How we'd approach it.
Phase 1 — Discover (4 weeks, fixed fee)

Cybersecurity posture review (network, endpoints, access controls, incident history). Financial controls audit. Stakeholder interviews. Deliverable: comprehensive risk and gap report with prioritized findings.

Phase 2 — Design (6 weeks)

Prioritized remediation plan across cybersecurity, financial controls, and operations. Funding pathway analysis (cyber insurance riders, federal grants for compliance modernization, capacity-building grants). Board-ready presentation.

Phase 3 — Deploy (12 months, retainer)

Vendor selection oversight (EDR, MFA, backup architecture, ERP replacement). MFA rollout. Network segmentation. Phishing simulation training. Ongoing fractional CISO function.

The strategic levers we'd surface.

If the agency has a pending federal cybersecurity grant they haven't yet applied for, we help scope the application and write the statement of work. Cyber insurance up for renewal; we'd reframe the engagement budget against the avoided premium increase. Federal funding compliance requirements make the work effectively non-optional, not discretionary.

Example 2

AI Implementation for a State Health & Human Services Agency

The situation.

A state HHS agency facing pressure from the legislature to adopt AI-enabled fraud detection in its Medicaid program — alongside vendor proliferation, governance uncertainty under emerging state AI legislation, and a procurement environment where the wrong contract vehicle could lock the agency into a multi-year decision before the technology was understood.

Our reframe.

The pressure point looked like "buy AI fraud detection." The actual problem was: how do you adopt AI in a high-stakes, federally-overseen, citizen-affecting program without locking yourself into the wrong vendor, the wrong architecture, or the wrong governance posture before you've had time to learn? The engagement we proposed wasn't an AI build — it was AI strategy and procurement architecture, with the build coming later.

How we'd approach it.
Phase 1 — Discover (8 weeks)

Stakeholder interviews across agency leadership, program oversight, IT, legal, and the legislative sponsor's office. Federal precedent analysis (CMS AI fraud detection, Florida 40x ROI). State governance landscape review. Coalition map.

Phase 2 — Design (10 weeks)

Pilot Implementation Plan defining MVP scope, success metrics, governance frameworks, and human-in-the-loop architecture. Vendor evaluation framework. Contract vehicle recommendation. Funding pathway analysis.

Phase 3 — Deploy (12–18 months, retainer)

Independent vendor-neutral oversight of the build. Workforce AI literacy program for agency staff. Public-facing AI notice and acceptable-use policy implementation. Quarterly readouts to legislative sponsors and oversight committees.

The strategic levers we'd surface.

A federal precedent (CMS-disclosed AI fraud detection saving ~$2B in twelve months) would reframe the agency's risk calculus from "AI is risky" to "not adopting AI is risky." A bipartisan legislative committee already organized around the issue makes the engagement legislatively legible and politically supported. State AI legislation gives the agency a defensible governance framework to point to, converting compliance from cost into shield.

Example 3

Operational Modernization for a Growing Mid-Market Business

The situation.

A growing business at the inflection between founder-run and professionally-run, struggling with high turnover, manual processes, and the realization that the systems that got them here would not get them to the next stage. Management was considering enterprise-grade software and bracing for a six-figure procurement decision.

Our reframe.

Most firms would have led with software recommendation. We saw a process problem masquerading as a technology problem. Implementing enterprise software on top of unclear processes amplifies the chaos rather than fixing it. The engagement we proposed started at process documentation and only got to technology in Phase 2.

How we'd approach it.
Phase 1 — Discover (3 weeks, fixed fee)

Stakeholder interviews. Process mapping for the three highest-friction workflows. Technology stack review. Deliverable: process audit report.

Phase 2 — Design (6 weeks)

Implement two quick-win process changes that address 60% of the friction with no software spend. Design the technology layer to fit the redesigned process. Vendor evaluation and recommendation.

Phase 3 — Deploy (9 months, retainer)

Technology rollout. Staff training and change management. Quarterly business reviews. Transition to advisory by month 12.

The strategic levers we'd surface.

The original procurement budget would get smaller, not bigger — because the right technology, scoped to a redesigned process, costs less than the wrong technology scoped to chaos. The change management work would make the actual technology rollout uneventful — the opposite of what clients typically expect.

Example 4

Fractional CFO + COO Coverage for a Nonprofit in Leadership Transition

The situation.

A mission-driven nonprofit had two simultaneous executive openings — CFO and COO — at a moment when the organization was managing federal grants with zero margin for compliance error and a board newly attentive to financial controls after a previous administration's lapses. A traditional executive search would take 6–9 months per role. The organization could not wait.

Our reframe.

Most consulting firms would have positioned a "transition support engagement." We saw that as half the answer. The board didn't need an engagement; the organization needed executives. We proposed fractional CFO and COO coverage — fractional in time commitment, full in scope, embedded enough to be accountable for outcomes, lightweight enough to be sustainable while permanent search happened in parallel.

How we'd approach it.
Phase 1 — Stabilize (4 weeks, fixed fee)

Financial controls audit. Operational risk assessment. Immediate-term grant compliance review. Identified one open compliance exposure that, left another quarter, could have triggered a federal audit. Fixed.

Phase 2 — Modernize (12 weeks, retainer)

Embedded as fractional CFO (~16 hours/week) and fractional COO (~12 hours/week). Built monthly board-reporting cadence. Implemented grant tracking and reporting infrastructure. Designed and ran the search for permanent hires in parallel.

Phase 3 — Transition out (8 weeks, descending retainer)

Stepped down to advisory cadence as permanent leadership took the seat. Closed engagement with a clean handoff document and standing on-call availability for the first 90 days of the new CFO's tenure.

The strategic levers we'd surface.

A board prepared to hire an emergency interim CFO at premium daily rates would find fractional at 30% of that cost for the same coverage. Federal grant compliance work, framed correctly, can be funded out of the grants themselves (allowable indirect cost) — meaning the engagement effectively pays for itself. The hand-off document we'd produce would become the onboarding curriculum for both permanent hires.

Discovery questions we bring to every first conversation

We don't lead with solutions. We lead with questions.

For every first conversation

  • What does success look like to you in 6, 12, 24 months?
  • What's been tried before? What worked, what didn't, why not?
  • Who are the stakeholders that need to be on side for this to work?
  • Where's the urgency coming from — is it real, or manufactured?
  • What's the budget reality — what funding sources are available, what's off-limits?

For public-sector clients, we add

  • What governance and procurement constraints shape what's even possible?
  • Who's the legislative or executive sponsor? What's their political coalition?
  • Are there federal program oversight or compliance requirements that make this non-optional?
  • What's the procurement vehicle, and is the scope sized to fit it?

For nonprofits, we add

  • What grants, capacity-building funds, or insurance products could support this work?
  • What does the board know, and what do they need to know?
  • Are there audits, funder reviews, or regulatory deadlines on the horizon?

For businesses, we add

  • What's the actual bottleneck — is it process, technology, people, or capital?
  • What's your growth curve assumption, and is the system you're building for the curve you're on or the curve you wish you were on?
  • What does "scale" actually mean in your context — revenue, geography, headcount, complexity?

How engagements start

Every engagement starts with a discovery conversation — free, no obligation. From there, we co-create scope, timeline, and pricing in writing before any work begins. We structure engagements to fit your goals, your timeline, and your funding context — whether that's a state or federal contract vehicle, a federal grant, capacity-building or cyber insurance funds, or a direct engagement budget.