{"id":66062,"date":"2021-07-28T11:00:58","date_gmt":"2021-07-28T01:00:58","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=66062"},"modified":"2021-07-28T10:39:42","modified_gmt":"2021-07-28T00:39:42","slug":"the-perfect-storm-of-global-vulnerability","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/","title":{"rendered":"The perfect storm of global vulnerability?"},"content":{"rendered":"
<\/figure>\n

We are only now realising the extent of the vulnerabilities that human development across the world has created. Last year, the Australian Risk Policy Institute<\/a> highlighted that \u2018innovation without governance is a global risk\u2019 and more recently that \u2018IT is the greatest risk to civilisation of all time.\u2019 Alarmist? No. Pragmatic? Yes.<\/p>\n

The complexity of our digital world has generated compounding and exponential vulnerabilities, risks and wicked problems never seen before. Global society has been built on a house of cards\u2014from the intricacy of the financial world to the meta-grid of interconnectedness and interdependencies. Vulnerabilities are potential barriers and constraints<\/a> that can manifest into an exponential-risk domino effect<\/a>.<\/p>\n

Michele Wucker\u2019s landmark book, The gray rhino: how to recognise and act on the obvious dangers we ignore<\/a><\/em>, well illustrates the risk mindset. Innovation over the past 50 years has been greater than ever before and brought untold benefits. But contrast that with today\u2019s \u2018hidden awareness\u2019 of what\u2019s happening outside public knowledge.<\/p>\n

Two consequences have arisen through innovation. The first is an absence of thinking or concern about how we deliver innovation. For example, we welcome the new global economy without considering who produces computer chips and complex pharmaceuticals because it allows us to buy cheap imported goods, borrow easy credit and live beyond our means.<\/p>\n

The second is a psychological dependency on digital evolution. The world has adopted false assumptions about this dependency. A few nations have campaigned strategically to advance political ends by leveraging dependency, ignorance, denial and arrogance. Others have failed to see, accept or protect against global vulnerability and are content to live in vertical silos (sometimes for commercial benefit) rather than make a paradigm shift towards network-centric risk thinking.<\/p>\n

A holistic perspective is needed for sustained post-Covid recovery, based on a realistic strategic context, that shines a light on what has occurred and how it will continue to play out.<\/p>\n

Importantly, a new way of thinking about risk is needed. Traditional thinking about and approaches to risk haven\u2019t adjusted to the realities and needs of today. Static and linear risk management will continue to fall short, leaving decision-makers vulnerable. Belated protection against global vulnerability leading to recovery will only occur if the world embraces actuality and simplicity. Complexity is entrenched and an ongoing risk across society; it can\u2019t be changed in the short term and must be embraced. Clarity and risk reduction are longer-term solutions, and planning alone is too late. We must respond to the now as well as plan for the future.<\/p>\n

Encouragingly, the world has identified the two pillars required for recovery. One is a global convocation of free nations (including corporates) coming together and demonstrating unity of purpose. The second is an event galvanising society as a gamechanger. The investigations into the source of Covid-19 represent that event.<\/p>\n

Recovery is possible but must be driven by strategic and integrated thinking and approaches based on simplicity, managing complexity and understanding the difference between \u2018near time\u2019 as the priority and \u2018deep time\u2019 as a future rock.<\/p>\n

One of the world\u2019s greatest policy challenges is to differentiate between vulnerability and risk. The world we live in faces unprecedented vulnerability. New thinking and a new approach are needed to conceptualise and apply risk. Vulnerability is defined as the potential for or possibility of strategic risks arising. However, current risk-management processes commence when a degree of probability exists. They often become mechanical and are frequently too late. Cyberattacks, the Covid-19 pandemic, the global financial crises and 9\/11 demonstrate the shortcomings of traditional risk approaches. Risk management has not waxed strong in times of trouble.<\/p>\n

A new approach to risk is available and gaining recognition. Industry leaders have identified that \u2018risk policy<\/a>\u2019<\/u> is the missing link. Risk policy addresses potentiality and illustrates how vulnerabilities can be identified by introducing a paradigm change through transformational leadership, accessing network information for awareness and turning the focus to anticipation.<\/p>\n

Informed and pre-emptive decision-making at the executive level can then provide protection against vulnerabilities, enhance resilience, build sustainability, encourage improvement and spur innovation. Risk policy looks ahead, anticipates and speaks to cause as well as effect\u2014which are, in reality, inseparable.<\/p>\n

ARPI\u2019s submission<\/a> to the parliamentary review of the Security Legislation Amendment (Critical Infrastructure) Bill 2020 highlighted the lack of awareness of developments in risk thinking and the out-of-date and demonstrably defective \u2018risk management\u2019 processes. These shortcomings could produce an ineffective statutory resilience framework for Australia with a failure to act faster.<\/p>\n

Another example was emphasised during the royal commission into Australia\u2019s natural disaster arrangements. ARPI argued<\/a> that the review\u2019s approach would entrench baseline, traditional \u2018operational processes\u2019 for risk management which have repeatedly failed and will continue to fail at significant times and levels. Rather than trying to react to existing isolated risks when it\u2019s usually too late, resilience in the future must be approached from a perspective of potentiality. That is, the scale of the 2019\u201320 bushfires was foreseeable and, to an extent, preventable.<\/p>\n

So, what needs to change? Decision-making must be informed and pre-emptive. In the case of the Black Summer bushfires, decision-making based on risk policy was needed before the fires occurred not just as a response to them. This decision-making must also be based on real-time local input through an intelligent, network-centric approach and framework, not in isolation or in cities working with limited information or within unhelpful jurisdictional boundaries.<\/p>\n

Of course, those involved exercised best judgement in the moment, but arguably without the right information at the right time on the right issue. Informed decision-making is the essence of bushfire prevention and preparation. Network-centric approaches are the enabler.<\/p>\n

Informed decision-making will only be achieved through a more contemporary risk policy approach. Paradigm change is required by governments to act pre-emptively. Our experience confirms that reactive, siloed, linear and traditional risk-management processes are not just ineffective, but are devastating and too late when the country is burning.<\/p>\n","protected":false},"excerpt":{"rendered":"

We are only now realising the extent of the vulnerabilities that human development across the world has created. Last year, the Australian Risk Policy Institute highlighted that \u2018innovation without governance is a global risk\u2019 and …<\/p>\n","protected":false},"author":1397,"featured_media":66064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[722,35,332],"class_list":["post-66062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-innovation","tag-risk","tag-technology"],"acf":[],"yoast_head":"\nThe perfect storm of global vulnerability? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The perfect storm of global vulnerability? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"We are only now realising the extent of the vulnerabilities that human development across the world has created. Last year, the Australian Risk Policy Institute highlighted that \u2018innovation without governance is a global risk\u2019 and ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-28T01:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-28T00:39:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tony Charge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tony Charge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/\",\"name\":\"The perfect storm of global vulnerability? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#primaryimage\"},\"datePublished\":\"2021-07-28T01:00:58+00:00\",\"dateModified\":\"2021-07-28T00:39:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/14a13ffcbb2b062f2d199bf43ba663c7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The perfect storm of global vulnerability?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/14a13ffcbb2b062f2d199bf43ba663c7\",\"name\":\"Tony Charge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/823b940db41ff39507b3463ba712e0cc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/823b940db41ff39507b3463ba712e0cc?s=96&d=mm&r=g\",\"caption\":\"Tony Charge\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tony-charge\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The perfect storm of global vulnerability? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"The perfect storm of global vulnerability? | The Strategist","og_description":"We are only now realising the extent of the vulnerabilities that human development across the world has created. Last year, the Australian Risk Policy Institute highlighted that \u2018innovation without governance is a global risk\u2019 and ...","og_url":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2021-07-28T01:00:58+00:00","article_modified_time":"2021-07-28T00:39:42+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg","type":"image\/jpeg"}],"author":"Tony Charge","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tony Charge","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/07\/matt-palmer-zCwDV_Al0mM-unsplash-scaled-e1627432625406.jpg","width":1000,"height":667},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/","url":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/","name":"The perfect storm of global vulnerability? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#primaryimage"},"datePublished":"2021-07-28T01:00:58+00:00","dateModified":"2021-07-28T00:39:42+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/14a13ffcbb2b062f2d199bf43ba663c7"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/the-perfect-storm-of-global-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"The perfect storm of global vulnerability?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/14a13ffcbb2b062f2d199bf43ba663c7","name":"Tony Charge","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/823b940db41ff39507b3463ba712e0cc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/823b940db41ff39507b3463ba712e0cc?s=96&d=mm&r=g","caption":"Tony Charge"},"url":"https:\/\/www.aspistrategist.ru\/author\/tony-charge\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/66062"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=66062"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/66062\/revisions"}],"predecessor-version":[{"id":66066,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/66062\/revisions\/66066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/66064"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=66062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=66062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=66062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}