06.06.2016 Views

Thinking the Unthinkable

Thinking-the-Unthinkable-cima-report

Thinking-the-Unthinkable-cima-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

THINKING THE UNTHINKABLE; A NEW IMPERATIVE FOR LEADERSHIP IN THE DIGITAL AGE<br />

45<br />

In <strong>the</strong> UK, <strong>the</strong> adoption of Red Teaming principles was recommended for <strong>the</strong> British<br />

government in 2004 by <strong>the</strong> Butler Report into Iraq’s Weapons of Mass Destruction. 48 Red<br />

Teaming is <strong>the</strong> embedding of a group of counter thinkers in daily processes or exercises in<br />

order to test <strong>the</strong> thinking and planning of <strong>the</strong> Blue team, which could be said to represent<br />

<strong>the</strong> current orthodox system at <strong>the</strong> time. Red Teaming was viewed as a sure way to<br />

counter group think and validate high risk political decisions independently. 49 Similarly,<br />

<strong>the</strong> Blackett Review also recommended Red Teaming but failed to give it any successful<br />

forward momentum. 50 Despite a few initiatives and non-committal lip service from<br />

officials or military officers, “They weren’t encouraged to red team”, said a high-ranking<br />

member of <strong>the</strong> armed services. Indeed, <strong>the</strong>re was evidence it did not achieve what was<br />

hoped or expected, partly because of internal bloody mindedness.<br />

Yet in <strong>the</strong> world of IT, Red Teaming has been revitalised in some quarters. Famously “White<br />

hat” ethical hackers penetrate <strong>the</strong> defences of companies. The aim is to test “The ease of<br />

which people can get in, how <strong>the</strong>y can bypass <strong>the</strong> various walls that constructed much<br />

more than simple firewalls. It is pressure testing our own systems which are very strong to<br />

see how you can penetrate beyond all <strong>the</strong> current obvious ways of so doing. So some of<br />

this is by blue team or red team”, as <strong>the</strong> Chair of a major company specialising in cybersecurity<br />

told us. Software development and testing bugs can be done competitively, and<br />

competitive problem solving hackathons are becoming ever more common.<br />

Overall, <strong>the</strong>re is little traction in most systems, because ‘experts’ are outsiders, and that<br />

status limits <strong>the</strong>ir impact and effectiveness. Insiders describe a tick box approach which<br />

allows <strong>the</strong> assertion that: “We’ve talked to outsiders and outside experts”, while <strong>the</strong><br />

insiders don’t really want to listen and factor in whatever, <strong>the</strong>y said.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!