Kernelis Resilience is a method and a computerized system invented and developed to give to the client organization the rational means of reinforcing their resilience and of reducing their risk while optimizing the needed resources.
Kernelis Resilience processes an organizational structure as being a unified system, it calculates its stability as the resultant of energies and evaluates the systemic response when forces are applied to this system.
Organizational risk and resilience assessment should not be playing dice and should not give room to subjectivity. However, conventional methods, which all aim at answering the question “What might go wrong?”, are based on intuition and are therefore subjected to human and cognitive biases. Hence, the risk-based approach, which is the current rule in multiple domains of activities (national defense, drugs and biotech industry, airports and air transportation, nuclear and chemical plants), cannot be rationally controlled and the need for a new paradigm to address these critical issues is clearly expressed by competent bodies.
Kernelis Resilience gives a resolutely new approach, based on a robust scientific model, to allow an objective management of the organizational strategies. The strategies evaluated are not treated on a sole defensive perspective, as it is the case with traditional risk and resilience management.
Kernelis Resilience also aims at reinforcing the organizational structure by a better assignment of the available resources and the determination of the most adapted strategies.
Kernelis Resilience makes it possible to minimize the efforts (expressed in the terms of the costs and the constraints) for an optimal performance of the organization.
"Kernelis Resilience provides a rational approach that aims at enhancing a comprehensive and holistic management by knowledge for a controlled organizational and business development."
RISK, RESILIENCE & REINFORCEMENT
Quantity of destabilizing energy stored in a System and that can be released (suddenly or silently) if activated.
Capacity of an organization to absorb the released energy without irreversible damage to its essential (vital) assets.
Increasing the organizational resilience by a controlled reduction of risk.
Conventional methods are subjective
“ (...) many of these risks are managed only by the intuition of the project manager or management team. While many are skilled enough to investigate and control most of these risks, the number of projects that fail to meet functional requirements, cost limits, scheduled deadlines, reliability expectations (...) “
J.-M. Gernand. Proposal for an Integrated Risk Assessment and Management Application. 2008
Conventional methods are subjected to human biases:
“ (...) risk assessment is considered to be an integral part of a program for continuous improvement. It is not intended to be used for the justification of existing or inferior practices. The danger of bias lies in that it can take many forms, and is not always readily apparent. Bias can result in risks being overlooked, inappropriately assessed or prematurely dismissed.“
Paula Peacos. Bias: The Hidden Danger to Your Risk Assessment. American Pharmaceutical Review. Posted: March 31, 2016
LIMITS OF THE CONVENTIONAL METHODS
GOING BEYOND WITH KERNELIS RESILIENCE
Conventional methods are by design highly subjective and this is systematically evidenced in real case situations.
Non Interpretative, provides reproducible & repeatable results, whoever are the members of the team. Gives no room for black swans.
Conventional methods are time and resources consuming. They are extremely costly to the Organization for a often poor results.
Rapid and efficient. Keeps low the necessary organizational effort.
Processing can be parallelized in 2 or more computers to reduce the overall duration.
Conventional methods can be oriented by the team in charge of the analysis to mislead the outcomes.
Provides full traceability of loaded and computed data. analysis outcome can be retrospectively reviewed and assessed.
Intentional data modification cannot be anticipated.
Conventional methods generally process risks as discrete entities and face difficulties to cumulate and/or aggregate risks.
Processes data to couple elements and construct a self-consistent model. Kernelis Resilience is based on a rational and extensively documented theory. The mathematical concepts included are those of topological spaces.
HOW DOES IT WORK ?
THE MAIN STEPS
A comprehensive and up-to-date digitized ID of the organization.
Acquisition of company’s parameters, i.e. the digital ID of the Organization (about 120 checkboxes to value).
Result of the parametrization is compiled in a code which is integrated by Kernelis Resilience to assess the company’s risk, resilience and reinforcement levels.The parametrization is permanently updated by the company to reflect its organization.
Mapping graphic are convenient to locate the Critical Points within the defined processes. The display of the system through a sphere (left panel) or a 2D map (right panel) are non-exhaustive solutions to quickly visualize the static state or dynamic behaviour of the system.
Computation of the Zero Base configuration: Identification of the vulnerability space (Location and magnitude of the risk) without Protecting Shield.
Visual showing the effect of the force field acting on the system (activated state). The visualization of the location and the magnitude of the stored energy (vulnerability) for each critical points are enable through the color gradient.
Computation of the current configuration under a Protecting Shield: Comprehensive impact of the action plan (OAP) on the system.
Extraction, indexation and analysis of the linguistic descriptors constituted by the set of procedures of the OAP through the [XD] module. To prevent any subjectivity or misinterpretation of the elements belonging to the Organizational Action Plan [OAP], Kernelis Resilience integrates a proprietary Text Analysis Module: [XD], (adapted from Kernelis Descriptor).Any series of software legible document(s) edited in pdf (or .txt) format can be batch-wise loaded, and will be thus processed by specifically developed linguistic descriptors that are dedicated to a particular domain of activity. Kernelis Resilience assess the distribution of the efficacy of each individual protective measures (standard operating procedure) that constitute the OAP accross the force field.
Effect of the OAP which successfully reduced the stored energy in the system (risk) by decreasing the nodal deviation on a broad range of critical points.
The efforts, expressed in the dimensions of cost and constraint, needing to be in priority brought by the organization in order to stabilize the System are highlighted and listed.
Results are compiled and documented in automatically generated progress reports.
Based on the computed Risk and Resilience configuration, it is possible to determine where effort should be brought to strengthen the Organization and efficiently sustain its vital assets.
The user can rationally shape its [OAP] to specifically address the protection of the vital assets and optimize the cost and efforts.
In this example, the reinforcement axis R05 is selected. The more contributive points of the vulnerability space are listed accordingly to their impact. The elements of the existing [OAP] that should be reprocessed (with indication of the missing items) are given in the table “OAP IMPROVEMENT“. According to this, the next step of the structure reinforcement could consist in:
Cleaning the [OAP]: Remove or reclassify (i.e. downgrade the file from instruction to guidelines or even information) elements that are less contributive and which content is not aligned with the current strategy; Merge documents to increase their performance index and decrease cost.
Enhancing the [OAP]: The content of the elements listed in the table “OAP IMPROVEMENT“ should be reprocessed to integrate the missing topics.
Modifying the scope (Domain of Application) of the less contributive and/or excessively resources consuming elements of the [OAP].
Introducing in the [OAP] new elements (instructions and procedures but also reports of computational modeling and simulation that assess the security level of the Organization) that would address the more destabilizing points vulnerability space and filter off the forces that severely impact the System.