Gabriel Mahia Systems · Power · Strategy

The Exposure That Isn't Visible

The most dangerous institutional risks are not the ones on the risk register. They are the ones the risk register was not designed to capture.

What Risk Registers Miss

Every sophisticated institution maintains some form of risk register — a documented inventory of the risks it faces, typically categorised by type, assessed by probability and impact, and assigned to owners who are responsible for managing them. Risk registers are genuine governance tools. They force systematic thinking about what could go wrong, they create accountability for risk management, and they provide the documentation that oversight functions require. They also have a specific and consequential structural blind spot: they capture the risks that the people who built them knew to look for.

The risks that are not visible to the people who built the risk register are not on it. This is obvious in statement but underappreciated in practice. The operational risk that arises from a dependency on a third-party system whose reliability has never been audited is not on the risk register because no one with register access has audited that dependency. The strategic risk that arises from the gradual erosion of a capability that has been assumed to exist because it has always existed is not on the register because the erosion is not observable until the capability is needed and found to be absent.

Hidden Exposure Sources

Hidden exposures concentrate in several categories. Dependency risks — exposures that arise from the institution's dependence on external actors, systems, or conditions that are assumed reliable but have not been tested under stress — are systematically underrepresented in risk registers because the dependencies themselves are often not fully mapped. Legacy assumption risks — exposures that arise from institutional decisions made on the basis of conditions that no longer obtain — are systematically invisible because the original assumptions have become part of the institutional background rather than active parameters being monitored. And aggregation risks — exposures that arise from the combination of multiple individually manageable risks that are correlated in ways that make their simultaneous occurrence far more likely than the independent probability of each would suggest — require analytical sophistication to detect that most risk assessment processes do not apply.

Finding the Invisible

Finding the exposures that are not on the risk register requires a different kind of inquiry than risk register maintenance. It requires asking not what risks have been identified but what conditions would need to be true for a serious failure to occur that current risk management would not prevent. It requires stress-testing assumptions — identifying the assumptions that underpin the institution's assessment of its own resilience and asking what happens if those assumptions are wrong. And it requires seeking perspectives from actors outside the institutional mainstream who have different knowledge of the institution's operational reality and therefore different knowledge of where the invisible risks are concentrated.

The risk register is a map of the territory that was mapped. The invisible exposure is in the territory that was not. The most consequential risk management question is not what is on the register — it is what conditions would have to hold for something catastrophic to happen that the register would not have warned about.

Discussion