{"id":1540,"date":"2025-04-30T18:19:17","date_gmt":"2025-04-30T23:19:17","guid":{"rendered":"https:\/\/www.gnosisxxi.mx\/?p=1540"},"modified":"2025-04-30T18:21:43","modified_gmt":"2025-04-30T23:21:43","slug":"blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/","title":{"rendered":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity"},"content":{"rendered":"<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The recent blackout on April 28th, which affected the Iberian Peninsula, highlighted the vulnerability of critical infrastructure to systemic failures, both physical and digital.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">This event has highlighted the urgent need to adopt systems thinking approaches, implement redundant systems, and strengthen cybersecurity capabilities through tools such as cyber ranges.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">This article analyzes the event and proposes strategies to improve national resilience to these types of incidents, as well as recommendations for businesses and organizations.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The blackout that affected Spain and Portugal was caused by a combination of technical failures in the electricity distribution grid and an unanticipated surge in energy demand, exacerbated by a minor cyberattack on a control substation in northern Spain.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Although the event was not catastrophic, it did expose structural weaknesses in the integrated management of critical infrastructure.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">According to the Spanish Electricity System Operator (REE), \u201cthe synchronization of unexpected events, both physical and digital, can generate cascading effects that compromise system stability\u201d (REE, 2025).<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">This type of disruption highlights the interdependence of electrical, IT, and logistics systems.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">This leads us to evaluate the need to use systems thinking, which allows us to analyze complex problems such as blackouts from a holistic perspective, considering the interrelationships between their components, relationships, and environmental conditions.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Rather than treating events as isolated incidents, this approach promotes a deep understanding of root causes, feedback loops, and potential long-term consequences.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">As Senge (2006) points out, \u201ctoday&#8217;s problems are the result of past solutions,\u201d which underscores the importance of anticipating unintended impacts.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">In an interconnected energy and technological environment, adopting this approach allows for the design of more resilient and proactive responses.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">One of the main lessons of the blackout is the urgency of having redundant systems in critical infrastructure.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Redundancy, understood as the duplication of essential system elements, acts as a backup mechanism that can be activated when the main system fails.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">In the words of Perrow (1999), \u201credundancy is not a luxury, but a necessity in systems where failure can have catastrophic consequences.\u201d<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">This is particularly relevant in electrical grids, transportation systems, and data centers, where even a brief interruption can generate significant economic and social losses.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">The blackout also highlighted the digital fragility of infrastructure and the importance of considering cybersecurity as a critical dimension.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">SCADA (Supervisory Control and Data Acquisition) systems, fundamental to energy management, are increasingly targeted by cyberattacks.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Protecting these facilities requires a robust cybersecurity strategy capable of detecting, containing, and mitigating threats in real time.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">The European Union Agency for Cybersecurity (ENISA) emphasizes that \u201cthe security of critical infrastructure depends as much on its technical architecture as on the preparedness of its operators\u201d (ENISA, 2024).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Thus, a combination of technology, procedures, and ongoing training is essential to address these challenges.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">A key tool in cyber threat preparedness is the use of cyber ranges, virtual environments that simulate attacks and defenses in realistic scenarios.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">These platforms allow technical response teams to gain practical experience without compromising real infrastructure.<\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"> According to the Spanish National Cybersecurity Institute (INCIBE), \u201ccyber ranges are essential for developing technical and strategic skills in cyber defense, fostering coordination, and improving response times\u201d (INCIBE, 2024).<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Furthermore, they allow for coordinated exercises with multiple stakeholders, from network operators to government agencies.<\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Lack of preparedness for cyberattacks or technical failures can have devastating consequences for a highly digitalized modern society.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">A prolonged power outage not only affects domestic comfort but can also paralyze hospitals, airports, transportation systems, banking networks, and supply chains.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Furthermore, in crisis contexts, misinformation and social panic can be amplified through digital networks.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">According to the World Economic Forum (2024), \u201ccyberattacks on critical infrastructure represent one of the top five global risks due to their potential to generate large-scale disruptions.\u201d<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The absence of protocols, redundancies, or adequate training can turn a manageable incident into a national crisis, with far-reaching economic, social, and geopolitical implications.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The blackout on the Iberian Peninsula offers critical lessons for the public and private sectors.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">One of the most relevant lessons is that no organization is immune to the impact of a disruption to critical infrastructure, even if it is not directly involved in the energy sector.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Therefore, it is essential that companies integrate operational resilience and cybersecurity into their strategic plans.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Among the main recommendations for governments, companies, and organizations are: &#8211; Develop business continuity and disaster recovery plans, with specific scenarios for power failures or cyberattacks.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">&#8211; Audit technological infrastructure to identify vulnerabilities, especially in industrial systems, SCADA, and IoT.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">&#8211; Invest in redundant systems, both in energy (such as generators or alternative sources) and in connectivity and communications.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">&#8211; Train staff in cybersecurity and crisis management, including simulations based on real-life scenarios using cyber ranges.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">&#8211; Collaborate with public agencies and other organizations on joint cyber resilience exercises and threat intelligence sharing.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">As the Industrial Cybersecurity Center (ICC) emphasizes, \u201cpreparedness is not only a technological issue, but also a cultural and organizational one; companies that anticipate risks are those that best survive and adapt\u201d (ICC, 2023).<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">Soft Systems Methodology (SSM), developed by Peter Checkland in the 1970s, offers a structured yet flexible approach to addressing ill-defined problem situations, such as those arising during mass blackouts or cybercrises in critical infrastructure.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Unlike &#8220;hard&#8221; systems, where the problem is clearly defined and the solution is technical, SSM recognizes the multiplicity of perspectives and tensions between actors with different goals and values.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">In contexts such as the blackout in the Iberian Peninsula, this methodology is especially useful for understanding the interaction between technical elements (electrical grid failures or SCADA systems) and human factors (political decisions, institutional coordination, social perception of risk).<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Checkland (1999) proposes the use of tools such as rich pictures and human activity systems to explore the complexity of these systems and identify desirable and culturally feasible changes.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">As Wilson (2001) points out, \u201cSSM enables organizations to manage uncertainty and ambiguity by integrating systems thinking with participatory organizational learning processes.\u201d<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">In this sense, applying SSM contributes not only to a better understanding of the crisis, but also to designing more sustainable and resilient long-term responses.<\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">In conclusion, the blackout in the Iberian Peninsula was not only a technical event, but a manifestation of the complexity and vulnerability of current systems.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">To avoid future crises, it is necessary to adopt a systems thinking approach, ensure operational redundancy, and strengthen cybersecurity through advanced cyber range training.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Smart cities can suffer serious consequences if they do not prevent and prepare for these situations.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">National, state, regional, or municipal resilience depends on the ability to anticipate, understand, adapt, and learn from these comprehensive challenges, as well as being alert and prepared for these risks and threats at the business and organizational levels.<\/span><\/span> <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">References <\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">&#8211; Industrial Cybersecurity Center (CCI).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">(2023).<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">*Industrial Cybersecurity Maturity Report in Spain*.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">https:\/\/www.cci-es.org <\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; Checkland, P. (1999).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Systems Thinking, Systems Practice: Includes a 30-Year Retrospective.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Wiley.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; ENISA.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">(2024).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Threat Landscape for Critical Infrastructure.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">European Union Agency for Cybersecurity.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; INCIBE.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">(2024).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Cybersecurity Training and Simulation for Critical Infrastructure.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">National Institute of Cybersecurity.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; Perrow, C. (1999).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Normal Accidents: Living with High-Risk Technologies.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Princeton University Press.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; REE.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">(2025).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Preliminary Report on the Power Outage in the Iberian Peninsula.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Red El\u00e9ctrica de Espa\u00f1a.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; Senge, P. (2006).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">The Fifth Discipline: The Art and Practice of the Learning Organization.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Doubleday.<\/span><\/span> <\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\">&#8211; Wilson, B. (2001).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Soft Systems Methodology: Conceptual Model Building and Its Contribution.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Wiley.<\/span><\/span><\/span><\/p>\n<p><span class=\"HwtZe\" lang=\"en\"><span class=\"jCAhz\"><span class=\"ryNqvb\"> &#8211; World Economic Forum.<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">(2024).<\/span><\/span> <span class=\"jCAhz\"><span class=\"ryNqvb\">Global Risks Report 2024. https:\/\/www.weforum.org\/reports\/global-risks-report-2024\/<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent blackout on April 28th, which affected the Iberian Peninsula, highlighted the vulnerability of critical infrastructure to systemic failures, both physical and digital. This event has highlighted the urgent need to adopt systems thinking approaches, implement redundant systems, and strengthen cybersecurity capabilities through tools such as cyber ranges. This article analyzes the event and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":905,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,21,24,13,25,23,22],"tags":[79,80,66,81,70,65],"class_list":["post-1540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-environment","category-entrepreneurship","category-global-environment","category-innovation","category-knowledge","category-leadership","category-regional-development","tag-blakout","tag-cybersecurity","tag-soft-systems-methodology-en","tag-solving-complex-problems","tag-strategy","tag-systems-thinking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI\" \/>\n<meta property=\"og:description\" content=\"The recent blackout on April 28th, which affected the Iberian Peninsula, highlighted the vulnerability of critical infrastructure to systemic failures, both physical and digital. This event has highlighted the urgent need to adopt systems thinking approaches, implement redundant systems, and strengthen cybersecurity capabilities through tools such as cyber ranges. This article analyzes the event and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Gnosis XXI\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T23:19:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T23:21:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Herrera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Herrera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/\"},\"author\":{\"name\":\"Fernando Herrera\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/#\\\/schema\\\/person\\\/5fe4bde0a511387389f447ccdfca726a\"},\"headline\":\"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity\",\"datePublished\":\"2025-04-30T23:19:17+00:00\",\"dateModified\":\"2025-04-30T23:21:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/\"},\"wordCount\":1240,\"image\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Diapositiva1.jpg\",\"keywords\":[\"Blakout\",\"Cybersecurity\",\"Soft systems methodology\",\"Solving complex problems\",\"strategy\",\"systems thinking\"],\"articleSection\":[\"Business environment\",\"Entrepreneurship\",\"Global environment\",\"Innovation\",\"Knowledge\",\"Leadership\",\"Regional development\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/\",\"name\":\"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Diapositiva1.jpg\",\"datePublished\":\"2025-04-30T23:19:17+00:00\",\"dateModified\":\"2025-04-30T23:21:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/#\\\/schema\\\/person\\\/5fe4bde0a511387389f447ccdfca726a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Diapositiva1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Diapositiva1.jpg\",\"width\":720,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/\",\"name\":\"Gnosis XXI\",\"description\":\"Gnosis XXI aplicando el conocimiento y construyendo redes de apoyo para acompa\u00f1ar a las empresas y gobiernos a lograr el \u00e9xito en su prop\u00f3sito con eficiencia y efectividad.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/#\\\/schema\\\/person\\\/5fe4bde0a511387389f447ccdfca726a\",\"name\":\"Fernando Herrera\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g\",\"caption\":\"Fernando Herrera\"},\"sameAs\":[\"http:\\\/\\\/www.gnosisxxi.mx\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fernando-herrera-pons-29a7a349\\\/\"],\"url\":\"https:\\\/\\\/www.gnosisxxi.mx\\\/en\\\/author\\\/fernando-herrera-pons-phd\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI","og_description":"The recent blackout on April 28th, which affected the Iberian Peninsula, highlighted the vulnerability of critical infrastructure to systemic failures, both physical and digital. This event has highlighted the urgent need to adopt systems thinking approaches, implement redundant systems, and strengthen cybersecurity capabilities through tools such as cyber ranges. This article analyzes the event and [&hellip;]","og_url":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/","og_site_name":"Gnosis XXI","article_published_time":"2025-04-30T23:19:17+00:00","article_modified_time":"2025-04-30T23:21:43+00:00","og_image":[{"width":720,"height":540,"url":"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg","type":"image\/jpeg"}],"author":"Fernando Herrera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Herrera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/"},"author":{"name":"Fernando Herrera","@id":"https:\/\/www.gnosisxxi.mx\/en\/#\/schema\/person\/5fe4bde0a511387389f447ccdfca726a"},"headline":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity","datePublished":"2025-04-30T23:19:17+00:00","dateModified":"2025-04-30T23:21:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/"},"wordCount":1240,"image":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg","keywords":["Blakout","Cybersecurity","Soft systems methodology","Solving complex problems","strategy","systems thinking"],"articleSection":["Business environment","Entrepreneurship","Global environment","Innovation","Knowledge","Leadership","Regional development"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/","url":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/","name":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity - Gnosis XXI","isPartOf":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg","datePublished":"2025-04-30T23:19:17+00:00","dateModified":"2025-04-30T23:21:43+00:00","author":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/#\/schema\/person\/5fe4bde0a511387389f447ccdfca726a"},"breadcrumb":{"@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#primaryimage","url":"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg","contentUrl":"https:\/\/www.gnosisxxi.mx\/wp-content\/uploads\/2020\/04\/Diapositiva1.jpg","width":720,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.gnosisxxi.mx\/en\/blackout-in-the-iberian-peninsula-a-call-for-systems-thinking-and-strategic-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.gnosisxxi.mx\/en\/"},{"@type":"ListItem","position":2,"name":"Blackout in the Iberian Peninsula: A Call for Systems Thinking and Strategic Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.gnosisxxi.mx\/en\/#website","url":"https:\/\/www.gnosisxxi.mx\/en\/","name":"Gnosis XXI","description":"Gnosis XXI aplicando el conocimiento y construyendo redes de apoyo para acompa\u00f1ar a las empresas y gobiernos a lograr el \u00e9xito en su prop\u00f3sito con eficiencia y efectividad.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gnosisxxi.mx\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gnosisxxi.mx\/en\/#\/schema\/person\/5fe4bde0a511387389f447ccdfca726a","name":"Fernando Herrera","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7272852b28983badb5229ea70892b3f25fe19175a9a0b7fe00625032c52e9305?s=96&d=mm&r=g","caption":"Fernando Herrera"},"sameAs":["http:\/\/www.gnosisxxi.mx","https:\/\/www.linkedin.com\/in\/fernando-herrera-pons-29a7a349\/"],"url":"https:\/\/www.gnosisxxi.mx\/en\/author\/fernando-herrera-pons-phd\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/posts\/1540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/comments?post=1540"}],"version-history":[{"count":1,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/posts\/1540\/revisions"}],"predecessor-version":[{"id":1541,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/posts\/1540\/revisions\/1541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/media\/905"}],"wp:attachment":[{"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/media?parent=1540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/categories?post=1540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gnosisxxi.mx\/en\/wp-json\/wp\/v2\/tags?post=1540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}