Professional Documents
Culture Documents
© Getty Images
May 2020
For more than a generation, organizations have effective mitigation and business-continuity
relied on global, interconnected supply chains plans.
to improve margins. Since 2000, the value of
intermediate goods traded globally has tripled
to more than $10 trillion. During the same period, Find your vulnerabilities and
indicators of supply-chain efficiency—such as exposures
inventory levels, on-time-in-full deliveries, and lead Operations risk-management practices that
times—have improved for those businesses that view risk as arising mainly from discrete sources
succeeded in creating lean, global networks. of shock or specific elements of supply-chain
design, such as geographic footprint, are too
However, these efficiencies have not come for narrow to be sufficient in today’s environment.
free. An ever-expanding set of global challenges The most advanced businesses will model the
has increased the surface area and magnitude of size and impact of various shock scenarios
supply-chain risks, from climate change and the to determine the actions they should take
rise of a multipolar economic system to increased to rebuild their supply chains and mitigate
mobility and digitization. These global disruptions future risks. A comprehensive understanding
have meant that in every year over the past several of supply-chain risk considers two distinct
years, at least one company in twenty has suffered elements: first, the underlying vulnerabilities
a supply-chain disruption costing at least $100 in the supply chain that make it fragile, and
million. second, the level of exposure or susceptibility to
unforeseen events (or shocks) that exploit these
Fast forward to the coronavirus crisis, whose vulnerabilities.
humanitarian and human-livelihood costs are
still rising, even as it also reveals supply-chain Supply-chain vulnerabilities manifest in five
vulnerabilities that many companies didn’t realize main areas: planning and supplier networks,
they had. As a result, building flexibility and transportation and logistics systems,
resilience in operations has gone from one priority financial resiliency, product complexity, and
among many to business-critical. In this context, organizational maturity. These vulnerabilities
organizations need a new approach to manage include realities inherent to an industry, such
supply-chain risk and build resiliency. as high levels of cyclicality or long lead times,
as well as active decisions, such as the level
In the short term, companies are concerned of inventory to maintain, or the approach to
about the shortages of critical goods. In the long product development. Designs relying on
term, as businesses and governments emerge single-source components are an obvious
from the current crisis, we anticipate a renewed chokepoint—but as manufacturers have
focus on better quantifying risks, with a mindset learned to their peril, even components with
similar to buying insurance—by using probabilistic seemingly ample supplier ecosystems may
approaches, such as discrete-event simulation, be concentrated in a single region, or may
and by redesigning business cases to include themselves depend on commodities that are
potential losses from a lack of resiliency measures. highly concentrated.
These responses represent a shift in business
strategy, with companies showing more willingness Exhibit 1 illustrates how these vulnerabilities
to weigh the benefits of investments to navigate manifest for an illustrative company. While for
future risks against the potential fallout from failing most dimensions, the company shows lower or
to do so. industry-average vulnerability—in part because
of unusually high financial resilience—its
Companies will need a much deeper view of their planning capabilities and supplier network are
supply-chain vulnerability and exposure to create significantly more vulnerable than the industry
benchmark. These factors could become more suppliers, and of their suppliers’ suppliers. Many
important should financial resilience erode, as organizations can only speak in general terms
would be typical as a crisis wears on. beyond the Tier 1 level, even though this is often
where the most critical suppliers sit within a network.
Exposure refers to unforeseen events that exploit Creating a comprehensive view of the supply chain
a vulnerability and disrupt a supply chain. There through detailed subtier mapping is a critical step
are four main sources of exposure: force-majeure to identifying hidden relationships and nodes of
shocks (natural disasters), macropolitical (economic interconnectivity that invite vulnerability.
shocks), malicious actors (cyberattacks); and
counterparties (fragile suppliers). As shown in Build transparency through analytics
the current COVID-19 crisis, these shocks can In many industries, gaining transparency from an
affect supply and demand in varying and even outside-in approach is difficult. However, combining
contradictory ways, with demand in freefall for many the mosaic of publicly available data and network-
classes of goods, even as suppliers strain to deliver analytics algorithms can illuminate the probable
medical products and similar necessities. supply chain for many companies.
Web <year>
<article slug>
Exhibit <x> of <y>
Exhibit 2
In-depth mapping
In-depth mapping of supply-chain structures
of supply-chain shows shows
structures vulnerability and
vulnerability and
exposure across tiers.
exposure across tiers.
Large, centralized suppliers have many small sub-tiers
Identify bottlenecks and risk factors in supply chain Quantify risk factors
Web <year>
<article slug>
Exhibit <x> of <y>
Exhibit 3
Financialmodeling
Financial modelingcancan quickly
quickly assess
assess risk scenarios.
risk scenarios.
25.3
Raw-
material None Full Full Partial Full Partial Full
delivery
Assumptions
Knut Alicke is a partner in McKinsey’s Stuttgart office, Ed Barriball and Susan Lund are partners in the
Washington, DC office, and Daniel Swan is a senior partner in the Stamford office.
The authors wish to thank Kyle Hutzler and Henry Marcil for their contributions to this article.