BI-301f · Module 2

Network Vulnerability Analysis

3 min read

Network vulnerability analysis identifies the structural weaknesses in your position within the influence network — the relationships that are missing, the flow paths that are blocked, and the power centers you cannot reach. A vulnerability is not an opponent — it is a gap. An opponent can be addressed with evidence. A gap can only be addressed with relationship development, and relationship development takes time you may not have.

  1. Identify Single Points of Failure If your access to the economic buyer depends entirely on one champion, that champion is a single point of failure. If they leave, get reassigned, or change their disposition, you lose access. Every critical relationship path should have at least two routes — primary and alternate. Map both. Develop both.
  2. Identify Blocked Flow Paths If your information cannot reach a power center because you have no relationship with any member, that center is a blocked path. The power center will form an opinion about your solution based on secondhand information, competitor messaging, or their own assumptions — none of which you control. Blocked paths must be opened before the evaluation reaches the decision stage.
  3. Identify Adversarial Bridges If the only person connecting two parts of the network is someone who opposes your solution, they control how your message is translated as it crosses the bridge. An adversarial bridge will filter, reframe, or suppress favorable information. You must either develop an alternative bridge or engage the adversarial bridge directly to ensure accurate information flow.