The Energy Transition: Not if, but When | Susan Hunt Stevens

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=D4q_KIhVnqo



Duration: 0:00
1 views
0


Key Takeaways/Calls to Action:

• For Individuals: Actively experiment in your career to find genuine fulfillment. Consciously manage your "personal overhead" to maximize your agility and options. Consider how your time, talent, and resources can be directed toward solving pressing global challenges.
• For Innovators & Entrepreneurs: Beyond celebrating disruption, take full accountability for the "second-order effects" and broader societal impacts of your innovations.
• For Society & Policy Leaders: Proactively implement "hospice care" strategies to support individuals and communities affected by systemic transitions. Structure incentives and "bounties" to accelerate vital innovations, outcompeting entrenched, inferior old systems. Critically, understand that the energy transition is an inevitable "when," and global leadership will fall to those who embrace and invest in this future now.

Suggested Resources

• CIBO Technologies (https://www.linkedin.com/company/cibo-technologies/) – Scaling regenerative incentives
• XPRIZE (https://www.xprize.org/) (for Carbon Removal) – Innovation through competition
• Spark Global (https://sparkglobal.io/) – Climate innovation with a systems lens




Other Videos By ITSPmagazine


2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | With Theresa Lanowitz
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29The Energy Transition: Not if, but When | Susan Hunt Stevens
2025-07-29ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-28ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-27ThreatLocker Will Unveils Game-Changing Zero Trust Innovations at Black Hat 2025 | Booth #1933
2025-07-25From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurit...
2025-07-25From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurit...
2025-07-24Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akam...
2025-07-24Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akam...
2025-07-24Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025
2025-07-24From Black Hat to Black Sabbath / Ozzy: AI, Guitars, Entry Level Cybersecurity, Robots Evolution
2025-07-24Teaser: How to hack Global Activism with Tech, Music, & Purpose. Michael Sheldrick -Global Citizen