In February 2024, a ransomware attack shut down Change Healthcare, the largest health payment processor in the United States.
For weeks, pharmacies could not process prescriptions, hospitals could not verify insurance, and providers lost an estimated $100 million per day in delayed claims.
The parent company, UnitedHealth Group, eventually disclosed that the breach affected roughly one-third of all Americans.
The root cause was not exotic. It was a single set of compromised credentials on a system that lacked multi-factor authentication, exploited through a chain of dependencies that the organization’s business continuity plan had not adequately mapped.
That incident crystallized what every risk management practitioner already suspects: most organizations have a BCP on paper, but fewer than half have tested it, and fewer still have stress-tested the third-party dependencies that actually determine whether the plan works.
According to the BCI Continuity and Resilience Report 2025, only 49% of organizations globally have tested their continuity plans.
The FBI’s IC3 recorded $16.6 billion in cybercrime losses in 2024, a 33% increase over 2023. And FEMA’s data continues to show that roughly 40% of small businesses never reopen after a major disaster.
This guide is for practitioners who need to move beyond paper compliance. It walks you through the entire BCP lifecycle: understanding what a BCP actually covers, conducting a business impact analysis, building recovery strategies, developing the plan document, testing it, and maintaining it over time.
You will find a 35-item compliance checklist, a BIA template with worked examples, a regulatory mapping for US industries, and a 90-day roadmap to get your BCP from concept to Board-approved.

Figure 1: Business Continuity by the Numbers. Sources: FBI IC3 2024; FEMA; NOAA NCEI; BCI 2025; IBM Cost of a Data Breach 2025.
1. What a Business Continuity Plan Actually Is (And What It Is Not)
A business continuity plan is a documented set of procedures that tells your organization how to maintain or quickly restore critical business functions when something goes badly wrong.
That something could be a hurricane knocking out your primary office, a ransomware attack locking down your systems, a critical supplier suddenly going out of business, or a pandemic forcing extended remote operations.
The BCP is not a crisis communications brochure or a vague statement of intent. It is an operational playbook with specific actions, named owners, and realistic timelines.
As practitioners, we need to be precise about what a BCP covers and what belongs in related but separate plans.
BCP vs. Related Plan Types
| Plan Type | Primary Focus | Key Question | Relationship to BCP |
| Business Continuity Plan (BCP) | Sustaining critical business functions during and after a disruption | How does the business keep running when things go wrong? | The master plan that references all others |
| Disaster Recovery Plan (DRP) | Restoring IT systems, data, and infrastructure | How do we recover our technology stack after a failure? | Feeds RTO/RPO targets into the BCP |
| Crisis Management Plan (CMP) | Leadership response, communications, stakeholder management | Who is in charge, what do we say? | Provides the decision chain the BCP activates |
| Business Recovery Plan (BRP) | Returning to normal operations after the crisis phase | How do we get back to business as usual? | Picks up where the BCP leaves off |
An organization that has only a DRP and calls it a BCP is missing the human, process, and vendor dimensions of continuity.
Those gaps surface at exactly the wrong moment. The gold standard for BCP frameworks remains ISO 22301:2019, which provides a Plan-Do-Check-Act lifecycle for the entire program. The NIST SP 800-34 Contingency Planning Guide is the US government’s parallel reference, widely used by federal contractors and regulated industries.
For a broader view of how BCPs fit into enterprise risk management, see our guide on operational resilience versus business continuity.
2. Business Impact Analysis: The Analytical Engine Behind Every Credible BCP
Those plan distinctions matter because they determine scope, but the BIA is where the real analytical work begins. Every BCP practitioner eventually learns the same lesson: a plan is only as good as the BIA behind it.
The Business Impact Analysis is the process that tells you which functions are truly critical, how long the organization can survive without them, and what resources are needed to recover them. Without a rigorous BIA, recovery time objectives become guesswork and recovery strategies become misallocated budget.
What a BIA Measures
A BIA is not a risk assessment. It does not focus on the likelihood of disruption. It focuses entirely on the consequence of disruption, regardless of cause. For each critical function, you need three answers:
Maximum Allowable Outage (MAO) / Maximum Tolerable Period of Disruption (MTPD): the longest the business can survive without this function before damage becomes irreversible.
Recovery Time Objective (RTO): the target time to restore the function, which must be less than the MAO. Recovery Point Objective (RPO): for data-dependent functions, the maximum acceptable data loss measured in time. An RPO of 4 hours means you can tolerate losing up to 4 hours of transactions.
The BIA also quantifies the impact in financial, operational, regulatory, and reputational terms. This gives you the evidence base to justify recovery investment.
If a function generates $50,000 in revenue per day, you can make a rational business case for spending $20,000 on a hot site backup.
BIA Template: Worked Example
The table below shows a worked BIA for a mid-sized US financial services firm. MAO, RTO, and RPO values are illustrative and should be set based on actual operational and regulatory constraints.
| Business Function | Owner | Impact if Disrupted | MAO | RTO | RPO | Priority |
| Customer billing & collections | Finance | Revenue loss ~$50K/day; contract breach risk | 4 hrs | 24 hrs | 72 hrs | Critical |
| IT helpdesk & systems access | IT | Productivity loss; security exposure | 2 hrs | 8 hrs | 24 hrs | High |
| Payroll processing | HR | Employee payment failure; legal & morale risk | 24 hrs | 72 hrs | 7 days | High |
| Customer service / call center | Operations | Client dissatisfaction; SLA breach penalties | 1 hr | 4 hrs | 24 hrs | Critical |
| Supply chain ordering | Procurement | Inventory depletion; production halts | 8 hrs | 48 hrs | 5 days | High |
| Financial reporting | Finance | Regulatory deadlines; audit issues | 24 hrs | 72 hrs | 5 days | High |
| Legal & compliance monitoring | Legal | Regulatory exposure; missed filings | 48 hrs | 7 days | 14 days | Medium |
| Marketing & communications | Marketing | Reputational risk; delayed campaigns | 72 hrs | 7 days | 30 days | Low |
Table 2: BIA Template – Worked Example for a US Financial Services Firm
One common BIA mistake is setting RTO equal to MAO, leaving no buffer. Recovery always takes longer than the optimistic estimate.
Build in a 25-30% buffer between your RTO target and your MAO. For a detailed walkthrough of BIA methodology, see our companion guide.
3. Identifying What Could Cause the Disruption: A Threat-Based Risk Assessment
Understanding which functions to protect is step one. The harder question is what threatens them and with what frequency.
The risk assessment tells you what could disrupt your critical functions. These two processes are complementary, not interchangeable, and should be conducted in sequence.

Figure 2: Top Disruption Threats to Business Continuity. Source: BCI Horizon Scan Report 2025.
The BCI Horizon Scan Report 2025 confirms that cyberattacks remain the top concern for the next 12 months, cited by 72% of organizations, followed by extreme weather (58%) and IT/telecom outages (54%). For BCP purposes, the standard US threat taxonomy covers four broad categories:
Natural Hazards
Hurricanes, earthquakes, tornadoes, winter storms, and flooding. NOAA recorded 27 separate billion-dollar climate disasters in 2024, the second-highest count on record.
For organizations in high-exposure geographies, physical disruption scenarios need to be stress-tested more rigorously and recovery strategies need to account for extended infrastructure failures beyond the traditional 72-hour window.

Figure 3: US Billion-Dollar Weather & Climate Disasters (2018-2024). Source: NOAA NCEI.
Technological and Cyber Threats
The FBI’s IC3 recorded $16.6 billion in cybercrime losses in 2024, up 33% from $12.5 billion in 2023. Ransomware complaints rose 9% year-over-year, with critical infrastructure organizations bearing the heaviest burden. System failures, telecommunications outages, data breaches, and third-party ICT failures round out this category.

Figure 4: FBI IC3 Cybercrime Losses & Complaints (2020-2024). Source: FBI IC3 Annual Reports.
Human and Operational Threats
Key person dependency, industrial action, supplier bankruptcy, and workplace incidents. Single-supplier dependency remains one of the most common and most overlooked continuity risks. For a structured approach to risk identification, see our risk assessment methodology guide.
Pandemic and Health Threats
COVID-19 demonstrated that a health crisis can simultaneously affect staff availability, supply chains, customer demand, facility access, and regulatory requirements.
Your BCP needs a dedicated pandemic scenario that is distinct from your standard emergency response procedures, covering remote work infrastructure, health screening protocols, succession planning, and operational risk management protocols.
4. Recovery Strategies: Translating BIA Targets Into Operational Decisions
Those threat scenarios create the context. The recovery strategy is the practical decision about how a specific critical function will be maintained or restored. Recovery strategies cost money, and the right strategy depends on the RTO from your BIA, the nature of the threat, and the cost relative to downtime impact.
Work Location Strategies
| Strategy | Activation Time | Cost Level | Best For RTO | Description |
| Hot Site | Minutes to hours | Highest | Under 4 hours | Fully equipped, immediately available backup facility with live data replication |
| Warm Site | Hours to 1 day | Mid-range | 4-24 hours | Partially equipped facility requiring some setup time |
| Cold Site | Days | Lowest | Over 48 hours | Shell facility with power and connectivity; no pre-installed equipment |
| Remote Work | Immediate | Variable | Variable | COVID-19 proved this is viable for knowledge worker functions if IT infrastructure supports it |
IT and Data Recovery Strategies
Your recovery strategies for technology-dependent functions must be technically achievable within your RPO and RTO targets.
This means your IT team needs to validate backup frequency, restore times, and failover procedures against BIA targets.
Cloud-based redundancy across multiple availability zones, database replication for transaction-intensive systems, and Disaster Recovery as a Service (DRaaS) are the primary options. For detailed IT recovery architecture, see our guide on IT disaster recovery plans. A backup that has never been successfully restored is not a backup.
Supply Chain and Vendor Continuity
Single-supplier dependency is one of the most common continuity risks in US organizations.
For critical suppliers, maintain approved alternate sources, review vendor BCPs annually, and include BCP requirements in procurement contracts.
The OCC’s 2023 Third-Party Risk Management guidance explicitly requires assessment of vendor BCPs. For a detailed framework, see our guide on third-party risk management.
5. The BCP Compliance Checklist: 35 Items Across Six Phases
Strategies become actionable through systematic tracking. Use this checklist as your working BCP compliance inventory.
It covers all phases from governance initiation through regulatory alignment. Assign a status and an owner for every item. The checklist is aligned to ISO 22301:2019 and maps to FFIEC, HIPAA, and FINRA requirements.

Figure 5: The BCP Preparedness Gap. Sources: BCI 2025; Inveni IT; FEMA.
Phase 1: Governance and Initiation (Items 1-5)
| Checklist Item | Priority | Owner | Status |
| 1. Obtain executive sponsorship and assign a BCP Program Owner | Critical | CEO / Board | [ ] |
| 2. Define BCP scope: locations, entities, and functions covered | Critical | BCP Owner / CRO | [ ] |
| 3. Form the BCMT with named members and deputies | Critical | BCP Owner | [ ] |
| 4. Establish a BCM Policy aligned to ISO 22301; document Board approval | High | CRO / Legal | [ ] |
| 5. Define risk appetite for downtime and data loss (link to ERM appetite statement) | High | CRO | [ ] |
Phase 2: Business Impact Analysis (Items 6-11)
| Checklist Item | Priority | Owner | Status |
| 6. Identify all business functions and services (internal and client-facing) | Critical | BCMT / Dept Heads | [ ] |
| 7. Determine MAO for each critical function | Critical | BCMT / BIA Lead | [ ] |
| 8. Set RTOs for each function (must be less than MAO) | Critical | BCMT / IT / Ops | [ ] |
| 9. Set RPOs for all data-dependent functions | Critical | IT / BCMT | [ ] |
| 10. Map dependencies: people, systems, third parties, facilities, data | High | BCMT / IT | [ ] |
| 11. Document financial, operational, legal, and reputational impact per scenario | High | BCMT / Finance | [ ] |
Phase 3: Risk Assessment (Items 12-15)
| Checklist Item | Priority | Owner | Status |
| 12. Conduct threat and hazard identification: natural disasters, cyberattacks, pandemics, supply chain failures | Critical | CRO / CISO | [ ] |
| 13. Assess likelihood and impact for each threat (5×5 risk matrix) | High | CRO / Risk Team | [ ] |
| 14. Populate the risk register with inherent risk, controls, and residual risk | High | CRO | [ ] |
| 15. Identify single points of failure in critical processes and supply chains | High | BCMT / IT / Ops | [ ] |
Phase 4: Recovery Strategies (Items 16-20)
| Checklist Item | Priority | Owner | Status |
| 16. Develop recovery strategies for each critical function from the BIA | Critical | BCMT / Dept Heads | [ ] |
| 17. Identify and document alternate work locations (remote, hot/warm/cold site) | High | Facilities / IT | [ ] |
| 18. Establish data backup procedures; verify restore capability against RPO targets | Critical | IT / CISO | [ ] |
| 19. Identify alternate suppliers for critical inputs; document contact details | High | Procurement / Ops | [ ] |
| 20. Define minimum staffing levels for critical functions during disruption | High | HR / Dept Heads | [ ] |
Phase 5: Plan Development (Items 21-25)
| Checklist Item | Priority | Owner | Status |
| 21. Document the BCP: purpose, scope, activation criteria, response procedures | Critical | BCP Owner | [ ] |
| 22. Develop Emergency Response Procedure (evacuation, first aid, contacts) | Critical | Facilities / HR | [ ] |
| 23. Create Crisis Communication Plan: internal escalation + external stakeholder templates | High | Comms / Legal | [ ] |
| 24. Document RACI for BCP activation: who declares, activates, reports externally | High | BCP Owner / CRO | [ ] |
| 25. Include pandemic-specific procedures: remote work, health authority reporting | High | HR / Legal | [ ] |
Phase 6: Implementation and Testing (Items 26-32)
| Checklist Item | Priority | Owner | Status |
| 26. Train all BCMT members on their roles; document attendance | High | BCP Owner / HR | [ ] |
| 27. Distribute BCP to all relevant personnel; ensure offline copies available | High | BCP Owner / IT | [ ] |
| 28. Review and update BCP annually and after any major change | High | BCP Owner / CRO | [ ] |
| 29. Conduct tabletop exercise at least annually | High | BCP Owner / Audit | [ ] |
| 30. Conduct at least one functional or simulation exercise annually | High | BCP Owner / BCMT | [ ] |
| 31. Test data backup and recovery annually; verify RTO/RPO targets achievable | Critical | IT / CISO | [ ] |
| 32. Document exercise findings, gaps, and corrective actions; track closure | High | BCP Owner / Audit | [ ] |
Phase 7: Regulatory and Compliance (Items 33-35)
| Checklist Item | Priority | Owner | Status |
| 33. Map BCP to applicable regulatory requirements: SEC, OCC, FFIEC, HIPAA, state-level | High | Compliance / Legal | [ ] |
| 34. Ensure BCP addresses third-party/vendor continuity per OCC guidance | High | Procurement / Risk | [ ] |
| 35. Align BCP to ISO 22301:2019; consider certification if required by clients or regulators | Medium | CRO / BCM Lead | [ ] |
The BIA phase (items 6-11) is the most commonly undercooked in practice. The testing phase (items 29-32) is the most commonly skipped.
And the regulatory alignment phase (items 33-35) is frequently forgotten by organizations outside heavily regulated industries that still have contractual BCP obligations. For risk register design, see our risk register template guide.
6. Structuring the BCP Document for Operational Use
The checklist tells you what to build. The document structure determines whether anyone can actually use it at 2 AM during an incident.
A BCP organized clearly and written for operational use will be picked up and followed. One that reads like a legal compliance document will sit in a drawer.
Recommended BCP Document Sections
| Section | Contents | Key Design Principle |
| 1. Purpose & Scope | What the plan covers, which locations and functions are included, objectives | Keep to one page. Decision-makers scan this first. |
| 2. Governance | BCMT roster with names, titles, contacts; Board approval record | Update names quarterly. Outdated contacts kill plans. |
| 3. Plan Activation | Criteria that trigger activation; authority to declare; notification chain | Use a decision tree, not a paragraph of text. |
| 4. Emergency Response | Evacuation, assembly points, first aid, emergency contacts | Laminate this section. It is needed when systems are down. |
| 5. BIA Summary | Critical functions, MAO/RTO/RPO targets, dependency maps | One-page summary here; full BIA as appendix. |
| 6. Recovery Procedures | Step-by-step per function: who, what, when, with what resources | Write for the backup person, not the expert. |
| 7. Crisis Communications | Internal escalation scripts, external templates, communications owner | Pre-draft messages. Wordsmithing during a crisis wastes hours. |
| 8. Vendor Contacts | Critical vendor contacts, their BCM contacts, alternate suppliers | Test these numbers quarterly. Vendors change contacts often. |
| 9. Return to Normal | Criteria for declaring incident resolved; steps to normalize; post-incident review | Define ‘normal’ before the incident. |
| 10. Maintenance Schedule | Annual review dates, test schedule, update triggers | Assign a named BCP Document Owner. |
Maintain a version-controlled ‘go bag’ containing a short laminated summary of critical contacts, activation criteria, and immediate actions that does not require system access.
For risk appetite thresholds that drive BCP activation decisions, see our risk appetite statement framework.
7. Testing and Exercising: Where Plans Prove Their Value or Expose Their Gaps
A well-structured document means nothing if no one has rehearsed it under pressure. A plan that has never been tested is a hypothesis about what your organization might do, not evidence of what it can do.
The FFIEC BCP booklet is direct on this point: testing is a supervisory expectation for banks, not optional best practice.

Figure 6: BCP Exercise Types – Cost vs. Realism vs. Disruption Risk. Source: ISO 22301:2019; BCI GPG 2023.
Exercise Types Comparison
| Exercise Type | Description | Duration | Frequency | Disruption | What It Tests |
| Tabletop | Discussion-based scenario walkthrough with BCMT | 2-4 hrs | Annual+ | Low | Plan logic, roles, decision-making |
| Functional Simulation | Simulated activation of specific BCP components | Half-full day | Annual | Medium | Specific recovery procedures and systems |
| Full-Scale | Complete BCP activation across all critical functions | 1-2 days | Every 2-3 yrs | High | Entire plan; cross-functional gaps |
| IT Failover Test | Live test of data backup restore and DR failover | 4-8 hrs | Bi-annual | Med-High | RTO and RPO targets achievable |
| Communication Drill | Emergency notification system and stakeholder chain test | 1-2 hrs | Bi-annual | Low | Contact lists, templates, escalation speed |
Most organizations should run at minimum one tabletop exercise and one IT recovery test annually.
After each exercise, produce three things: a written findings report, a corrective action register with owners and due dates, and a revised BCP incorporating lessons learned.
For exercise design aligned to ISO 22301 and the NIST Cybersecurity Framework testing requirements, see our BCM exercise programs guide.
Running a Tabletop Exercise That Actually Works
Present the BCMT with a disruption event (ransomware attack, hurricane, key system failure), then walk them through time-phased injects: what is happening now, what has developed two hours later, what has happened by end of day.
At each stage ask: who does what, who authorizes what, what resources do you need, and who do you notify? The goal is to surface assumptions, gaps, and coordination issues in a low-stakes environment.
8. US Regulatory Requirements: Your BCP Obligations by Sector
Testing reveals operational gaps, but regulatory non-compliance reveals legal exposure. In the US, BCP is not voluntary for most regulated industries.
If your organization operates across multiple sectors, you need to satisfy multiple frameworks simultaneously.
| Sector | Regulator | Key Standard | BCP Requirement Summary |
| Banking | OCC, Fed, FDIC | FFIEC BCM Booklet (2019); OCC Third-Party Guidance (2023) | BCP required; annual testing; documented recovery times; vendor BCP review |
| Insurance | NAIC, State Depts | NAIC Model Regulation; state-specific rules | BCPs required for licensed insurers; many states mandate annual certification |
| Healthcare | CMS, HHS | HIPAA Security Rule (45 CFR 164.308); CMS Emergency Preparedness | Documented contingency plan; data backup, DR, emergency mode operations |
| Public Companies | SEC | Regulation SCI; Disclosure Rules | BCP for critical systems; material disruptions require 8-K disclosure |
| Broker-Dealers | SEC, FINRA | SEC Rule 206(4)-7; FINRA Rule 4370 | Written BCP required; client access, communications, data backup |
| Federal Contractors | FEMA, DHS | NIST SP 800-34; COOP requirements | Continuity of Operations Plans required for critical infrastructure |
For financial institutions, the FFIEC Business Continuity Management Booklet covers the full BCM lifecycle including pandemic preparedness, third-party dependency management, and cyber resilience.
FINRA examiners routinely ask to see evidence that the plan has been tested. For HIPAA, the HHS specifies five required contingency plan components: data backup plan, disaster recovery plan, emergency mode operations plan, testing procedures, and applications/data criticality analysis.
For a comprehensive compliance view, see our compliance risk assessment guide and COSO ERM framework alignment.
9. Vendor and Third-Party Continuity: The Weakest Link You Are Probably Ignoring
Regulatory compliance addresses your internal obligations, but your BCP is only as strong as the weakest link in your supply chain.
Most BCPs document internal recovery procedures in detail but treat external dependencies as an afterthought. Many of the most disruptive incidents in US business history were triggered by a critical third party going down.
Your BCP needs to address: a current register of all critical ICT and operational vendors with BCM contacts; annual review of BCPs from your top 10 critical suppliers (not just a questionnaire); concentration risk assessment for single-vendor dependencies; contract provisions requiring vendors to maintain BCPs and notify you of incidents; and alternate supplier identification for all critical inputs. For KRIs specifically designed for third-party risk monitoring, see our companion guide.
10. Keeping Your BCP Current: The Maintenance Discipline That Separates Good Programs From Dead Documents
A BCP that is two years out of date is arguably worse than no BCP at all. It creates a false sense of preparedness while providing procedures that reference systems, people, and vendors that no longer exist.
Scheduled Maintenance
Annual full review: every section against the current state of the organization, all names, titles, contacts, and system references.
Annual BIA refresh: validate that RTO/RPO targets reflect current business requirements. Annual risk assessment update: add newly identified threats and reassess existing ones. Cyber threat landscapes, supply chain risks, and climate risks all evolve year to year.
Event-Triggered Updates
After a major organizational change (merger, acquisition, new office, significant headcount change, new IT platform). After a real activation: post-incident review and plan update within 30 days. After a test or exercise: findings incorporated within 60 days.
After a regulatory change: new rules or supervisory guidance. Assign a named BCP Document Owner who is accountable for scheduling and completing updates. Without a named owner, maintenance gets deferred indefinitely.
11. Where BCP Programs Stall and How to Unstick Them
Maintenance keeps the plan current, but certain structural mistakes can undermine even a well-maintained program. Here are seven failure patterns we see repeatedly across US organizations.
| Pitfall | Root Cause | Consequence | Remedy |
| Writing the BCP in isolation | Single author (Risk Manager) without department input | Recovery procedures fail the ‘could someone follow this’ test | Build through workshops with department heads, not solo authorship |
| Setting RTOs by assumption | No structured BIA process; ‘we will say 24 hours for everything’ | Under-engineers some functions, over-engineers others | Run BIA workshops; get department heads to commit to downtime tolerance |
| Confusing BCP with DRP | IT-centric view of continuity | Missing human, process, and vendor recovery dimensions | Maintain separate BCP (business) and DRP (IT); cross-reference them |
| Forgetting the communication plan | Focus on operational recovery at expense of stakeholder management | Employees, customers, regulators left uninformed; damage compounds | Pre-draft messages, approve spokespersons, test notification systems |
| Skipping pandemic scenarios | Pre-2020 single-site disruption focus | Plans fail when every site is affected simultaneously for months | Add dedicated pandemic section with remote work, health, succession planning |
| Never testing data restores | Robust backup processes but no restore validation | RPO targets are hypothetical; actual restore may exceed targets by 3-5x | Schedule annual full restore test; document actual time vs. RPO target |
| Treating BCP as compliance document | Written to satisfy auditor rather than guide operations | Long on policy language, short on operational detail; unusable in crisis | Write for the backup person at 2 AM, not the auditor at 10 AM |
12. Your First 90 Days: From Assessment to a Board-Approved Plan
Avoiding those pitfalls from day one is easier when you follow a phased approach. Building a BCP from scratch is manageable if sequenced properly.
The roadmap below produces an approved, tested BCP within 90 days.
| Phase | Timeline | Key Actions | Deliverables | Success Metrics |
| Foundation & Analysis | Days 1-30 | Assign BCP owner; form BCMT; conduct BIA workshops with department heads; complete risk assessment; populate risk register | BIA report; risk register; approved BCM policy | All critical functions identified; MAO/RTO/RPO set for each; risk register populated |
| Strategy & Plan Build | Days 31-60 | Develop recovery strategies for all critical functions; draft full BCP; review vendor BCPs for top 10 suppliers | Draft BCP document; vendor BCP review log; alternate work location agreements | Recovery strategy assigned to every Critical/High function; draft BCP peer-reviewed |
| Training, Testing & Approval | Days 61-90 | Conduct BCMT training; run first tabletop exercise; test IT backup and recovery; incorporate lessons; obtain Board approval | Approved BCP; exercise report; training records; IT recovery test results | Tabletop exercise completed; IT restore meets RPO; Board sign-off obtained |
Allow a minimum of 90 minutes per department for BIA workshops. Department heads frequently underestimate how dependent their function is on other parts of the business until you walk them through a dependency mapping exercise.
For ISO 22301 certification which adds a management system layer, see our implementation guide.
13. The Regulatory and Technology Horizon: What Is Changing in BCP
That 90-day foundation positions you to handle today’s threats, but the BCP landscape is shifting in three directions that demand forward planning.
AI-Dependent Functions and BCP Blind Spots
AI systems are creating BCP challenges that traditional frameworks did not anticipate. When an AI-driven process (automated underwriting, algorithmic trading, AI-powered customer service) fails or behaves unexpectedly, what is the manual fallback?
Who owns the recovery? How long can you operate without it? These questions need to be built into your BIA for any function that now relies on AI-driven decision-making.
The BCI Horizon Scan 2025 identifies AI as a top-five concern over the next decade, cited by 30.5% of organizations. See our guide on AI risk management KRIs for monitoring frameworks.
Climate Risk and Extended Physical Disruption
NOAA data shows that billion-dollar weather events in the US are increasing in frequency. The 27 events recorded in 2024, combined with the record 28 in 2023, represent a step-change from the 14-event average just five years earlier.
For organizations in high-exposure geographies, recovery strategies need to account for infrastructure failures lasting weeks rather than days. The impact tolerance assessment approach provides a structured methodology.
Operational Resilience Regulation
The regulatory direction in financial services is moving from standalone BCPs toward operational resilience as a systemic program. The EU’s Digital Operational Resilience Act (DORA), which took full effect in January 2025, mandates end-to-end ICT risk management, incident reporting, and threat-led penetration testing for financial entities. The UK’s PS21/3 set impact tolerances for important business services.
In the US, evolving OCC and Federal Reserve guidance pushes toward proving that critical services can actually be maintained within defined tolerances, not just that a plan exists. Our post on operational resilience frameworks covers this shift in detail.
Ready to Build or Upgrade Your Business Continuity Plan?
Start with the BIA. Everything else in your BCP flows from the BIA. If your current plan does not have a documented, department-head-validated BIA behind it, that is the first thing to fix.
Browse our full library of practitioner-ready BCM templates, BIA workbooks, risk register formats, and exercise programs at riskpublishing.com. Each tool is designed for working practitioners who need to produce credible, auditable outputs. For consulting support, contact our team.
Related Resources on RiskPublishing.com
Business Continuity Management (ISO 22301) Guide | Business Impact Analysis: Templates and Workshop Guide | IT Disaster Recovery Plan Guide | Operational Resilience vs Business Continuity | ISO 22301 Implementation Guide | Risk Assessment Methodology | Third-Party Risk Management | Operational Risk Management | Enterprise Risk Management Frameworks | Risk Appetite Statement Development | Compliance Risk Assessment | COSO ERM Framework Guide | AI and Machine Learning Risk KRIs | Key Risk Indicators: Complete Framework | KRI Dashboard Best Practices | Risk Register Template
References
1. International Organization for Standardization. (2019). ISO 22301:2019 Security and Resilience – Business Continuity Management Systems: Requirements. ISO.
2. National Institute of Standards and Technology. (2010). NIST SP 800-34 Rev 1: Contingency Planning Guide for Federal Information Systems. NIST.
3. Federal Financial Institutions Examination Council. (2019). Business Continuity Management IT Examination Handbook Booklet. FFIEC.
4. OCC, Federal Reserve, FDIC. (2023). Interagency Guidance on Third-Party Relationships: Risk Management (Bulletin 2023-17). OCC.
5. FINRA. Rule 4370: Business Continuity Plans and Emergency Contact Information. FINRA.
6. HHS Office for Civil Rights. (2012). HIPAA Security Rule Contingency Plan Guidance. HHS.
7. NIST. (2024). Cybersecurity Framework 2.0. National Institute of Standards and Technology.
8. FEMA. Ready Business: Business Continuity Planning Suite. FEMA.
9. Business Continuity Institute. (2025). BCI Horizon Scan Report 2025. BCI.
10. NOAA National Centers for Environmental Information. (2024). Billion-Dollar Weather and Climate Disasters Database. NOAA.
11. COSO. (2017). Enterprise Risk Management: Integrating with Strategy and Performance. COSO.
12. FBI Internet Crime Complaint Center. (2025). 2024 IC3 Annual Report. FBI IC3.
13. CISA. (2023). Cross-Sector Cybersecurity Performance Goals. CISA.
14. IBM Security. (2025). Cost of a Data Breach Report 2025. IBM.
15. European Commission. (2025). Digital Operational Resilience Act (DORA). EU.
16. BCI. (2025). BCI Continuity and Resilience Report 2025. BCI.

Chris Ekai is a Risk Management expert with over 10 years of experience in the field. He has a Master’s(MSc) degree in Risk Management from University of Portsmouth and is a CPA and Finance professional. He currently works as a Content Manager at Risk Publishing, writing about Enterprise Risk Management, Business Continuity Management and Project Management.
