Business disruptions are a matter of when, not if.
A business continuity risk assessment helps you find your weak spots before a crisis hits, so you can minimize downtime when it does.

Business disruptions are a matter of when, not if.
A business continuity risk assessment helps you find your weak spots before a crisis hits, so you can minimize downtime when it does.

If a ransomware attack locked down your payment processing tomorrow, would your plan tell you exactly what to do, in what order, and who’s responsible for each step? Or would your team be improvising against a document from two years ago—before you migrated to the cloud and brought on three new third-party vendors? (It depends on whether you’ve tested your response with ransomware tabletop exercises, right?)
“You might have most of your systems that can recover in 15 minutes, but you might have a third party that needs 4 to 6 hours to recover. And you’re really only as strong as your weakest link.”Theresa Reynolds Senior Director of Operational Risk Management, Capital One
Most organizations have a business continuity plan (BCP). Far fewer have one that reflects what their business actually looks like today. Risk conditions evolve constantly—new vendors, cloud migrations, workforce changes, and emerging threats can all introduce vulnerabilities faster than most continuity plans are updated. That gap between documented plans and operational reality is where continuity strategies often break down.
And this is where a business continuity risk assessment (BCRA) comes in. This guide walks you through how to conduct a BC risk assessment and use it to build a plan that holds up under pressure.
A business continuity risk assessment is the process of identifying, analyzing, and prioritizing threats that could disrupt critical business operations based on their likelihood and impact. Its purpose is to identify weak points, prioritize the threats that matter most, and develop safeguards or recovery plans to keep the business running during disruption.
This process is often referred to as a business continuity plan risk assessment (or BCP risk assessment) when used specifically to inform a BCP.
Within the broader business continuity management (BCM) program, a BCRA is the practical step that asks: What could stop the business from running, and what would we do about it? Unlike a generic enterprise risk assessment, it focuses on operational continuity—not financial or strategic risk in the abstract.
For example, if your customer service platform goes down for half a day, a business continuity risk assessment would focus on call handling, order processing, and recovery steps. A broader enterprise risk assessment might instead examine the financial, reputational, or strategic impact of the outage.
For Theresa Reynolds, the Senior Director of Operational Risk Management at Capital One, a BCRA is about “ensuring you deliver on the promise that you’ve made to your customer,” which is anchored in operational resilience.
A BCRA answers the questions: What could disrupt your operations, and how likely is it?
Meanwhile, a business impact analysis (BIA) answers: If something does go wrong, how fast do you need to recover, and at what cost?
The two are distinct but work in sequence, and understanding how a business impact analysis works helps clarify where each one fits in your BCM program.
Together, these processes lay the groundwork for a business continuity plan. The BCRA determines which threats warrant BIA-level analysis; the BIA then produces the recovery time objectives (RTOs) and recovery point objectives (RPOs) that drive your recovery strategy.
In short, the BCRA helps you identify the potential threats you’re up against, while the BIA determines your tolerance for disruption. And everything in your BCM program, from recovery strategies to investments in operational resilience, is built on knowing both. Without a current risk assessment, recovery benchmarks like RTOs and RPOs are often based on outdated operational assumptions rather than real-world disruption risk.
Here’s a step-by-step methodology for conducting a BCRA.
Every business has critical operations that keep things running. To identify yours, start by asking: Which processes, if interrupted, would cause the most damage to our customers, employees, revenue, reputation, or regulatory posture?
A global e-commerce enterprise, for example, might pinpoint three top functions:
From there, the list might continue with inventory management, customer service, and fraud detection. Rank each by severity of impact, assign a documented owner, and outline recovery procedures for each.
Getting this list right requires more than a leadership meeting. Interview function owners directly—your IT lead knows what a system outage actually costs; your inventory manager knows what a supply chain bottleneck does to margins. Their input is what turns a general list into an accurate one. In more mature business continuity programs, leaders regularly revisit these critical function inventories—not just during annual planning cycles—to reflect operational changes, evolving dependencies, and shifting operational priorities.
Risk identification (across all categories) is key to understanding the potential threats your organization is vulnerable to and how each could disrupt your business. The most common risks include:
Each critical business function depends on a web of people, technology, facilities, data, and third-party providers. For each one you’ve identified, map those dependencies—and then go one level deeper.
That second step is where most organizations get caught off guard. Take payment processing: It relies on card networks, stable API connections, and both merchant and customer banks. But card networks themselves depend on POS terminals, online checkout gateways, and network connectivity. Pull on any one of those threads and the whole thing unravels. That’s the domino effect in action, and it’s why secondary and tertiary dependencies are where recovery plans most often fall short.
As Reynolds puts it on The Employee Safety Podcast: “People don’t always realize that their dependencies have dependencies that rely on the cloud.” Mapping dependencies end-to-end is the only way to see the full picture.
For each threat you’ve identified, score it on two dimensions:
Use a 1–5 scale for each, with 5 being the highest. Multiply the two scores to get a priority score, then plot those scores on a heat map to see at a glance where your biggest exposures are. For example, a ransomware attack on a core system might score a 4 for likelihood and a 5 for impact, making it a top-priority risk.
That heat map is your business continuity risk assessment matrix—and it’s what drives prioritization across the rest of your BCP. We’ll walk through how to build it in detail in the next section.
Use your risk matrix scores to sort identified risks into three tiers:
At enterprise scale, this prioritization directly informs funding, staffing, and executive-level risk decisions.
Capture all of your risk scoring in a risk register. This is a living document (not a one-and-done spreadsheet) you should update as your risk landscape changes. The risk register becomes the reference point for every recovery and response decision that follows. In enterprise environments, these prioritization decisions often influence budget allocation, staffing, recovery investments, vendor strategy, and executive-level resilience planning.
Once risks are scored, your business continuity risk assessment matrix becomes the decision-making tool that drives continuity prioritization across the organization.
To determine likelihood, use a 1–5 rating, where:
1 = Very rare (once every 10+ years)
5 = Very likely (multiple times per year)
Apply this scale to each identified risk. Next, define the impact category for each identified threat. Where will the impact be most felt? For example:
Finally, plot a heat map that visualizes priority zones: red for high, yellow for medium, green for low.
The real value of this exercise isn’t the risk matrix itself. It’s what it surfaces. The goal isn’t just to visualize risk—it’s to expose where your recovery assumptions, dependencies, or resilience capabilities may break down under pressure.
“When you map your essential services,” says Reynolds, “you look at the resilience along the entire value chain. When you do this, it becomes easier to see where you have systems that are set to recover quickly and where, maybe, you have a weaker link. So, for example, you might have most of your systems or applications that can recover in 15 minutes, but you might have a third party that needs 4 to 6 hours to recover. And you’re really only as strong as your weakest link.”
This is where most organizations fall short. A business continuity risk assessment is valuable only if it actively shapes your business continuity plan. Without that connection, even well-documented risks don’t translate into effective response plans, operational decision-making, and recovery strategies.
Here’s how each section of your business continuity program is shaped by the operational risk assessment.
Recovery time objective (RTO) is the maximum acceptable time your operations can be down before you suffer irreparable losses. Think of it as your tolerance for disruption, measured in time.
Your business continuity plan risk assessment scores drive how you assign RTOs. High-priority risks get the tightest RTOs and the most-resourced recovery strategies. Low-priority risks may be categorized as “accept and monitor”—addressed if they escalate, but not an immediate focus. Without a current risk assessment, those calls are just guesswork.
Each high-priority risk needs its own documented, tested response plan—not a generic template, but a scenario-specific playbook. For example, a power outage response plan looks different from a supply chain disruption response, which in turn differs from a cyberattack response.
Your disaster recovery plan fits here too, covering how you restore critical technology and data when systems go down.

Mitigation strategies fall into two categories:
At CapitalOne, Reynolds builds operational resilience through initiatives such as onboarding alternative suppliers, implementing manual workarounds when tech fails, and securing backup facilities. “All of those strategies are designed to keep your services resilient in the face of disruption,” says Reynolds.
Not every risk needs the same response. Use your risk mitigation strategies to map the right control type to each identified threat.
Staffing, budget, and tooling should be proportional to risk priority—the higher the risk, the more resources you put behind it. That applies to ownership too: every identified risk needs a clearly assigned owner, not a one-off assignment made in the middle of a crisis.
This is where the documented function owners from your BCRA pay off. A well-structured framework gives leadership something to rally around—especially when it’s time to make hard resource trade-off decisions.
For Reynolds, aligning leadership around priorities is key. “It creates shared clarity… a common definition, a common understanding of what is most important. Everyone can march in the same direction.”
Even the best BCP fails if you can’t reach your people when it’s time to execute. That means defining clear activation triggers—the specific signals that tell your team to act—and a crisis communication plan that spells out who gets notified, when, and how.
The communication cascade matters here: first responders need to know first, followed by your crisis team, then affected employees, and then broader stakeholders. Threat intelligence platforms that send real-time alerts keep that cascade moving fast and ensure no one is operating on outdated information.
Reynolds saw this play out directly amid disruptions at Capital One: “Our crisis team was activating constantly, and the framework really helped us understand where we had single points of failure. It shone a light on our most critical services amid all of that chaos.”
Most issues surrounding BCRAs stem from a single root cause: treating risk assessment as a static exercise rather than an evolving operational process.
Reynolds learned this last point the hard way when it came to people’s dependencies: “We were relying too much on a few people, and we really needed to build up our bench strength. While it may have seemed efficient at the time, we had created a single point of failure.”
It’s a reminder that single points of failure don’t just live in your technology stack—they also show up in your org chart.
Empower your team to act quickly and maintain business operations seamlessly during a crisis.
Because operational environments and threat conditions change constantly, even a well-built assessment will degrade over time if it isn’t actively maintained and tested. To keep it current and actionable, run tabletop exercises for your high-priority risks at least once a year. For complex disruptions that cut across multiple functions, go further and walk through scenario-based simulations that stress-test your end-to-end contingency planning. And always refresh your assessment after a real activation. That’s when you’ll find the gaps your planning didn’t anticipate.
In highly regulated industries, ISO 31000:2018 provides a risk management framework, while ISO 22301:2019 establishes the standard for business continuity management systems. Both are worth referencing as you build and maintain your program.
Reynolds describes these ongoing checks as a “net of protection”—controls and evaluations built into the process to ensure each element is designed appropriately for the risk it’s supposed to manage. But documentation alone isn’t the finish line. “People want to sort of celebrate once you get all of that documentation complete, but we don’t really know for sure that our plans work,” says Reynolds. “We’re really not done until we can test them and demonstrate that our plans are actionable and that they’re effective.”
Watch this step-by-step video to learn how to create and optimize a BC plan that ensures your operations continue running smoothly—no matter what.
A business continuity plan is only as strong as the risk assessment behind it, and that assessment is valuable only if it reflects your current reality. Without one that’s current, prioritized, and wired into every part of your BCP, you’re not managing risk—you’re just hoping the disruption that hits you is one you planned for. A BCRA closes that gap.
Organizations that treat risk assessments as living operational tools—not static compliance documents—are far better positioned to adapt, recover, and maintain resilience during disruption.
Please complete the form below to receive this resource.