Category
AlertMedia
Six people are gathered in a conference room, with one woman standing in front of a white board, talking and pointing toward the board
Emergency Management May 15, 2026

Business Continuity Risk Assessment: The Bridge Between Risk and Recovery

Business disruptions are a matter of when, not if.

A business continuity risk assessment helps you find your weak spots before a crisis hits, so you can minimize downtime when it does.

If a ransomware attack locked down your payment processing tomorrow, would your plan tell you exactly what to do, in what order, and who’s responsible for each step? Or would your team be improvising against a document from two years ago—before you migrated to the cloud and brought on three new third-party vendors? (It depends on whether you’ve tested your response with ransomware tabletop exercises, right?)

“You might have most of your systems that can recover in 15 minutes, but you might have a third party that needs 4 to 6 hours to recover. And you’re really only as strong as your weakest link.”
Theresa Reynolds, Capital One
Theresa Reynolds Senior Director of Operational Risk Management, Capital One

Most organizations have a business continuity plan (BCP). Far fewer have one that reflects what their business actually looks like today. Risk conditions evolve constantly—new vendors, cloud migrations, workforce changes, and emerging threats can all introduce vulnerabilities faster than most continuity plans are updated. That gap between documented plans and operational reality is where continuity strategies often break down.

And this is where a business continuity risk assessment (BCRA) comes in. This guide walks you through how to conduct a BC risk assessment and use it to build a plan that holds up under pressure.

What Is a Business Continuity Risk Assessment?

A business continuity risk assessment is the process of identifying, analyzing, and prioritizing threats that could disrupt critical business operations based on their likelihood and impact. Its purpose is to identify weak points, prioritize the threats that matter most, and develop safeguards or recovery plans to keep the business running during disruption.

This process is often referred to as a business continuity plan risk assessment (or BCP risk assessment) when used specifically to inform a BCP.

Within the broader business continuity management (BCM) program, a BCRA is the practical step that asks: What could stop the business from running, and what would we do about it? Unlike a generic enterprise risk assessment, it focuses on operational continuity—not financial or strategic risk in the abstract.

For example, if your customer service platform goes down for half a day, a business continuity risk assessment would focus on call handling, order processing, and recovery steps. A broader enterprise risk assessment might instead examine the financial, reputational, or strategic impact of the outage.

For Theresa Reynolds, the Senior Director of Operational Risk Management at Capital One, a BCRA is about “ensuring you deliver on the promise that you’ve made to your customer,” which is anchored in operational resilience.

Business Impact Analysis vs. BC Risk Assessment

A BCRA answers the questions: What could disrupt your operations, and how likely is it?

Meanwhile, a business impact analysis (BIA) answers: If something does go wrong, how fast do you need to recover, and at what cost?

The two are distinct but work in sequence, and understanding how a business impact analysis works helps clarify where each one fits in your BCM program.

 

Business continuity risk assessment

Business impact analysis

PurposeIdentify potential risks to normal operations and rank them by severityAssess the potential impact of those threats and the time and cost needed to recover
Core questionWhat could disrupt our business functions, and how likely is it?If a disruption occurs, how will it impact the business, and how quickly do we need to recover?
Key outputA prioritized list of threats with likelihood and severity scoresSpecific benchmarks such as recovery time objectives (RTOs), recovery point objectives (RPOs), and impact estimates
Timing within the BCM cycleFirst step, before the BIA or recovery planningAfter a BCRA, but before recovery planning
Who owns itRisk management teamProject leaders and business process owners

Together, these processes lay the groundwork for a business continuity plan. The BCRA determines which threats warrant BIA-level analysis; the BIA then produces the recovery time objectives (RTOs) and recovery point objectives (RPOs) that drive your recovery strategy.

In short, the BCRA helps you identify the potential threats you’re up against, while the BIA determines your tolerance for disruption. And everything in your BCM program, from recovery strategies to investments in operational resilience, is built on knowing both. Without a current risk assessment, recovery benchmarks like RTOs and RPOs are often based on outdated operational assumptions rather than real-world disruption risk.

How to Conduct a Business Continuity Risk Assessment: A 5-Step Framework

Here’s a step-by-step methodology for conducting a BCRA.

1. Identify your critical business functions

Every business has critical operations that keep things running. To identify yours, start by asking: Which processes, if interrupted, would cause the most damage to our customers, employees, revenue, reputation, or regulatory posture?

A global e-commerce enterprise, for example, might pinpoint three top functions:

  • Website uptime: If your store doesn’t load, customers don’t buy
  • Payment processing: Gateway failures kill transactions and erode trust fast
  • Order fulfillment: Delays ripple into returns, refunds, and churn

From there, the list might continue with inventory management, customer service, and fraud detection. Rank each by severity of impact, assign a documented owner, and outline recovery procedures for each.

Getting this list right requires more than a leadership meeting. Interview function owners directly—your IT lead knows what a system outage actually costs; your inventory manager knows what a supply chain bottleneck does to margins. Their input is what turns a general list into an accurate one. In more mature business continuity programs, leaders regularly revisit these critical function inventories—not just during annual planning cycles—to reflect operational changes, evolving dependencies, and shifting operational priorities.

2. Map threats across categories

Risk identification (across all categories) is key to understanding the potential threats your organization is vulnerable to and how each could disrupt your business. The most common risks include:

  • Natural disasters
  • Pandemics and public health events
  • Power outages and utility disruptions
  • Supply chain disruptions and third-party provider failures
  • Cyberattacks and ransomware
  • Insider threats and workplace violence
  • Political and civil disruption

3. Analyze dependencies

Each critical business function depends on a web of people, technology, facilities, data, and third-party providers. For each one you’ve identified, map those dependencies—and then go one level deeper.

That second step is where most organizations get caught off guard. Take payment processing: It relies on card networks, stable API connections, and both merchant and customer banks. But card networks themselves depend on POS terminals, online checkout gateways, and network connectivity. Pull on any one of those threads and the whole thing unravels. That’s the domino effect in action, and it’s why secondary and tertiary dependencies are where recovery plans most often fall short.

As Reynolds puts it on The Employee Safety Podcast: “People don’t always realize that their dependencies have dependencies that rely on the cloud.” Mapping dependencies end-to-end is the only way to see the full picture.

Get Your Free Operational Risk Assessment Template Here

4. Score likelihood and impact

For each threat you’ve identified, score it on two dimensions:

  • Likelihood: How probable is it?
  • Impact: How bad would it be?

Use a 1–5 scale for each, with 5 being the highest. Multiply the two scores to get a priority score, then plot those scores on a heat map to see at a glance where your biggest exposures are. For example, a ransomware attack on a core system might score a 4 for likelihood and a 5 for impact, making it a top-priority risk.

That heat map is your business continuity risk assessment matrix—and it’s what drives prioritization across the rest of your BCP. We’ll walk through how to build it in detail in the next section.

5. Prioritize, assign owners, and document

Use your risk matrix scores to sort identified risks into three tiers:

  • High-priority risks: Threats in this category require dedicated mitigation plans and recovery strategies
  • Medium-priority risks: These threats get monitoring protocols and contingency triggers
  • Low-priority risks: Risks in the lowest tier are typically acknowledged, but not actively resourced

At enterprise scale, this prioritization directly informs funding, staffing, and executive-level risk decisions.

Capture all of your risk scoring in a risk register. This is a living document (not a one-and-done spreadsheet) you should update as your risk landscape changes. The risk register becomes the reference point for every recovery and response decision that follows. In enterprise environments, these prioritization decisions often influence budget allocation, staffing, recovery investments, vendor strategy, and executive-level resilience planning.

How to Build Your Business Continuity Risk Assessment Matrix

Once risks are scored, your business continuity risk assessment matrix becomes the decision-making tool that drives continuity prioritization across the organization.

To determine likelihood, use a 1–5 rating, where:

1 = Very rare (once every 10+ years)

5 = Very likely (multiple times per year)

Apply this scale to each identified risk. Next, define the impact category for each identified threat. Where will the impact be most felt? For example:

  • Financial
  • Operational
  • Workforce Safety
  • Physical
  • IT/Cybersecurity
  • Legal/Regulatory
  • Reputational

Finally, plot a heat map that visualizes priority zones: red for high, yellow for medium, green for low.

The real value of this exercise isn’t the risk matrix itself. It’s what it surfaces. The goal isn’t just to visualize risk—it’s to expose where your recovery assumptions, dependencies, or resilience capabilities may break down under pressure.

“When you map your essential services,” says Reynolds, “you look at the resilience along the entire value chain. When you do this, it becomes easier to see where you have systems that are set to recover quickly and where, maybe, you have a weaker link. So, for example, you might have most of your systems or applications that can recover in 15 minutes, but you might have a third party that needs 4 to 6 hours to recover. And you’re really only as strong as your weakest link.

Integrating the Risk Assessment Into Your BCP

This is where most organizations fall short. A business continuity risk assessment is valuable only if it actively shapes your business continuity plan. Without that connection, even well-documented risks don’t translate into effective response plans, operational decision-making, and recovery strategies.

Here’s how each section of your business continuity program is shaped by the operational risk assessment.

Recovery strategies and RTO mapping

Recovery time objective (RTO) is the maximum acceptable time your operations can be down before you suffer irreparable losses. Think of it as your tolerance for disruption, measured in time.

Your business continuity plan risk assessment scores drive how you assign RTOs. High-priority risks get the tightest RTOs and the most-resourced recovery strategies. Low-priority risks may be categorized as “accept and monitor”—addressed if they escalate, but not an immediate focus. Without a current risk assessment, those calls are just guesswork.

Response plans and disaster recovery

Each high-priority risk needs its own documented, tested response plan—not a generic template, but a scenario-specific playbook. For example, a power outage response plan looks different from a supply chain disruption response, which in turn differs from a cyberattack response.

Your disaster recovery plan fits here too, covering how you restore critical technology and data when systems go down.

Mitigation strategies and controls

Business-Continuity-Plan-Template-1920x1005
Business Continuity Plan Template
Create a customized, crisis-ready framework to keep your organization running through any disruption.
GET THE TEMPLATE

Mitigation strategies fall into two categories:

  • Preventative controls, which reduce the likelihood of a risk materializing
  • Reactive controls, which minimize damage and speed up recovery when one does

At CapitalOne, Reynolds builds operational resilience through initiatives such as onboarding alternative suppliers, implementing manual workarounds when tech fails, and securing backup facilities. “All of those strategies are designed to keep your services resilient in the face of disruption,” says Reynolds.

Not every risk needs the same response. Use your risk mitigation strategies to map the right control type to each identified threat.

Resource allocation and ownership

Staffing, budget, and tooling should be proportional to risk priority—the higher the risk, the more resources you put behind it. That applies to ownership too: every identified risk needs a clearly assigned owner, not a one-off assignment made in the middle of a crisis.

This is where the documented function owners from your BCRA pay off. A well-structured framework gives leadership something to rally around—especially when it’s time to make hard resource trade-off decisions.

For Reynolds, aligning leadership around priorities is key. “It creates shared clarity… a common definition, a common understanding of what is most important. Everyone can march in the same direction.”

Crisis communication and activation triggers

Even the best BCP fails if you can’t reach your people when it’s time to execute. That means defining clear activation triggers—the specific signals that tell your team to act—and a crisis communication plan that spells out who gets notified, when, and how.

The communication cascade matters here: first responders need to know first, followed by your crisis team, then affected employees, and then broader stakeholders. Threat intelligence platforms that send real-time alerts keep that cascade moving fast and ensure no one is operating on outdated information.

Reynolds saw this play out directly amid disruptions at Capital One: “Our crisis team was activating constantly, and the framework really helped us understand where we had single points of failure. It shone a light on our most critical services amid all of that chaos.”

Common Pitfalls in a Business Continuity Risk Assessment

Most issues surrounding BCRAs stem from a single root cause: treating risk assessment as a static exercise rather than an evolving operational process.

  • Confirmation bias in likelihood scoring: Teams often tend to under-score risks they’ve never experienced. Anchor your scoring in data, not institutional memory.
  • Treating the BCRA as one-and-done: The risk landscape shifts constantly. Update your assessment regularly, and always after a real activation or a significant operational change.
  • Leaving the assessment disconnected from the actual plan: This is the most common failure mode. Your BCRA, BIA, and BCP only work when they inform each other. Assessing risk and then filing it away defeats the purpose.
  • Overlooking interdependencies: Your critical business functions rarely operate in a silo. Map out primary, secondary, and tertiary dependencies to make sure you aren’t overlooking any potential points of failure.

Reynolds learned this last point the hard way when it came to people’s dependencies: “We were relying too much on a few people, and we really needed to build up our bench strength. While it may have seemed efficient at the time, we had created a single point of failure.”

It’s a reminder that single points of failure don’t just live in your technology stack—they also show up in your org chart.

Learn more about Business Continuity Solutions

Empower your team to act quickly and maintain business operations seamlessly during a crisis.

Tips for Keeping Your Risk Assessment Alive

Because operational environments and threat conditions change constantly, even a well-built assessment will degrade over time if it isn’t actively maintained and tested. To keep it current and actionable, run tabletop exercises for your high-priority risks at least once a year. For complex disruptions that cut across multiple functions, go further and walk through scenario-based simulations that stress-test your end-to-end contingency planning. And always refresh your assessment after a real activation. That’s when you’ll find the gaps your planning didn’t anticipate.

In highly regulated industries, ISO 31000:2018 provides a risk management framework, while ISO 22301:2019 establishes the standard for business continuity management systems. Both are worth referencing as you build and maintain your program.

Reynolds describes these ongoing checks as a “net of protection”—controls and evaluations built into the process to ensure each element is designed appropriately for the risk it’s supposed to manage. But documentation alone isn’t the finish line. “People want to sort of celebrate once you get all of that documentation complete, but we don’t really know for sure that our plans work,” says Reynolds. “We’re really not done until we can test them and demonstrate that our plans are actionable and that they’re effective.”

Watch this step-by-step video to learn how to create and optimize a BC plan that ensures your operations continue running smoothly—no matter what.

Business Continuity Planning video

Where Risk Assessment Meets Readiness

A business continuity plan is only as strong as the risk assessment behind it, and that assessment is valuable only if it reflects your current reality. Without one that’s current, prioritized, and wired into every part of your BCP, you’re not managing risk—you’re just hoping the disruption that hits you is one you planned for. A BCRA closes that gap.

Organizations that treat risk assessments as living operational tools—not static compliance documents—are far better positioned to adapt, recover, and maintain resilience during disruption.

AlertMedia Author Bio Logo

Operational Risk Assessment Template

Please complete the form below to receive this resource.

Like What You're Reading?
Subscribe to Our Newsletter
Subscribe to The Signal by AlertMedia to get updated when we publish new content and receive actionable insights on what’s working right now in emergency preparedness.

Cookies are required to play this video.

Click the blue shield icon on the bottom left of your screen to edit your cookie preferences.

Cookie Notice