Rethinking and Expanding: What New Technology Means for Business Continuity

Jul 9, 2015

Back to Veoci BlogRethinking and Expanding: What New Technology Means for Business Continuity

Business Continuity Management Planning (BCMP) is an essential discipline for organizations. From natural disasters, terrorist attacks, financial crises, all the way to more mundane incidents such as daily operational hiccups, regulatory compliance issues, policy execution, and public relations situations, business continuity is a key aspect of protecting lives, livelihoods, and assets. BCMP addresses the system and processes in an organization that provide resiliency, recovery and contingencies required to safeguard the people and assets of the organization in response to a disruptive event or incident.

Business continuity cycle.

BCMP’s Evolution Business Continuity Management Planning (BCMP) software first began to be developed around 25 years ago; planning was a good place to start and computers could begin to provide value with paper documents as the primary output and the ease of updating the documents was a major selling point. In the subsequent years, in addition to the “prose” of the BCMP, parts of the process began to be codified in database tables so that they could be sorted by the teams responsible and as a checklist or activities on a time line. With innovation in text messaging and digital telephony, emergency mass notification systems (EMNS) also came to be developed and many BCMPs took on the role of introducing EMNS to their organizations.

The challenge for software has been to keep up with the change. For example, for EMNS vendors who established proprietary networks at great cost, the advent of new providers such as Twilio and advances by the telecommunication giants, makes irrelevant what was previously a competitive edge. For many of the other software solutions for BCP and GRC (Governance, Risk & Compliance), the change from the client-server computing to the web and then to mobile devices required that they essentially discard the software they had written and make a fresh start. 

Rethinking BCMP 

With the new technology, there is also a rethinking of business continuity. The emphasis has shifted to systems that guide the organization through disruptive incidents and the expanded use of the systems for less than catastrophic disruptions. As the scene shifts to using technology to actually manage the effects of a disruption, the older tools look dated and there is an opportunity for new entrants who begin with a clean slate. These revolutionary changes in technology - mobile devices, cloud computing for scalability, access of services from best of breed through APIs -  also make it possible for a single tool to do it all.

GRC, BIA (Business Impact Analysis) and BCMP are increasingly taken for granted - it is expected that any organization will have these in place. The remaining issue is keeping these “documents” up to date and in sync with organizational and regulatory changes. The sea-change in what is now expected of BCMP systems is epitomized by the example of one typical element of an organization’s response to the arrival of a hurricane: Communicate to the Person X who is directed to the backup diesel generator to check the fuel level and if not full, add fuel and communicate back from their mobile device the completion of this task. The organization’s crisis response consists of, perhaps, hundreds of tasks that are coordinated in time and location. To make matters more complicated, the system must also be flexible to allow ad hoc changes in what needs to be done and it’s priority. It seems that the NEW requirements turn the old BCMP/GRC world around by 180 degrees. The focus is not the document - but the actions and the checklists and communication. Note that the “BCMP” part is automatically included and drives these “actions”. While companies today still put much of their time and effort into strategizing and plan making, the NEW software offers many more opportunities for the BCMP professionals:

  1. Realistic drills for a variety of scenarios with virtual (easier, increased) participation.
  2. Use of system for any incident that affects a “large” number of people and requires a team response.
  3. No longer is the system output documents that sit on a shelf - the output is the actual launch of a response with communications, task assignment and resource management.

The requirements for such software are also drastically different and have more to do with “project management at supersonic speed” than a business continuity plan that is placed prominently on a bookshelf or a shared drive in the local Data Center which could be unavailable.

Expanding Role of BCMP 

As the BCMP professionals bring in these modern tools, they are also increasing the scope of their role in the organization. While previously they were custodians of books and online documents, today they can play the active role of “incident commanders” in both drills and a real crisis. The easy usability and value of the new tools also expand applicability to minor incidents and events. In turn, with increased and more frequent usage, the BCMP professional and their organization are better prepared if a truly catastrophic disruption does occur.  

Subscribe to the Veoci Blog

Receive all the latest emergency, crisis, and continuity management news, tips, and advice

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

HKIA Annual Exercise: Hong Kong Express Excels with Veoci

Responding to major business disruptions are a company-wide effort. Every team gets involved during the response and recovery. But despite how great having help from every angle is, it can be disruptive and throw the cart of the rails quickly. How do you keep a steady course through these difficult crisis management challenges?

Continue reading
Social Engineering: Preventing Today’s Biggest Threat

Just after lunch one day, you receive this email: “Can you send me the password for our network? I just can’t seem to remember it right now. Thanks.” At first, this seems a bit weird to you. No one in your office asks for passwords over email. But you also remember that some of your colleagues from another office are visiting for the next couple of days, so now this seems somewhat plausible.

Continue reading
Unintended Disclosure: Are You Educating Your Weakest Link?

Human error and unintended disclosure cause the majority of data breaches. Educating your employees should be a top priority when it comes to cybersecurity.

Continue reading

Connect with us on Social Media

Join us on our journey to improve emergency, operations, and continuity management!

Veoci Facebook PageVeoci Twitter AccountVeoci Linkedin Company Page

Face crisis and continuity challenges with expert solutions designed for you and your teams.

Learn how Veoci puts you in control