These are not edge cases but they are the normal operating conditions of a business continuity programme in any real organization and where consultancies that do not tell you about them in advance are the reason the industry has such a poor track record, we describe them here because a client who is prepared for them can respond to them correctly, a client who encounters them as surprises typically responds by pausing the programme, deferring decisions or losing confidence in the process all of which make the outcome worse.
Stage 1 — Dependency Mapping
The infrastructure is more complex and less documented than anyone believes
In every engagement, the actual dependency architecture discovered during investigation differs significantly from what IT leadership believed it to be. Shadow IT systems are operationally critical and not in any asset register. Cloud services are in use by departments with no IT governance involvement. Suppliers have sub processors who carry dependencies not visible in the primary contract. Shared network circuits are assumed to be independent. The investigation always takes longer than planned because organizations consistently underestimate their own complexity.
What this means for your programmeThe dependency map takes longer to complete than the initial estimate. Every discovery of an undocumented system or dependency adds scope to subsequent stages. Systems you did not know existed will need RTOs, runbooks and recovery procedures. This is not a failure of the programme but it is the programme functioning correctly by revealing what was previously hidden. But it has cost and timeline implications.
Our protocol when this occursWe document every discovery immediately. We assess whether it materially affects the programme scope. If it does, we present you with a written scope adjustment and cost impact before proceeding. You approve or descope. Nothing proceeds without your written agreement on any scope change that affects cost or timeline.
Stage 1 to 2 — Stakeholder Access
The people who hold critical knowledge are the hardest to access
Process owners are busy. IT staff are managing live systems and incidents. Senior managers defer scheduling. The individuals whose knowledge is most essential to the dependency map and the BIA are typically the least available for interviews. This is the single most common cause of programme delays. A dependency investigation that should take 2 weeks takes 5 because interviews are repeatedly rescheduled. A BIA that requires 10 process owner interviews takes 4 weeks because 4 of the 10 people cannot be made available within the window.
What this means for your programmeTimeline extensions caused by stakeholder unavailability are not covered by the fixed price. They extend the programme duration but do not change the total fee, provided the delay does not require us to re execute completed stages. If delays are extended enough to require re mapping of changed infrastructure, that constitutes a scope change.
Our protocol when this occursEach programme stage has a defined stakeholder availability requirement agreed before that stage begins. If availability cannot be confirmed within 5 business days of a stage start, we invoke the delay protocol where programme is formally paused, written notice is issued, timeline is adjusted. We do not proceed with incomplete information and produce a plan that will fail because it was built on gaps.
Stage 2 — Business Impact Analysis
The financial impact of downtime is almost always higher than leadership expects and they resist the findings
The BIA consistently produces impact figures that are uncomfortable. When the model shows that 4 hours of ERP downtime costs £380,000 in direct loss plus regulatory exposure, the instinct is to challenge the methodology rather than accept the finding and act on it. When the model shows that 20 of 25 processes have RTOs under 4 hours, the instinct is to adjust the RTOs upward to make the recovery architecture cheaper, not to fund the architecture that the genuine RTOs require. This pressure produces plans that are costed to what the organisation wants to spend, not what genuine resilience requires. We have seen this dynamic in every sector.
What this means for your programmeIf the BIA findings are overridden by commercial pressure to reduce RTOs or narrow scope, the resulting plan will be designed to a standard lower than the organization’s actual risk requires. We will document this explicitly. The gap between the genuine RTOs and the commercially adjusted RTOs will appear in the programme record. If an incident subsequently exposes that gap, the documentation will show that the organization was informed of it and chose to accept it.
Our protocol when this occursWe present BIA findings as they are calculated. We do not adjust findings to fit preferred budget conclusions. If the organization wishes to proceed with a narrower scope or adjusted RTOs, we document the decision, the original findings and the residual risk in writing. This is signed by the authorizing manager. We then execute the programme against the approved scope. We will not execute a programme whose scope we believe is structurally inadequate without this documented acknowledgement.
Stage 3 — Recovery Architecture
The architecture that meets the RTOs costs significantly more than the organisation budgeted
Recovery architecture costs are not the programme fee but they are the infrastructure investment required to implement the recovery capability. Synchronous mirroring for a Tier 0 system costs money to implement. Cloud DR infrastructure for Tier 1 systems costs money to provision and maintain. These are implementation costs outside our programme fee, to be procured and deployed by your team or an infrastructure partner. In our experience, organisations that have not modelled these costs in advance experience significant budget shock when they see the architecture design. In some cases, the implementation costs are multiple times the programme fee itself.
What this means for your programmeWe provide the architecture design and specification. We do not procure or implement infrastructure. The cost of implementation is entirely separate from and additional to the programme fee. We will provide cost estimates for the infrastructure components in the architecture design but these are estimates and actual procurement costs depend on your vendor negotiations, existing contracts and market conditions at the time of procurement.
Our protocol when this occursStage 3 includes a cost benefit analysis that presents the implementation cost estimate alongside the avoided cost calculation from the BIA. This gives the board a genuine decision framework. If the implementation cost exceeds what can be approved, we redesign the architecture to fit the available budget but we document explicitly which RTOs cannot be met at that budget level and what the residual risk is. The board signs off on the budget constrained architecture with full knowledge of the gap.
Stage 4 — Documentation
Review cycles expand. Sign off is harder to obtain than expected. Documents get revised into ambiguity.
Documentation review cycles are consistently underestimated. A runbook reviewed by 4 people produces 4 sets of conflicting comments, some of which contradict each other and some of which reflect preferences rather than accuracy. Legal and compliance teams request changes that trade operational clarity for legal precision and making the document safer to sign but harder to execute under pressure. Senior managers request modifications that soften language around their team’s obligations. IT staff flag procedures that require system access they don’t currently have. Every comment is a potential delay, and not every comment should be accepted.
What this means for your programmeThe programme includes 2 rounds of revisions per document. If review cycles produce fundamental challenges to the analytical basis of a document and not editorial preferences but substantive disputes about what the recovery procedure should be which this may require re execution of the relevant analysis stage at additional cost. Unlimited revision rounds are not included and will be priced at our day rate if requested.
Our protocol when this occursWe distinguish between two categories of comment where factual corrections (incorporated without discussion) and preference modifications (discussed and either incorporated or declined with reasoning). We will decline changes that we believe compromise the operational effectiveness of a document but we will explain why in writing. If the client insists on changes we believe are harmful, we implement them and document our objection. We will not produce a document we believe will fail in use without a written record of having said so.
Stage 5 — Testing
Recovery tests fail. Repeatedly. This is not a sign that the programme has failed.
The first technical recovery test almost never achieves its RTO target. Backups are incomplete. Application configurations differ between primary and recovery environments. Dependencies that were not in the architecture specification exist in the production environment and are missing from the recovery environment. DNS propagation takes longer than the RTO allows. The recovery team encounters an error state that the runbook does not cover. Every failure reveals something real about the gap between the recovery architecture as designed and the recovery capability as it actually exists. This is the test functioning correctly. The problem is not the failure but it is if the failure is not found until a real incident.
What this means for your programmeThe programme includes one full round of initial testing per tier. When tests fail and they will where we identify the root cause, design the remediation and re test. Remediations that require architecture changes or additional infrastructure may incur additional cost. Remediations that require only procedure changes or configuration corrections are included. There is no cap on the number of re-tests for issues identified in the initial test round. We do not sign off a test as passed until the RTO target has been achieved under realistic conditions.
Our protocol when tests failEvery failed test produces a written root cause analysis within 48 hours. The root cause is classified where RJV analytical error (our cost to remediate), infrastructure gap (implementation cost borne by client), procedure gap (our cost to remediate) or scope boundary issue (discussed and agreed). A revised test is scheduled within 10 business days of remediation completion. All test failures, their root causes and the subsequent remediation are documented in the evidence pack and a clean evidence pack that shows no failures occurred is a sign of insufficient testing rigor, not programme quality.
Stage 6 — Maintenance
Organisations lose the discipline to maintain the programme within 6 months of completion
This is the most predictable failure mode in business continuity. The programme completes. The documentation is filed. The maintenance responsibilities assigned to named individuals are not resourced, not prioritized and not enforced. Infrastructure changes occur without triggering plan reviews. Staff leave recovery critical roles without knowledge transfer. Suppliers change. Regulatory requirements evolve. Within 12 to 18 months, the plan reflects an organisation that no longer exists in the form the plan assumes. The plan becomes a liability where it satisfies auditors while creating false confidence about a recovery capability that has silently degraded.
What this means for your programmeA plan that is not actively maintained will be wrong within 12–18 months for most organisations. It will satisfy compliance requirements for longer than that where auditors review documentation, not operational reality. But the gap between documented capability and actual capability will grow until an incident reveals it. We cannot force maintenance discipline on an organization. We can only design the maintenance programme, deliver it to you and make explicit what happens when it is not followed.
Our protocol for maintenanceThe programme concludes with a written maintenance responsibility matrix which named individuals, specific obligations, defined trigger conditions and calendar review dates. We offer an annual maintenance retainer (priced separately) that includes trigger based reviews, an annual exercise and the structural discipline that most organizations cannot sustain internally. For organizations that cannot commit to the maintenance retainer, we explicitly document that the programme’s operational effectiveness has a finite lifespan without it and we record that this was communicated.
Throughout — Organisational Resistance
Parts of the organisation will actively resist the programme
Business continuity programmes expose uncomfortable truths where undocumented systems, ignored dependencies, processes held together by specific individuals who have not documented anything, suppliers whose resilience commitments are contractually empty and recovery time objectives that the board assumed were being met but are not. The people whose areas are exposed by these findings have an interest in the findings not being prominent. IT leaders whose estate is revealed to be more fragile than they reported to the board resist the dependency mapping findings. Finance directors whose processes have 4-hour MTPs argue that 48 hours is more realistic. Department heads who should own response guides argue that their function is not critical. This resistance is not malice but it is the normal human response to exposure. But it delays and degrades the programme if not managed.
What this means for your programmeThe programme requires a named executive sponsor with sufficient authority to override departmental resistance to findings. Without this, we will encounter delays, diluted findings and a programme that concludes with a plan that everyone was comfortable with but that does not reflect reality. If we reach a point in the programme where we believe organisational resistance has materially compromised the analytical integrity of the work, we will say so in writing before proceeding further.
Our protocol when resistance occursWe report resistance to the named executive sponsor immediately and in writing. We do not attempt to negotiate around it informally. The sponsor has the authority and the obligation to resolve it. If the sponsor cannot or will not resolve specific instances of resistance, we document the resulting gap in the programme and proceed with the agreed reduced scope. We do not absorb political pressure by softening findings.