How to manage a crisis event and activate a BC/DR plan

Created by Anjana vs, Modified on Mon, 24 Feb at 7:51 AM by Anjana vs

1. Navigating the Crisis Events Module

Go to the Business Resiliency Module.

Click on Crisis Events from the left-hand menu, where you will find a list of all crisis events recorded in the system.

Example: If there was a ransomware attack on supply chain vendors, it will appear as a crisis event in the system.

 

2. Creating a New Crisis Event

Click the "Create Crisis Event" button at the top right corner.

Fill in the following details:

  • Summary (Brief description of the event)
  • Description (Detailed explanation of the event and its impact)
  • Occurred Date (When the crisis started)
  • Reported Date (When it was logged in the system)
  • Crisis Category (e.g., Technological, Operational, Financial)
  • Severity (Low, Medium, High)
  • Notify Users (Checkbox to notify impacted stakeholders)

Click Save to create the event.

Example: If an internet outage disrupts business operations, log it under crisis events and categorize it under Technological Risk with Medium Severity.

3. Identifying and activating a BC/DR Plan

Once the event is created, the Crisis Event Workflow starts.

  • In the Identification Stage, click "Select BCDR Plan" to associate a Business Continuity and Disaster Recovery (BCDR) Plan with the crisis.
  • Click "Activate BCDR Plan" to trigger predefined recovery strategies.

Once activated:

  • Notifications are sent to all mapped contacts responsible for executing the plan.
  • Assigned Recovery Strategies will appear under the Recovery Strategies Tab.

Example: If a ransomware attack occurs, you can activate a Disaster Recovery Plan that includes:

  • Isolating affected systems
  • Engaging cybersecurity teams
  • Notifying stakeholders

A screenshot of a computer

AI-generated content may be incorrect.

4. Conducting a Crisis Assessment

After execution, the next stage is Assessment, where you must document:

  • Estimated Recovery Time (In hours)
  • Estimated Financial Loss (Approximate impact)
  • Risk of Delayed Recovery (Low, Medium, High)
  • Assessment Notes (Additional context)

Click Save Assessment to proceed.

Example: If a supply chain disruption is estimated to take 48 hours to recover, document this with an estimated loss of $100,000.

 

5. Response Execution

In this stage, the response team documents:

  • Actions Taken (Steps implemented to mitigate the crisis)
  • Impact on Operations (Extent of disruption and affected departments)
  • Response Actions (Additional measures needed)

Click Save Response to finalize this stage.

Example: During a cyber-attack, response actions may include:

  • Revoking compromised credentials
  • Deploying security patches
  • Engaging forensic investigation teams

 

6. Monitoring the Recovery Stage

Once response actions are in place:

  • Monitor recovery efforts to ensure proper implementation.
  • View Loss Type, Duration of Downtime, and Assigned Tasks.
  • Track progress in the Recovery Strategies tab.

Example: If an ERP system outage lasted 6 hours, document recovery timelines and mitigation steps.

 

7. Review and Continuous Improvement

Once recovery is complete:

  • Document Lessons Learned
  • Collect Feedback from involved stakeholders
  • Identify Areas for Improvement
  • Finalize the crisis event report by clicking "View Report".

Example: After an IT security breach, review findings and implement additional security controls to prevent recurrence.

 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article