Integrating Cyber Security Into Overall Business Continuity and Risk Management.
A Letterkenny engineering firm had two documents: a cyber security policy, updated annually by their IT provider, and a business continuity plan, updated annually by their operations manager. The cyber security policy covered technical controls. The business continuity plan covered operational scenarios including supplier failure, key staff absence, and premises damage.
When ransomware encrypted their systems, neither document was adequate. The cyber security policy had no response procedures. The business continuity plan had no section on cyber incidents. The management team spent the first day working out which document applied and who was in charge of which response elements.
Both documents existed. They had never been connected.
Why Integration Matters
Cyber security and business continuity address different aspects of the same underlying question: how does the business continue to function when something goes seriously wrong? Treating them as separate domains — one owned by IT, one owned by operations — creates gaps at exactly the point where the two need to work together: a significant cyber incident.
A cyber incident is a business continuity event. Ransomware that encrypts systems is an operational disruption. A data breach is a crisis that requires communication, regulatory response, and client management. A BEC fraud is a financial crisis. None of these is purely a technical problem — all have operational, financial, reputational, and regulatory dimensions that the business continuity framework needs to address.
What Integration Looks Like in Practice
Unified risk register. Cyber risks belong in the same risk register as operational, financial, and strategic risks. The risks are assessed against the same criteria — likelihood and impact — and prioritised in the same process. A business that has never put "ransomware attack" in its operational risk register has not assessed it with the same rigour as supplier insolvency or key staff departure.
Integrated incident response and BCP triggers. The business continuity plan should explicitly define which cyber scenarios trigger BCP activation, what the response structure is, and how the cyber incident response process hands off to the BCP process as the incident moves from containment to recovery.
Common language and ownership. The same management team owns both. The person who leads the cyber incident response is the same person who leads the business continuity response — or the handoff between them is explicitly defined. Communication protocols, client notification procedures, and regulatory reporting are addressed once, in a unified framework, not duplicated in two documents that may conflict.
Testing that exercises both. A tabletop exercise for a cyber incident should test not only the technical response — isolation, notification, IT recovery — but also the operational response: how do clients get served during the outage, who communicates with suppliers, how does the business bridge the financial gap during a recovery period?
Does your business continuity plan include a scenario specifically for a significant cyber incident? If not, the plan may leave you with procedures for operational disruptions but nothing for the most likely cause of significant operational disruption in 2026. Book a free 20-minute strategy call — integrated resilience planning is central to our vCISO advisory approach with Irish SMEs.
The NIS2 and GDPR Integration
NIS2 Article 21 requires that business continuity measures — including backup, disaster recovery, and crisis management — are part of the organisation's cybersecurity risk management measures [^1]. This creates a formal regulatory requirement for integration: it is not sufficient to have cybersecurity controls and business continuity procedures separately. The cybersecurity risk management framework must include business continuity.
The Data Protection Commission expects organisations to have procedures that protect personal data during disruptions and enable recovery. This is a data governance requirement that sits at the intersection of cyber security and business continuity.
What Next
Add cyber incidents explicitly to your business continuity plan. Add a section that covers: what constitutes a cyber-triggered BCP activation, who leads the response, what the manual operational workarounds are, and what the client communication process is.
Add cyber risks to your operational risk register. Use the same format and assessment criteria as your existing operational risks. This creates a single prioritised view of all business risk.
Design the next tabletop exercise to cover both dimensions. Technical containment and operational continuity in the same scenario. Identify the gaps where the two currently-separate frameworks do not connect.
Ready to find out exactly where your business stands? Book a free 20-minute strategy call with our vCISO team at www.pragmaticsecurity.ie/book-a-call. No sales pitch. No jargon. Just clarity on your cyber risk — and a clear plan to address it.
Related Reading
- How to Build a Simple, Tested Business Continuity Plan That Non-Technical Staff Can Use
- A Simple Risk Assessment Method for Busy Owners
- Using Tabletop Exercises to Rehearse Cyber and Business Disruption Scenarios
[^1]: NCSC Ireland — NIS2 Business Continuity Requirements [^2]: Data Protection Commission Ireland [^3]: An Garda Síochána — National Cyber Crime Bureau
Pragmatic Security — Cybersecurity advisory for Irish businesses. Based in Donegal, Ireland. CISA, CISSP, CISM certified advisors.