Cyber Risk Advisory

How Effective BIAs Turn Disaster Planning into Cybersecurity Business Cases

Gwen Takagawa

Gwen Takagawa

Senior Consultant, Coalfire (CIPP/US, CIPP/E, CIPM, PMP)

James bird

James Bird

Principal, Coalfire (CISSP)

December 15, 2025
Coalfire Business Impact

The CISO presented a critical, albeit theoretical, risk during the Board meeting: a full cloud region outage. “What if we lost access to our primary region for a day?” they asked, hoping to spur discussion on multi-region backup strategies. The Board waved it off. “Unlikely,” they responded. “Our provider is reliable, and multi-region is expensive.”

One week later, that same Board stopped mid-review, staring at live news updates on their phones about a major networking failure that had crippled their primary cloud provider’s region, taking down services worldwide. They listened intently for status updates.

This scenario perfectly illustrates normalcy bias: the human tendency to assume that disasters won't happen to you, right up until the moment a real-world event snaps you out of that complacency. 

In that moment, disaster planning stops seeming like a compliance checkbox. It becomes a vital tool to protect revenue, safeguard reputation, and ensure clear decision-making under pressure. That shift in perspective is the first step. The Business Impact Analysis (BIA) is the next. 

A good BIA provides the business and security teams with the data needed to plan and invest in security measures that directly match the business's critical needs and acceptable risk level. By forcing an objective look at potential disasters, it helps answer critical questions like:  

  • Are our vendors contractually obligated to recover fast enough?
  • Are our technical resources (e.g., redundancy, backups) and personnel resources (e.g., cross-training, staffing) sufficient?
  • Are our internal recovery targets (RTO/RPO) aligned with the contractual obligations we have to our customers (SLAs)? 

But these answers only have meaning when they are grounded in business reality. More often than not, business stakeholders are completing the exercise in a vacuum, without fully internalizing the catastrophe scenarios. They complete the exercise, but the input doesn’t align with enterprise risk tolerance. As a result, BIAs fail to deliver the promise of actionable intelligence. 

This post breaks down the core components of a BIA (maximum tolerable downtime, recovery time objective, and recovery point objective) and shows how to calibrate them so your recovery planning reflects actual business risk… or, when it doesn’t, how to build a compelling case for investment. 

What a Business Impact Analysis (BIA) actually is 

A BIA answers the question every Board wants to know: If a critical system fails, what is the impact on business operations, what are our mandated and actual recovery time objectives (RTOs), and what will it take to meet those requirements? 

In other words, the BIA translates the CISO’s domain of technical risk into the Board’s language of business impact. It gives the CISO the numbers and context to say, with credibility, “If ransomware hits this system, it will cost us X per hour and stall these three revenue-driving functions.” 

When paired with a cybersecurity risk assessment, the BIA becomes a validation tool. It helps confirm whether the infosec program is right-sized for the business… or, where it’s not, give the CISO a clear business case for investing where it counts. 

To get there, the BIA process includes: 

  • Understanding from leadership what counts as a disaster
  • Identify materiality thresholds that may trigger SEC reporting, breach a contract, or disrupt a critical timeline like payroll.
  • Identifying the truly critical processes
  • Which systems, if disrupted, would halt operations or cause significant harm to customers, revenue, or reputation?
  • Working with process owners to quantify the cost of downtime
  • How long can a function be down before it creates financial losses, customer churn, or legal exposure? When does inconvenience become crisis?
  • Mapping dependencies
  • What infrastructure, people, and vendors keep these processes running? What are the single points of failure? How do risks cascade? 

The sections below explore how MTD, RTO, and RPO help answer these questions and enable the BIA to drive better decisions. 

Maximum Tolerable Downtime (MTD) – What is the absolute limit? 

MTD defines the disaster cliff: the point at which a disruption shifts from bad to catastrophic. Past this point, the business faces real consequences. 

MTD is set by the business. It reflects what leadership considers unacceptable: missed revenue, broken contracts, shaken customer trust, or even existential risk. 

In some business models, a 4-hour outage is annoying. In others, 4 minutes is enough to lose customers or trigger SLA penalties. 

A credible MTD doesn’t just mark the edge of disaster. It defines what recovery needs to work backwards from. 

Recovery Time Objective (RTO) – How fast do we aim to bounce back? 

RTO identifies the target recovery time for a system or process. This must fall within the MTD. If MTD is the disaster cliff, RTO is the guardrail. 

We've seen BIAs where every system is marked "critical" and every RTO is set to one hour. Most systems can’t even reboot in that time. These arbitrary values undermine the credibility and utility of the BIA. 

In contrast, realistic RTOs create leverage, enabling the CISO to say, “We need to invest in faster recovery because missing this threshold triggers SLA penalties for 90 percent of our customer base.” 

RTOs should be based on real impact, not back-of-the-napkin estimates. Start with: 

  • How long can a customer-facing system be down before contracts are breached or revenue disappears?
  • If payroll is delayed, how many employees are affected, and what does that do to trust, morale, or legal exposure? 

Compare the costs against the MTD to determine appropriate recovery targets. 

Also: recovery targets don’t exist in a vacuum. If your Single Sign-On (SSO) has a longer RTO than the systems that depend on it, those systems exceed the target by default. Review how RTOs stack. 

Recovery Point Objective (RPO) - How much data can we afford to lose? 

While MTD and RTO deal with time, RPO is about data loss. If a system is recovered from backup, how current does that data need to be? 

If backups run every 24 hours, the worst-case scenario is the loss of 23 hours and 59 minutes of data. That might be acceptable for a low-volume reporting system, but it’s a dealbreaker for anything handling customer transactions in real time. 

Backing up more often adds cost. It means more systems to manage, more storage to maintain, and more chances for things to break. The recovery point needs to reflect what the business can actually justify. 

The Calibration Step: Gap Analysis 

Once MTD, RTO, and RPO are clearly defined based on financial and business impact, the BIA delivers its most powerful finding: the Recovery Gap. 

This involves comparing the Required Target (your defined RTO/RPO) against the Current Capability (how fast you can actually recover or what data you can actually restore right now).  

If your current capability is slower than your RTO/RPO target: You have a Risk Gap. This gap provides the CISO with a clear business case for investment in new technology, increased backup frequency, or more redundant infrastructure. 

This comparison must also include vendor SLAs. Too often, businesses let contractual terms dictate recovery targets, but those packages rarely reflect business criticality. Instead, define RTO/RPO based on internal requirements, then confirm the vendor can (and is obligated to!) meet them. If not, the CISO has a clear business case to evaluate alternatives. 

By identifying and quantifying the Recovery Gap, the BIA ensures that every dollar spent on recovery planning is precisely aligned with the business’s validated risk tolerance. 

Wrapping Up – Plan Before the Disaster 

When the Board paused its quarterly review to stare at the failing status pages and news updates, no one reached for a risk register. They wanted answers. How bad could this get? Who’s affected? What’s our fallback and how long would that take to come online? 

That moment didn’t just test disaster response. It tested the quality of prior decisions: how risks were framed, how impact was understood, and whether the organization had planned with clear, shared priorities in mind. 

That’s the real value of a Business Impact Analysis. 

A strong BIA connects systems to outcomes. It gives cybersecurity leaders the credibility to advocate for investment and the clarity to guide response. Not with gut instinct, but with data grounded in business impact. 

Done right, a BIA is more than a compliance requirement. It’s a map of what matters, how long you can afford to lose it, and what it will take to protect it. 

*** 

Want to revisit your BIA or build one that actually reflects business risk? Let’s talk about how to get there. 

 

Contributors: We’d like to thank Michael Burke for contributing to this article.