Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Dry Run Brings Plan to Life

May 1, 2004
Maintaining and implementing business continuity plans include planning and coordinating certain plan exercises, and evaluating and documenting their results.

Why are plan exercises important?

For survival, every organization should develop processes to maintain the continuity capabilities and ensure that the plan remains in alignment with the organization’s strategic vision and tactical direction.

Also, if a disaster or crisis occurs that suddenly activates the business continuity plan, employees must be ready to effectively and efficiently implement it. Having an approved plan in place, and even having employees trained in carrying it out, is only two-thirds of the essential preparation process. Real scenario-based testing through planned exercises truly brings the process to life and engages everyone in it.

Exercises also will uncover potential gaps in the implementation plan and determine if certain functions needed to carry it out are understaffed. This will be apparent during scenario-based testing, and could indicate a need to assign more people to certain areas. The exercises also will reveal whether some employees not equipped to handle their assigned functions Further training in these areas can be conducted or people can be reassigned as needed to match talents with functions.

Security managers should pay special attention to any communication gaps that might exist between certain areas during the exercise. It’s better to learn about these problems now than when an actual disaster or crisis occurs.

Once the scenario-based testing exercise has been completed and evaluated, the manager should develop an exercise strategy that does not put the organization at risk. It should be practical, cost-effective and appropriate to the organization. It should approximate the types of incidents that the organization is likely to experience and the problems associated with these incidents. An exercise based on a highly unlikely set of circumstances may not engender the best level of interest and commitment of employees – they could see it as a waste of time. However, a good scenario choice can serve to motivate employees and gain their highest level of commitment to the process.

The exercise should be mapped out in a logical, structured approach and the same set of information communicated to all participants. If assumptions about certain aspects of the simulated problem are to be made, these must be stated clearly so that all participants understand them. The amount of information delivered at the start of the exercise must be reasonable, so that participants will be able to remember it and act on it when necessary.

Exercise types

Several different types of exercises can be employed, including:

  • Walkthroughs/tabletop exercises
  • Simulations
  • Modular/component xercises (call trees, applications, etc.)
  • Functional exercises (specific lines of business)
  • Announced/planned exercises
  • Unannounced/surprise exercises


Exercise evaluation criteria also need to be carefully developed before the exercise begins and aligned with the exercise objectives and scope. These will include both qualitative and quantitative results to be measured. Criteria should cover expected versus actual results and unexpected results.

These results should be compiled into a cogent, comprehensive summary with recommendations for possible improvements and adjustments to the business continuity plan.

Debriefing sessions with participants will provide opportunities to review exercise results and identify action items. Time schedules for completing these items also should be established.

A final bit of advice on planning exercises: start small. With all of the considerations outlined above, conducting a successful exercise and gaining the necessary actionable feedback is not an easy process.

For all of these reasons and more, it is vital that each exercise conducted be considered a success – by both the business continuity planning team and the exercise participants. Small exercises have a greater probability of success, so begin with a walkthrough/tabletop exercise and progress to full-scale simulations and real-time testing later.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • fingerprint

    Extreme Dry Skin Leads to Fingerprint ID Failures

    See More
  • DHS Finally to Test Cybersecurity at Power Plants – Run-up to Smart Grid

    See More
  • Security sandbox podcast with CSO Amanda Fennell

    CSO Amanda Fennell brings her unconventional approach to legal, cyber and compliance issues to the Security Sandbox podcast

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing