CGI - Business Continuity

In order to appropriately protect critical information and services from loss or corruption, it is essential that a robust approach is taken to business continuity management; development and operation of a business continuity management system (BCMS) helps ensure that resilience and recovery mechanism remain valid


  • Business impact analysis and identification of critical time periods
  • Threat and vulnerability assessment to identify risks to your services
  • Identification of mitigations for business recovery in a timely manner
  • Identification of measures that could prevent/reduce the potential disasters
  • Development of recovery strategy balancing time, risk, and costs
  • Development business continuity and IT disaster recovery plans
  • Training of staff, at all levels, in business continuity
  • Graduated series of rehearsals (aka exercises)
  • Sectors:Justice, Policing, Prosecution, Courts, Prisons, Probation, Central Government, Education,


  • senior management will be able to correctly estimate time/accuracy
  • the threats to those critical systems and services are quantified
  • measures to prevent potential disasters are identified
  • measures to enable early detection of potential disasters are identified
  • appropriate recovery strategies, in line with corporate risk appetite
  • pragmatic plans are produced to match needs of the organisation
  • recurring validation is undertaken to both prove the plans
  • enables a continual improvment process to be implemented


Planning service No


Training service provided No

Setup and migration

Setup and migration
Setup or migration service available Yes
How the setup or migration service works The CGI approach enables the potential business continuity options to be defined and implemented in a timely manner, thus reducing overall coproate risk. In terms of the migration to the cloud, it is usually better to assure the continuity in advance of a move to the cloud as this reduces the risk of a major failure during the transition phase.
Setup or migration service is for specific cloud services No

Quality assurance and performance testing

Quality assurance and performance testing
Quality assurance and performance testing service No

Security testing

Security testing
Security services Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers Yes
Security testing certifications
  • Tigerscheme
  • Cyber Scheme

Ongoing support

Ongoing support
Ongoing support service No

Service scope

Service scope
Service constraints The scope of the continuity service can be as wide or as narrow as the client sees fit. We will work with clients to ensure that there is pragmatic approach taken and that any client constraints are fully explored.

User support

User support
Email or online ticketing support No
Phone support No
Web chat support No
Support levels This service does not provide support


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)


Price £670 per person per day
Discount for educational organisations No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑