[Business Continuity Strategy] [Template 1]
Part 1: BCS – Mitigation Strategies
Children’s Aid Society
Mitigation strategies are essential to ensure that the Children’s Aid Society (CAS) remains resilient in the face of risks and uncertainties.
As an organisation dedicated to safeguarding and empowering vulnerable children and families, CAS must maintain robust measures to protect its operations, reputation, and the safety of its beneficiaries.
This chapter outlines the threats that could potentially disrupt CAS’s core services and identifies corresponding mitigation strategies to reduce, avoid, or transfer these risks.
By assessing existing controls and implementing additional measures, CAS strengthens its preparedness to withstand incidents while ensuring continuity of care and support for those who rely most on its services.
Mitigation Strategies Table for Children’s Aid Society
Threat |
Existing Controls |
Risk Rating |
Risk Level |
Risk Treatment (Residual Risk) |
Additional Mitigation Strategy |
Justification for Selected Mitigation Strategy |
Data breach / cyber-attack |
Firewall, antivirus, data access policies, staff briefings |
Medium (e.g., 6) |
Medium |
Risk Reduction |
Conduct regular vulnerability assessments; strengthen staff cybersecurity training. |
Cyber threats evolving—periodic testing and training reduce both likelihood and impact; cost-effective relative to potential data loss or reputational damage. |
Service disruption (e.g., IT outage) |
UPS systems, backup generators, and basic disaster plans |
High (e.g., 9) |
High |
Risk Reduction |
Implement DR (Disaster Recovery) site; formalise RTO/RPO targets |
Enhances resilience; even if primary systems fail, services (critical for vulnerable children) can continue with minimal downtime |
Child safety incident (on-site) |
Supervision protocols, staff-to-child ratios, and incident reporting |
Medium (e.g., 8) |
High |
Risk Avoidance / Reduction |
Regular refresher training on child safety; install CCTV in communal areas (with privacy measures) |
Adds layers of protection; training reinforces awareness, CCTV deters and aids response—balances safety and privacy. |
Financial fraud or misappropriation |
Segregation of duties, approval workflows, and audits |
Medium (e.g., 6) |
Medium |
Risk Transference / Reduction |
Purchase fidelity insurance; enhance internal audit frequency |
Insurance transfers residual risk; audits provide proactive detection and deterrence versus sole reliance on existing controls |
Reputational risk (e.g., negative media) |
Communications protocol, designated spokesperson, social media monitoring |
Medium (e.g., 6) |
Medium |
Risk Reduction |
Develop a crisis communication plan; media training for key, trained staff |
Prepares CAS to respond swiftly and appropriately to preserve public trust—better than reactive ad-hoc responses |
Non-compliance with regulatory requirements |
Policy documentation, occasional compliance reviews |
High (e.g., 8) |
High |
Risk Avoidance / Reduction |
Engage an external compliance consultancy; set up regular regulatory compliance audits. |
Ensures adherence to evolving regulations; external experts add oversight and credibility, mitigating legal and reputational consequences. |
Physical security breach (intrusion) |
Locks, visitor logs, access control |
Low (e.g., 4) |
Low–Medium |
Risk Reduction |
Install electronic access cards, CCTV + alarm systems |
Modernises security, deterrent and audit trail for incidents; relatively low cost given the safety of vulnerable individuals |
* Note: The Risk Rating and Risk Level columns are placeholders—derived as typical combinations of likelihood × impact (from the RAR phase), and should be updated based on your organisation's actual scoring and definitions from your RAR assessment.
Explanation & References to BCMpedia Guidance
- Risk Treatment Types align with BCMpedia’s four risk treatments (Avoidance, Reduction, Transference, Acceptance).
- Additional Mitigation Strategies drawn from the examples in the “Summary of Mitigation Strategies”—such as installing detection devices, training staff, outsourcing activities, buying insurance, etc.
- Justification aligns with BCMpedia’s recommended considerations—for example, cost, maintenance effort, skill readiness, urgency, elevated awareness, and comparing prevention costs vs benefits.
Summing Up ...
In summary, effective mitigation strategies allow the Children’s Aid Society to minimise vulnerabilities and reinforce organisational resilience.
By systematically identifying threats, evaluating current controls, and adopting additional measures, CAS can manage risks proactively and sustainably. These strategies not only protect critical functions but also safeguard the well-being of children and families under their care.
Ultimately, a well-structured mitigation framework ensures that CAS can continue to fulfil its mission, uphold stakeholder trust, and maintain service excellence even in times of crisis or disruption.
To learn more about the course and schedule, click the buttons below for the BCM-300 Business Continuity Management Implementer [BCM-3] and the BCM-5000 Business Continuity Management Expert Implementer [BCM-5].