
Business continuity planning: preparing organisations to operate through disruption
At Toro, business continuity is treated as an operational capability rather than a compliance document.
Talk to an expert +44 (0) 208 132 9267

At Toro, business continuity is treated as an operational capability rather than a compliance document.

In this article, Katie Barnett, Director of Cyber Security, and Gavin Wilson, Director of Physical Security and Risk at Toro Solutions, warn that many organisations talk about convergence but stop short of true accountability.
While cyber, physical and people risks are increasingly connected, ownership of those risks often remains fragmented. Different teams manage different parts of the picture, with no single leader responsible for how those threats combine. The result is blurred accountability, slow decision-making and gaps that only become visible during an incident.
Barnett and Wilson argue that collaboration alone is not enough. Without clear authority, board-level visibility and a culture that supports joined-up thinking, risk continues to sit between functions rather than being actively managed. Convergence, they conclude, only works when someone is clearly accountable for the whole picture.

In this recent press piece, Toro Solutions’ Directors of Cyber Security and Physical Security and Risk discuss why resilience is about people, not paperwork.
They argue that most organisations don’t fall short because they lack plans, but because their teams operate in silos. When cyber, physical and operational functions fail to share context early, warning signs are missed and response slows down. Convergence, they explain, isn’t about restructuring it’s about getting the right people talking before small issues turn into bigger problems.
Because when pressure hits, it’s not the plan that makes the difference, it’s how well your teams work together.

Explore third party risks and learn how to identify and manage the potential impact on your organisation’s security and operations.

The biggest cyber risks in 2026 aren’t new technologies – they’re old controls that were never enforced, reviewed or removed.

Resilience isn’t built on plans alone. Learn how breaking down silos, improving communication and connecting people strengthens real organisational resilience.

Most attacks don’t begin with a breach – they begin with a decision. In this article, Toro Solutions’ Directors of Cyber Security and Physical Security explore how modern threat actors quietly assess risk, observe behaviour, and exploit the spaces between cyber, physical, and human security. By understanding the converged pathways attackers follow long before an incident occurs, organisations can reduce exposure, improve early detection, and make themselves a far harder target.

One theme runs through the NCSC’s latest Annual Review: resilience isn’t optional anymore and as Peter Connolly, CEO of Toro Solutions, points out, many organisations still haven’t built the foundations they need.
Connolly stresses that frameworks like ISO 27001 aren’t about box ticking. They give leaders a clear, practical way to weave security into everyday business, not just the IT team. “It’s a framework that forces you to look at people, processes and physical security as well as the tech,” he says. “Once that thinking becomes part of daily operations, you’re in a far stronger position when something goes wrong.”
His message fits closely with the government’s call for FTSE 350 boards to take cyber risk seriously: resilience has to be led from the top, and it has to be consistent.
Read the full piece to see how Connolly believes UK organisations can move beyond firefighting and start building the kind of resilience the current threat landscape demands.

A candid discussion on converged resilience – bringing together leaders to share challenges, insights, and practical steps toward a truly integrated approach to security and risk.

The recent cyberattack on Jaguar Land Rover (JLR) has sent shockwaves through the manufacturing sector. With production halted across the UK, China, Slovakia and India, and sensitive data affected, the incident shows just how quickly a single breach can disrupt an entire operation.
In a recent article published by Technology Magazine, Katie Barnett, Director of Cyber Security at Toro Solutions, was quoted highlighting the importance of spotting vulnerabilities across the supply chain early:
“Early detection of supply chain weaknesses is crucial to limiting the impact of such attacks.”
The attack also underscores the value of zero trust architecture in modern manufacturing, ensuring systems are designed to contain threats quickly rather than relying solely on traditional defences.
The full article explores the lessons JLR’s experience offers to businesses everywhere – from protecting operational technology to strengthening supplier networks – and provides practical guidance for avoiding similar disruptions.

Experts from across security and intelligence explored how shifting geopolitical risks are reshaping organisational strategies to protect people and build resilience.

This guide provides a comprehensive framework for assessing, improving, and implementing business continuity in your organisation.