Skip to content

What do “jackpot events” really look like in your organisation?

Jackpot events are rare, high‑impact disruptions that overwhelm normal incident and continuity plans. They usually combine several failures at once, last much longer than everyday outages and quickly exhaust simple workarounds. They are low‑probability but very high‑impact scenarios – such as a regional power failure across multiple sites, a destructive cyber attack during a major release, or a cloud‑provider outage combined with key staff unavailability – and they only become manageable when you treat them as explicit risks inside your ISMS and business continuity framework rather than abstract workshop stories.

Routine incidents affect a contained part of your environment, while jackpot events overwhelm multiple services at once and keep doing so for an extended period. A single server crash or a local office outage is inconvenient, but it can usually be absorbed by standard failover or manual workarounds. A jackpot event, by contrast, hits several critical elements at once and pushes your operating model, people and suppliers to their limits.

Most continuity planning still focuses on predictable, single‑point failures such as a single server failing, a local office losing connectivity or one key person being unavailable for a few days. Those scenarios matter, but they are not usually the ones that threaten the survival of your business, your licence to operate or your ability to meet contractual and regulatory duties.

Jackpot events typically share three traits:

  • Compounding factors: – several things go wrong at once; for example, a data‑centre outage plus a key SaaS failure.
  • Extended duration: – disruption lasts long enough that manual workarounds and goodwill start to fail.
  • Systemic impact: – multiple critical services, regions or business units are affected at the same time.

If your risk register and test programme focus almost entirely on neat, single‑failure scenarios, you are almost certainly under‑exposed to jackpot risk and over‑confident in your ability to cope with genuinely severe events.

To make the distinction more concrete, it can help to compare routine incidents and jackpot events side by side.

A simple comparison shows how routine incidents and jackpot events differ in scope and expectations.

Dimension Routine incident Jackpot event
Scope Single system, site or team Multiple systems, sites and teams
Duration Short, often hours or less Extended, often many hours or days
Impact Localised disruption, limited customer effect Enterprise‑wide disruption, major customer impact
Workarounds Standard playbooks usually sufficient Workarounds degrade over time
Governance focus Operational teams and local management Executive leadership, regulators and major customers
Test expectations Simple failover and recovery checks Complex scenario exercises and cross‑team drills

This framing helps you decide which scenarios belong in everyday continuity tests and which should be treated as jackpot events that warrant more serious, cross‑functional attention – a distinction you will use again when you design scenarios and tests later in this playbook.

Routine incidents versus jackpot events

Routine incidents affect contained systems or locations, while jackpot events stretch your whole organisation across technology, people and third parties. Thinking explicitly about both types helps you avoid over‑focusing on the problems you already handle well.

Most continuity planning is still anchored in the predictable, everyday failures that operations teams see most often. You may have strong playbooks for single‑system outages, local office disruptions or short‑term staff absence, yet very little for the awkward combinations that bring several of those issues together at the same time.

For leaders such as CISOs, continuity managers and IT heads, the real value lies in using this distinction to prioritise time and investment. Routine incidents should remain in your standard incident and service‑management processes. Jackpot events, in contrast, justify specific attention in your risk assessment, business impact analysis and exercise programme because they are the ones most likely to test your licence to operate and your promises to customers and regulators.

Why jackpot events are suddenly everyones problem

Jackpot events have become relevant to almost every organisation because systemic shocks and digital dependence have made severe disruptions more plausible. You now depend on shared cloud infrastructure, critical SaaS suppliers and tightly coupled processes in ways that were rare a decade ago, so failures can spread much further and faster than before.

In the last decade, several trends have pushed jackpot events from interesting to board‑level topics:

  • Pandemics and geopolitical shocks: showed that supposedly rare, global disruptions can occur within a single planning cycle.
  • Ransomware and destructive malware: now routinely disable hundreds of systems and organisations in a single campaign.
  • Cloud concentration and shared suppliers: mean one providers failure can hit large parts of an ecosystem at the same time.
  • Operational‑resilience regulation: in financial services and critical infrastructure now expects planning and testing for severe but plausible disruptions, not just everyday outages.

Whether you are pursuing ISO 27001 certification, maintaining it, or simply using the standard as a benchmark, these expectations shape how auditors, regulators and customers read your continuity storey. Jackpot events have effectively moved from the edge of your risk appetite into the centre of how your resilience is judged, so they are now as much a concern for privacy officers, CISOs and IT practitioners as for business continuity teams.

Book a demo


How do jackpot events fit inside your ISMS and BCMS?

Jackpot events fit best when you treat them as high‑impact information‑security and continuity risks that live inside your existing management systems. They should appear in your risk assessment, business impact analysis and exercise programme in the same structured way as more familiar scenarios, just with different assumptions about scale and duration. The real question is whether your ISMS and BCMS currently describe, own and test these scenarios in a coherent way, or whether they still exist only as “what‑ifs” that never become concrete plans.

If you already run an ISO 27001‑aligned ISMS on a dedicated platform such as ISMS.online, you can treat jackpot scenarios as another category in your existing risk and continuity model rather than a separate project. You can then connect those scenarios to owners, controls, run‑books and test evidence without inventing a parallel structure, which keeps everything visible inside one governance system.

Resilience grows fastest when you deliberately test the things you hope will never happen.

ISMS versus BCMS: two lenses on the same extremes

Your ISMS and BCMS look at the same extreme events from different but complementary angles. One focuses on protecting information; the other focuses on keeping important services going. When you align them, jackpot scenarios become a shared object rather than a confusing overlap between separate teams and documents.

An Information Security Management System (ISMS) under ISO 27001 is primarily concerned with the confidentiality, integrity and availability of information. A Business Continuity Management System (BCMS), typically aligned to ISO 22301, focuses on the continuation of critical activities during and after a disruption.

For jackpot events:

  • The ISMS lens tests whether information remains secure and available under stress by asking what happens to your data, systems and security controls when an extreme scenario hits.
  • The BCMS lens tests whether you can keep your most important services within tolerable limits under that scenario, even if parts of the environment are degraded.

If these two systems use different language and lists of incidents, you will see gaps and confusion. A more robust pattern is to use:

  • A shared risk taxonomy: – including explicit “low‑likelihood / high‑impact” tags so jackpot risks are visible.
  • A shared list of critical services and supporting assets: – so both ISMS and BCMS are anchored in the same business priorities.
  • A single scenario library: feeding both BC plans and security incident‑response run‑books.

This alignment makes it much easier to show auditors, regulators and management that security and continuity planning are working from the same picture of extreme risk rather than competing versions of reality.

Where jackpot scenarios should appear in your documentation

Jackpot scenarios should appear consistently across your ISMS and BCMS documentation so they are managed, tested and improved in a joined‑up way. Consistency matters more than volume: auditors and internal stakeholders want to see that the same severe scenarios appear wherever governance and testing decisions are made.

In an integrated ISMS/BCMS, jackpot events should typically show up in several specific places:

  • Context and scope: – a short statement that the organisation is exposed to rare, system‑wide disruptions such as regional infrastructure failures, major supplier collapse or destructive cyber events.
  • Risk assessment: – explicit risks with very high impact ratings, even if likelihood is low, with clear owners and agreed treatment plans.
  • Business impact analysis (BIA): – scenarios used to validate Recovery Time Objectives (RTOs), Recovery Point Objectives (RPOs) and maximum tolerable outage periods, expressed in plain language.
  • Continuity and incident plans: – playbooks that assume multiple controls or locations may fail at once, rather than neat, isolated incidents.
  • Exercise calendars: – at least some exercises each year dedicated to complex, multi‑factor scenarios instead of only simple single‑failure tests.

If you cannot quickly point to where “regional cloud outage plus supplier failure” lives in your risk register, BIA and exercise log, you have discovered your first improvement opportunity. Bringing those references together will also make it easier to maintain alignment as your architecture and supplier set evolve and as roles such as CISO, DPO and continuity lead change.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




How can ISO 27001 and ISO 22301 give you a governance spine?

ISO 27001 and ISO 22301 give you a shared governance spine so jackpot‑event testing is planned, owned, improved and clearly governed rather than improvised or ad hoc. Both standards follow the Annex SL management‑system structure, which lets you slot severe‑scenario planning straight into familiar clauses and processes for context, risk assessment, operation, measurement and improvement. Instead of inventing a new framework, you extend what you already have, wrap jackpot testing inside your normal governance cycle and give auditors, regulators and major customers a simple way to see resilience alongside your other risks rather than as a separate “special project”.

Core ISO 27001 clauses that matter for jackpot events

A handful of ISO 27001 clauses anchor how you describe, operate and improve jackpot‑event testing in your ISMS. You do not need to treat jackpot scenarios as a separate standard; you simply need to weave them into the existing clause structure in a visible way so that assurance stakeholders can follow the thread.

Several ISO 27001:2022 clauses and Annex A controls are particularly relevant:

  • Clause 4 – Context of the organisation:

You identify external and internal issues and interested parties. Jackpot exposure belongs here: reliance on shared cloud regions, critical third parties and regional infrastructure should be recognised explicitly, so extreme disruptions are part of your baseline assumptions.

  • Clause 6 – Planning (risk assessment and treatment):

Jackpot events are modelled as risks with extreme impact. You may treat them differently in your methodology, for example by using scenario analysis rather than simple likelihood scores, but they remain part of the ISMS risk process, with owners and treatment plans defined.

  • Clause 8 – Operation:

Here you operate and test the controls and processes that come into play during severe disruptions, including incident response, continuity procedures and disaster recovery. This is where you demonstrate that your severe‑scenario controls can actually be run under stress.

  • Clause 9 – Performance evaluation:

You decide which continuity and resilience metrics you monitor, and how you evaluate the effectiveness of exercises and tests. This is where jackpot‑event metrics naturally sit, alongside other measures of control performance and management review content.

  • Clause 10 – Improvement:

Jackpot‑event tests feed findings and corrective actions into your continual‑improvement cycle, so weaknesses are tracked and resolved rather than left buried in exercise reports, and you can demonstrate learning over time.

Annex A adds specific continuity‑flavoured controls, such as information security during disruption and ICT readiness for business continuity. For example, controls that require secure operation during disruption and readiness of information‑processing facilities give you a direct hook from scenario design to specific safeguards, helping you show that continuity is part of normal information‑security control design rather than a separate discipline.

How ISO 22301 complements ISO 27001

ISO 22301 adds depth on how you analyse impacts, choose continuity strategies and run an organised exercise programme. It focuses on the business‑side questions of which services matter most, how long they can be disrupted and how you prove that your chosen strategies actually work for those services.

In practice, ISO 22301 concentrates on:

  • business impact analysis
  • continuity strategies and solutions
  • documented procedures for incident response
  • exercising and testing programmes.

If you already have a BCMS, the aim is not to duplicate everything in your ISMS, but to:

  • reference BCMS artefacts from your ISMS where they cover information‑security continuity
  • ensure jackpot scenarios used in BC exercises also appear in the ISMS risk register and Statement of Applicability
  • agree a shared calendar of exercises so the same scenario can test both service continuity and security controls.

If you do not yet have a mature BCMS, ISO 27001 still expects you to address continuity for information security. In that case, you can start small: identify one or two of your most critical information‑dependent services and build a lightweight continuity‑testing approach for them, for example by checking whether you can meet basic recovery objectives under a defined severe scenario. Using the standards in this way gives you a simple checklist to show that your jackpot testing is planned, operated and improved inside your management system, not bolted on at the edge.

This governance spine then becomes the frame for everything that follows: scenario design, exercise planning, evidence capture and continual improvement all plug back into these familiar clauses rather than living in isolation, which is exactly what auditors and regulators expect to see.




How do you turn jackpot ideas into concrete scenarios and test plans?

You turn jackpot ideas into concrete tests by translating vague “what if?” questions into specific, realistic scenarios with clear objectives and evidence, not just dramatic stories about “the cloud going down”. A good scenario describes which services are at risk, what fails, how long it lasts, what you are trying to prove and the scope, assumptions, triggers and success criteria in language that business and technical teams can share. Once you have that level of clarity, you can design exercises that people understand, run them safely, show exactly what you learned and keep scenarios up to date as your environment and supplier set change.

Start from your critical services and worst credible impacts

The most practical starting point is your list of critical services and the worst credible harm if they fail. Working backwards from intolerable outcomes keeps you honest about which scenarios really matter and stops you designing tests around interesting but low‑consequence events. Begin with your list of important services or processes and ask:

  • Which services, if disrupted for an extended period, would cause intolerable harm such as major financial loss, regulatory breach or lasting reputational damage?
  • What “worst credible” combinations of failures could affect these services, given your architecture and supplier map?

For example, for an online‑payments provider, a jackpot scenario might be a prolonged outage of the primary payment processor’s cloud region during a peak trading day, combined with an API failure at the backup processor and unavailability of the usual incident commander. The combined effect is a cascade that stresses both technical and decision‑making capacity at the same time.

Capture each scenario in a simple template that might include:

  • Plain‑language summary: – a one‑sentence description that any stakeholder can understand.
  • Scope: – systems, locations, teams and suppliers involved in the scenario.
  • Assumptions: – what still works and what does not, including any known constraints.
  • Entry and exit criteria: – how the test starts and what conditions end it.
  • Objectives: – specific goals such as “resume core payment flows within a defined time using agreed fall‑back”.

Visual: a simple matrix mapping your critical services down one axis and worst‑credible jackpot scenarios across the other to show where attention should focus and which combinations deserve early testing.

Build a reusable “test kit” for each scenario

A reusable test kit turns a single well‑designed scenario into a repeatable exercise you can refine over time. It also makes it easier to brief new participants and to keep evidence consistent from one run to the next, regardless of whether you are a CISO, continuity manager or IT practitioner leading the work.

To make scenarios repeatable and auditable, define a test kit that includes:

  • Pre‑work: – data seeding, environment preparation and concise stakeholder briefings.
  • Roles: – who plays which part, including exercise director, observers, decision‑makers, note‑takers, technology leads and customer‑facing staff.
  • Timeline: – clear phases of the test, such as initial shock, escalation, stabilisation and recovery.
  • Injects: – scripted events or information drops that force decisions, for example “supplier states RTO will not be met” or “media outlet reports the outage”.
  • Success criteria: – a small set of metrics you will measure, such as RTO/RPO achieved, decision speed and communication quality.
  • Evidence requirements: – what you will capture, including logs, screenshots, recordings, key decisions and issues.

You can then scale testing by reusing these kits, updating them as your environment and risk profile change rather than reinventing each exercise from scratch. Over time, each scenario becomes a living asset in your ISMS or BCMS rather than a one‑off event buried in a slide deck, and leaders can compare performance across repeated runs to see whether capability is improving.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




How do you run realistic, low‑risk jackpot tests in practice?

You can run realistic jackpot tests without putting live services at unacceptable risk if you choose appropriate exercise types and treat the tests as controlled changes. A gradual build‑up from low‑risk discussions to more technical drills lets you learn a great deal before you touch production. The aim is to gain insight, not to impress people with how much disruption you can cause.

Many teams hesitate to test extreme scenarios because they fear unplanned downtime or negative headlines. By designing exercises with clear objectives, guardrails and rollback options, you can demonstrate serious intent while staying within your organisation’s risk appetite and regulatory obligations. For CISOs, continuity leads and IT managers, this is often the difference between a test programme that leadership supports and one that never gets off the ground.

Choose the right mix of exercise types

Different exercise types let you build confidence step by step before you attempt anything intrusive. You do not need to start with full failover in production to discover important weaknesses in decision‑making, coordination or technical design.

A sensible progression might look like this:

  • Tabletop exercises: – discussion‑based sessions using the scenario narrative. They are low risk and excellent for exploring decision‑making, roles and communication.
  • Walkthroughs or simulations: – structured run‑throughs using test environments or “paper rehearsals” of technical steps, focusing on how teams and systems interact.
  • Technical drills: – targeted tests in lower environments, such as deliberately failing over a non‑production database or simulating identity‑provider failure in a sandbox.
  • Partial or parallel failovers: – redirecting a subset of traffic to a backup site or solution while you monitor behaviour, with a clear rollback plan if anything looks unsafe.
  • Full failovers: – switching production completely, typically reserved for organisations with high maturity, strong rollback plans and clear management approval.

You do not need to jump straight to full production failover to learn useful lessons. Starting with table‑top exercises, then adding depth and technical realism over time, usually gives a better balance between insight and risk, and lets you move up the ladder as your confidence and maturity grow.

Visual: a simple ladder diagram that shows progression from tabletop discussions at the bottom, through simulations and technical drills in the middle, to partial and full failovers at the top as capability increases.

You can also express the relationship between exercise types, goals and relative risk in a compact comparison.

This overview helps you choose suitable exercise types for your current maturity and risk appetite, and to see how you can move towards more ambitious tests over time.

Exercise type Primary goal Relative risk level
Tabletop Clarify decisions, roles, comms Low
Walkthrough / simulation Validate process and hand‑offs Low–medium
Technical drill Test specific controls or run‑books Medium
Partial / parallel failover Validate failover paths with safety net Medium–high
Full failover Prove end‑to‑end resilience High

This table is not a prescription but a guide. You can adjust your own mix over time as teams gain confidence and as regulators, customers or risk committees expect more direct demonstrations of resilience.

Manage risk before, during and after tests

Treating a major exercise as a formal change helps you control risk and reassure senior stakeholders. When tests are planned, approved and monitored like any other significant change, executives are more likely to support them and less likely to be surprised by side‑effects.

For more intrusive tests, treat the exercise itself as a controlled change:

  • Before: – obtain management approval, conduct risk assessments, agree explicit “no‑go” and “stop” criteria, and schedule tests outside peak periods.
  • During: – monitor key indicators such as system performance, error rates and customer impact, and empower named individuals to pause or abort the exercise if thresholds are breached.
  • After: – run debriefs while memories are fresh, capture what worked and what did not, and agree immediate containment actions for any weaknesses discovered.

You can also borrow ideas from chaos engineering and red‑teaming. Chaos engineering means deliberately injecting small, controlled failures in non‑production environments to uncover hidden dependencies. Red‑teaming means simulating realistic attacker behaviour to see how security and continuity teams coordinate. Whatever blend you choose, the key is to ensure each test is safe, intentional and well governed rather than an ad hoc experiment that worries the business.




How do you prove to auditors that your jackpot testing actually works?

You prove that jackpot testing works by combining a small, meaningful metric set with structured, audit‑ready evidence packs. Auditors, regulators and major customers want to see that you chose appropriate scenarios, met sensible objectives and used the results to strengthen your controls and processes. They do not expect perfection, but they do expect a clear, repeatable way of demonstrating capability and improvement.

Designing and running tests is important, but it is only half the storey. The other half is turning those tests into a narrative that makes sense to assurance stakeholders: which severe scenarios you chose, what you set out to prove, how you measured success and what you changed as a result.

Define a small, meaningful metric set

A small, stable metric set tells you and auditors whether your severe‑scenario capability is improving over time. You do not need a dashboard of dozens of measures; a handful of well‑chosen indicators is usually enough to show whether you are on track.

For jackpot‑event continuity testing, useful metrics often include:

  • RTO and RPO achievement: – whether you recovered within the time and data‑loss objectives agreed in your BIA.
  • Time to activate: – how long it took to recognise the scenario and formally trigger your continuity or crisis plan, for example aiming to activate within a defined period after confirming the event.
  • Decision‑making speed and quality: – whether the right people were involved and key decisions were made in time, using appropriate information.
  • Communication effectiveness: – whether internal stakeholders, customers, suppliers and regulators were informed in a timely, appropriate way.
  • Control performance: – whether specific controls such as backup, failover or access management behaved as designed under stress.

A small set of metrics, chosen carefully and applied consistently, will give you a sharper view of capability and a straightforward storey for audits. It also helps you avoid chasing numbers that look impressive but do not change how you invest or prepare.

Capture evidence in audit‑ready “exercise packs”

Audit‑ready exercise packs turn raw test activity into structured evidence you can share with confidence. They also make your own internal reviews more efficient by putting everything decision‑makers need in one place.

For each jackpot test, aim to produce an exercise pack that contains:

  • the approved test plan and objectives
  • the scenario description and scope
  • attendance lists and role assignments
  • a timeline of events and “injects” used
  • logs, screenshots and similar artefacts showing key steps taken
  • test results against each success criterion and metric
  • issues and observations
  • agreed actions, owners and due dates.

When this material lives in a structured repository rather than scattered emails and slide decks, you can respond quickly to audit requests for ISO 27001 surveillance and recertification, ISO 22301 or operational‑resilience reviews, customer due diligence and internal assurance engagements. Platforms such as ISMS.online can help you keep these packs linked directly to risks, controls and policies, so your evidence remains traceable and easy to present.

Visual: a simple one‑page exercise summary template with sections for scenario, objectives, timeline, metrics, key findings and agreed actions, which you can reuse across different tests and audits.

You also build institutional memory. New joiners and future leaders can see how the organisation performed under stress, not just what documents say should happen. That history strengthens your credibility with both internal and external stakeholders and supports more confident conversations with auditors who want to see evidence of learning, not just activity.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




How do you turn jackpot‑event tests into continual improvement?

You turn jackpot‑event tests into continual improvement by giving every finding a clear treatment path and then re‑testing to check that changes work. ISO 27001 and ISO 22301 already provide the loops for nonconformities, corrective actions and management review. Your job is to make sure exercise findings flow through those loops instead of staying in meeting notes.

A test that reveals weaknesses but never leads to action has limited value. A test that results in clear corrective actions, updated run‑books and a follow‑up exercise shows auditors, regulators and customers that you are serious about resilience and not just box‑ticking. It also helps you demonstrate the intent of ISO 27001 Clause 10 on improvement, which expects you to learn from incidents and exercises.

From observations to corrective and improvement actions

You can move from raw observations to real improvements by classifying what you saw and attaching it to your existing risk and improvement processes. That way, nothing gets lost between the debrief room and the next management review.

After each exercise:

Step 1 – Classify findings

Separate simple observations that describe what went well from genuine weaknesses, such as missing information, unclear roles or failing controls. Positive findings still matter, but they do not usually need the same level of tracking.

Step 2 – Treatment path

Decide whether each weakness is a nonconformity against your own policies or against ISO clauses, an improvement opportunity or a consciously accepted risk. In regulated sectors, you may need to show that certain issues are treated as formal nonconformities with clear corrective actions.

Step 3 – Structured actions

Log each item with an owner, a due date and a link to the relevant risk, control or document so it cannot be lost between meetings. Use your ISMS or BCMS tooling rather than separate trackers wherever possible so everything stays in one governance system.

Step 4 – Track to closure

Include actions in your regular risk and improvement reviews, and update their status until they are complete rather than treating exercise reports as static documents. Tie significant findings to formal risk entries and, if relevant, to your Statement of Applicability so it is easy to show the chain from scenario to finding to change.

This disciplined approach means that when auditors ask how you identified and treated particular risks, you can point to concrete examples rather than relying on anecdote. It also helps senior leaders and boards see that jackpot‑event testing is part of a continuous improvement loop, not an occasional “war game”.

Re‑testing and programme‑level learning

Re‑testing and periodic review help you see whether your organisation is genuinely getting better at handling jackpot events. Improvement is less about running more exercises and more about showing that your capability curve is bending in the right direction.

For serious gaps, plan explicit re‑tests:

  • repeat the same scenario once changes are implemented
  • or run a variant that stresses the same capability in a slightly different way.

At programme level, step back every year or two and ask yourself questions such as:

  • Are you seeing the same classes of issue repeatedly, such as weak communication or unclear decision rights?
  • Do your scenarios still reflect your current architecture, suppliers and regulatory obligations?
  • Are you improving at the speed your risk appetite and regulators require?

Use the answers to adjust your testing calendar, investment priorities and training focus. Over time, you should see fewer repeated issues, faster closures and more confidence from stakeholders that severe scenarios are being managed in a disciplined way rather than as occasional exercises with no follow‑through.




How do you bring all of this together in one place?

You bring everything together by using a single, structured environment to connect risks, scenarios, plans, tests and actions. Jackpot‑event testing touches many moving parts: risk assessment, BIA, continuity plans, incident response, technical run‑books, test plans, logs and action trackers. When these live in different tools and shared folders, people waste time chasing information and auditors see an inconsistent picture. Consolidation makes severe‑scenario work feel like part of normal governance rather than a special project.

A unified environment also improves resilience between people moves. When key individuals leave or roles change, well‑structured content and evidence remain accessible and understandable, instead of disappearing into personal drives or unread presentations.

What a good platform should give you

A dedicated ISMS or integrated ISMS/BCMS platform should make jackpot testing part of everyday practice, not a separate exercise owned by one team. The aim is to connect your governance spine, scenarios, exercises and evidence in a way that is easy to run and easy to explain to auditors, regulators and senior leaders.

Whether you use an ISMS‑specific platform such as ISMS.online or another toolset, look for the ability to:

  • link risks, controls, assets, services and scenarios in one model so you can see how a jackpot event flows through the organisation
  • store BC and incident run‑books alongside ISO 27001 and ISO 22301 documentation, with clear version control and approvals
  • plan and schedule exercises with clear ownership, approval routes and a visible testing calendar
  • attach evidence directly to test records, such as logs, screenshots, minutes and decisions, so you are not hunting through inboxes at audit time
  • track findings and corrective actions through to closure, with status visible to management and easy to report
  • generate audit‑ready reports that show exactly how jackpot scenarios are identified, tested and improved.

ISMS.online, for example, is designed to give you a single source of truth for ISO 27001 and related frameworks. Jackpot scenarios then become just another well‑governed risk category rather than a special project in an isolated spreadsheet, and your teams can spend more energy on good scenario design and follow‑through. Whether you use ISMS.online or another platform, the pattern is the same: connect governance, scenarios, tests and actions so that severe‑event resilience is part of your normal management system.

A pragmatic next step

A pragmatic next step is to prove the pattern once end‑to‑end on a single scenario and then scale it gradually. You do not need a full programme to start improving; you just need one well‑chosen test that runs all the way from risk identification to re‑test.

If you want to move from theory to practice without overwhelming your organisation:

  1. Pick one or two jackpot scenarios that genuinely worry you.
  2. Map them into your ISMS and BCMS artefacts – risk register, BIA and plans.
  3. Design a modest test such as a cross‑functional tabletop with clear objectives and evidence requirements.
  4. Run the exercise, capture what happens and agree a handful of concrete actions.
  5. Store everything in one structured workspace, ideally a dedicated ISMS/BCMS environment such as ISMS.online, so you can show exactly what you did.

Once you have proven that pattern end‑to‑end, you can expand the scenario set, refine your metrics and build a multi‑year testing roadmap. Over time, jackpot events stop being an abstract fear and become a well‑governed part of your ISO‑aligned resilience programme. That leaves you better placed to answer tough questions from regulators and customers and more confident that your organisation can cope when several bad things happen at once.

Book a demo



Frequently Asked Questions

How should you treat “jackpot events” inside an ISO 27001 ISMS and BCMS?

You should treat jackpot events as named, high‑impact risks that run through your normal ISO 27001 and (where used) ISO 22301 lifecycle, not as vague edge cases parked outside your ISMS. They sit at the extreme end of your existing risk spectrum and deserve explicit owners, treatments and tests.

What makes a jackpot event different from a normal “bad day”?

Most incidents hit a single system, team or supplier and can be contained with familiar playbooks. A jackpot event tends to combine three things at once:

  • Multiple failures in parallel: – for example, a primary cloud region outage, a major SaaS failure and key staff or a service partner unavailable on the same day.
  • Longer duration than planned for: – normal work‑arounds start to fray, SLAs are breached, and secondary risks emerge.
  • Tight coupling across services and suppliers: – so one fault cascades rapidly across applications, teams and locations.

A simple litmus test many CISOs and continuity leads use is:

If this scenario goes badly, could we lose our licence to operate, breach regulation or lose our anchor customers?

If the honest answer is yes, you are dealing with a jackpot scenario, not just a rough morning.

Under ISO 27001 you do not need a new category for this. You should:

  • create explicit risk entries in your ISO 27001 risk register for these scenarios (Clause 6), with clear owners and treatments
  • reflect them in your business impact analysis and continuity strategy if you operate ISO 22301
  • turn them into testable objectives, so leadership decisions and cross‑team coordination are rehearsed, not improvised.

That discipline turns “nightmare scenarios” into managed risks you can explain to auditors, regulators, your board and major customers.

Where exactly should jackpot events live in ISO 27001 and ISO 22301?

You can anchor severe scenarios cleanly in clauses you already work with:

  • ISO 27001 Clause 4 – Context and interested parties:

Record the structural exposures that make jackpots credible: cloud or data‑centre concentration, reliance on single identity providers, critical‑infrastructure status, strict uptime guarantees or operational‑resilience rules. This explains why particular scenarios are in scope.

  • Clause 6 – Information security risk assessment and treatment:

Register your worst credible scenarios as high‑impact risks. Use scenario‑based, qualitative scales (“rare but catastrophic”) rather than pseudo‑precise frequencies, and link treatments across architecture, supplier strategy, drills and governance.

  • Clause 8 – Operation:

Ensure incident, disaster‑recovery and business‑continuity procedures name your top jackpot scenarios, not just single‑system failures. Run‑books, test plans and change records should show how you expect to behave when several things go wrong at once.

  • Clauses 9 and 10 – Performance evaluation and improvement:

Treat severe‑scenario exercises as inputs to internal audit, management review, nonconformities and corrective actions. Plan re‑tests to prove that changes from previous exercises are embedded.

If you also use ISO 22301:

  • bring jackpot scenarios into your business impact analysis, continuity strategy and exercising programme
  • show a consistent chain from context → risk → impact → strategy → plans → tests → improvement for a small number of high‑impact events.

Using a single environment such as ISMS.online makes this much easier. You can hold jackpot risks next to other ISO 27001 risks, link them to BIAs, continuity plans and exercises, and store evidence in one place. That way, worst‑day planning becomes part of your normal ISMS/BCMS work, not a separate thought experiment that only lives in slides.


How can you design realistic jackpot‑event tests without putting production at unacceptable risk?

You design safe, realistic jackpot‑event tests by starting from your most critical services, agreeing “worst credible” scenarios, and selecting exercise types that stress decision‑making and controls without exceeding your risk appetite.

How do you define “worst credible” jackpot scenarios for your key services?

Start with the services you genuinely cannot afford to lose for long, for example:

  • revenue‑critical platforms such as trading, payments, reservation or fulfilment systems
  • life, safety or clinical‑care systems
  • customer and workforce identity and access services
  • core regulatory, settlement or reporting services.

For each, map three elements:

  • Intolerable harm: – the lines you cannot cross: extended outage, serious safety implications, specific regulatory breaches or significant contract penalties.
  • Critical dependencies: – concrete cloud regions, data stores, network paths, third‑party platforms and specialist roles the service relies on.
  • Credible combinations of failure: – realistic multi‑factor events for your environment, such as “primary cloud region loss plus long‑running storage incident” or “identity provider outage during a large password reset”.

Then shape two or three plain‑language jackpot scenarios per service. A useful pattern is:

If <service> experiences <these combined failures> for <this duration>, we must maintain at least <this minimum level of service> within <this time>.

That structure keeps your test design tied to business outcomes and RTO/RPO commitments rather than simply simulating dramatic technical outages.

Which exercise styles give you realism without dangerous stunts?

You can increase realism gradually instead of jumping straight to full failovers:

  • Tabletop exercises: – cross‑functional walk‑throughs where you explore the scenario, clarify roles, escalation paths and decisions. They are low risk and excellent for testing leadership behaviour.
  • Walkthroughs and simulations: – step‑throughs of critical technical actions in non‑production or carefully controlled environments, to check that run‑books are usable at real speed.
  • Targeted drills: – focused tests of individual controls (backup restore, DNS change, authentication fallback) in sandboxes or narrow production slices.
  • Partial or parallel failovers: – diverting a small, carefully chosen proportion of traffic to secondary paths with a clear rollback plan.
  • Full failovers: – moving all traffic to contingency paths when you already have good monitoring, governance and a track record from smaller tests.

Any test that might touch production should be run as a formal change, consistent with ISO 27001 and ISO 22301 expectations:

  • complete a change/risk assessment for the exercise
  • set explicit abort criteria and name the person authorised to stop the test
  • avoid peak usage periods and other known high‑risk windows
  • make sure the right technical and business decision‑makers are available throughout.

If you use ISMS.online, you can link each scenario to its risk entry, change record, test script, evidence and improvement actions. That gives you a repeatable pattern for jackpot‑event testing and clear alignment with your ISMS and BCMS, without needing unsafe “chaos” experiments in production.


Which ISO 27001 and ISO 22301 requirements are most important when you plan jackpot‑event scenarios?

The requirements that matter most are the ones that shape how you understand your context, assess extreme risks, operate continuity controls and prove improvement. You do not need extra standards; you need to ensure your worst credible scenarios run all the way through the ones you already follow.

Which ISO 27001 clauses should you emphasise for severe scenarios?

Five areas are especially helpful:

  • Clause 4 – Context of the organisation and interested parties:

Describe the external and internal factors that make jackpot scenarios relevant: concentration on a single cloud provider, cross‑border data flows, regulatory uptime obligations, or dependence on a small number of critical vendors.

  • Clause 6 – Risk assessment and treatment:

Adapt your method so it can sensibly handle low‑likelihood, high‑impact events. That usually means:

  • using structured scenario descriptions instead of brittle numeric frequency estimates
  • applying qualitative impact bands such as “serious”, “major”, “catastrophic”
  • defining treatments that span technology, people, contracts and drills.
  • Clause 8 – Operation:

Ensure your operational procedures and continuity plans explicitly reference your severe scenarios, not just isolated component failures. Severe events should drive real exercises with clear objectives and success criteria.

  • Clause 9 – Performance evaluation:

Decide in advance how you will judge readiness and performance for jackpot events: RTO/RPO results, time to invoke plans, quality of cross‑team communication, control behaviour under stress.

  • Clause 10 – Improvement:

Make sure findings from severe‑scenario tests appear as nonconformities, corrective actions and planned changes, and that you re‑test to confirm they are effective.

Relevant Annex A controls (backup, redundancy, logging, monitoring, supplier relationships, capacity management, access control, ICT readiness for business continuity) give you practical hooks for turning these scenarios into concrete design and testing work.

How does ISO 22301 help you make jackpot planning more robust?

If you run a formal BCMS, ISO 22301 adds useful structure:

  • Business Impact Analysis (BIA): – model how complex multi‑service or multi‑site outages affect each critical process over time, and which thresholds (financial, safety, regulatory) matter most.
  • Continuity strategies: – choose combinations of technology, manual work‑arounds and contractual arrangements that still hold when more than one assumption fails.
  • Exercises and tests: – plan a mix of exercises where the scenario and objectives clearly trace back to your jackpot risks and BIAs.

The organisations that impress auditors and regulators can show a simple, repeatable chain from context and risk through impact and strategy to plans, exercises and improvement actions for their severe scenarios.

Using ISMS.online to manage ISO 27001 and ISO 22301 together makes that chain easier to demonstrate. You can link each jackpot risk to its BIAs, strategies, continuity plans, test records and corrective actions, and retrieve that storey in minutes when a board member, customer or auditor asks how you are preparing for very bad days.


How often should you test jackpot‑event scenarios, and what evidence actually convinces auditors and boards?

Most organisations benefit from at least one significant jackpot‑event exercise each year for their most critical services, supported by more frequent targeted drills. The key is that your schedule matches your risk profile, pace of change and regulatory expectations, not a generic “annual test” rule.

How can you choose a test frequency that reflects your real risk?

A pattern that works well in many sectors is:

  • Annually: run at least one cross‑team jackpot‑event exercise focused on your highest‑impact services. The goal is to stretch decision‑making, supplier management and communications, not to cause production disruption for its own sake.
  • Quarterly or twice a year: run narrower drills on specific technical or procedural controls – for example, backup restore, DNS changes, authentication fallbacks, emergency communication routes – so these capabilities remain sharp.
  • After major change: plan event‑driven tests when there are significant architecture changes, supplier switches, mergers, or new regulatory obligations.

If you fall under operational‑resilience regimes or critical‑infrastructure rules, you may be required to test more often, or against specific scenarios defined by regulators. Even then, you should be able to explain:

  • how your pattern of exercises aligns with the risks you documented in Clause 4 and Clause 6
  • how often you review and adjust the programme in management reviews and internal audits
  • where real incidents have led to changes in your testing plan.

Recording this rationale explicitly in your ISMS or BCMS policies makes it easier to show auditors that your exercise schedule is a deliberate, risk‑based decision rather than habit.

Which measures and artefacts make your readiness storey credible?

Instead of measuring everything, focus on a small, stable set of indicators that answer three questions: Did we achieve our objectives? Where did we struggle? What changed afterwards?

Useful metrics include:

  • RTO and RPO performance: for key services during each jackpot‑event test
  • time to recognise the scenario: and formally invoke plans
  • time to assemble decision‑makers and agree first‑wave actions:
  • timeliness of notifications: to customers, regulators and internal stakeholders against specific obligations
  • number and severity of issues: found, the percentage of actions closed on time and whether those fixes were successfully re‑tested.

Behind the numbers, auditors and boards will look for tangible evidence:

  • clear test scopes and objectives
  • attendance and role lists
  • logs, screenshots, monitoring outputs and change records
  • debrief minutes and action trackers linked to specific risks and controls.

If you manage these artefacts in ISMS.online, you can move quickly from a high‑level dashboard to the underlying detail. That ability to show both the overview and the evidence gives boards, regulators and customers confidence that your jackpot‑event work is a disciplined resilience programme, not a once‑a‑year fire drill.


What common failure patterns emerge in jackpot‑event tests, and how can ISO 27001 help you close them?

Severe‑scenario exercises often reveal that written plans look stronger than real‑world behaviour. ISO 27001 gives you the structure to turn those insights into improvements that stick, instead of repeating the same weaknesses each time you test.

What weaknesses do organisations repeatedly discover in hard tests?

Across different industries, similar themes appear:

  • Hidden assumptions that break under stress: – for example, plans that assume specific staff are always available, that certain suppliers will respond within a given time, or that failures are isolated rather than multi‑service or multi‑region.
  • Unclear ownership for jackpot planning: – no named individual or group accountable for designing, prioritising and approving severe‑scenario tests, so they only happen when one champion pushes them.
  • Plans that are hard to use in the moment: – long, generic continuity documents stored in scattered locations, leading teams to improvise rather than follow structured steps.
  • Weak recording of what happened: – exercises run informally, with key decisions and lessons buried in chat channels, making it hard to show auditors what changed as a result.
  • Poor follow‑through on actions: – debrief findings that do not become logged nonconformities or funded work, so the same issues appear in every major exercise.

Recognising these patterns is valuable because it tells you exactly where to strengthen your ISMS and BCMS.

How does an ISO 27001‑aligned ISMS help you turn findings into durable resilience?

ISO 27001 gives you a governance spine for jackpot‑event readiness:

  • Risk assessment and Statement of Applicability (Clause 6 and Annex A):

When your worst scenarios are documented as risks with controls, owners and treatments, they gain visibility in decision‑making. It becomes easier to argue for architecture changes, supplier diversification or test investments because they are visibly anchored in your risk register and SoA.

  • Operational controls and procedures (Clause 8 + Annex A):

Controls for backup, redundancy, access, logging, monitoring, change and supplier management, and ICT readiness for business continuity shape how severe events unfold. By designing tests that deliberately exercise these controls together, you move from “control exists on paper” to “we have seen this control work – or fail – under realistic stress”.

  • Performance evaluation and improvement (Clauses 9 and 10):

When you feed jackpot‑event results into internal audits, management reviews, nonconformities and corrective actions, you ensure that findings lead to funded, owned improvements. Planned follow‑up tests confirm those changes, and management reviews track progress over time.

Running this within a platform such as ISMS.online makes the mechanics far less demanding:

  • jackpot‑event risks sit alongside everyday ISO 27001 risks with mapped controls and owners
  • continuity and incident plans live with approvals and version history, so teams test against a single, current source
  • exercise scopes, evidence and debriefs are captured in structured records
  • improvements and nonconformities link directly to specific risks and controls, with re‑test dates.

That combination of structure and traceability helps CISOs, privacy officers and practitioners demonstrate to boards and regulators that their worst‑day readiness is systematic and improving, not dependent on a few individuals’ memory or enthusiasm.


How can ISMS.online simplify planning, running and evidencing jackpot‑event continuity tests for your organisation?

ISMS.online can simplify jackpot‑event work by giving you one place to define scenarios, align them with ISO 27001 and ISO 22301, coordinate exercises and keep all related evidence and actions together. That turns severe‑scenario testing from an occasional side project into part of everyday governance.

How does ISMS.online support end‑to‑end management of jackpot scenarios?

In practical terms, your team can use ISMS.online to:

  • Capture jackpot risks: alongside other ISO 27001 risks, including clear scenario descriptions, impact assessments, owners, mapped Annex A controls and agreed treatments.
  • Maintain continuity and incident plans: with approvals and version history, so people always work from the latest agreed version in tests and real events.
  • Plan exercises as structured projects: , with linked tasks, objectives, scenarios, scripts and supporting artefacts such as diagrams, data‑flow maps and contact trees.
  • Attach evidence as exercises run: – logs, screenshots, monitoring outputs, decisions and minutes can all sit against the test record rather than being scattered across drives and chats.
  • Log findings and corrective actions: directly into your improvement workflow, linked to specific risks and controls, and schedule re‑tests so you can demonstrate closure.

For CISOs and senior leaders, this creates a single, coherent view of jackpot‑event readiness. For practitioners and privacy officers, it removes a lot of manual admin and makes repeat exercises easier to design and run.

How does this strengthen the storey you tell to boards, auditors and regulators?

From an assurance standpoint, ISMS.online helps you present a joined‑up picture that aligns with how decision‑makers think:

  • you can show a clear thread from organisational context and risk, through controls, plans and exercises, to lessons learned and improvements
  • you can answer detailed questions about specific scenarios quickly, because scope, evidence and actions are stored together
  • you can demonstrate progress over time on your most important jackpot scenarios, not just claim that “we test resilience annually”.

If you are early in this work, a practical starting point is to choose one flagship jackpot scenario – for example, a long‑running outage in a critical cloud region affecting your main customer‑facing service – and model it in ISMS.online from end to end: risk entry, mapped controls, continuity plans, planned exercise, evidence and improvement actions.

Once you have seen how that structure makes planning, running and evidencing the test easier, it becomes natural to extend the pattern. That is how you move from hoping you would cope on your worst day to being able to show, calmly and confidently, that you have prepared, rehearsed and can prove it when it matters most.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.