I am surprised that people haven't noted that you can and should encrypt the verifier in the db. Typically with large firms the databases are segregated infrastructure. The backup regime of the database servers is also usually deliberately different than the host level backups of the applications servers and web infrastructure. Db backups are usually offsite and on tape with a long retention period. There are also typically different specialists and teams looking after the db infrastructure and backups. When this the case then encrypting the verifier is obviously additional protection from the tapes getting lost by the courier firm moving them offsite.
If you encrypt the verifier then there is the question of where you hold and backup the encryption keys. Large firms like banks have had to solve this problem for their SSL keys and passwords along with other sensitive security configuration. They won't put them onto the same tapes as the db backups. Typically they would have a segregated security network which can manage the front line hosts and have have two hosts (or two dedicated NFS heads) in two data centres on that network mirrored by unison/rsync to backup a copies of the encryption keys and security configuration.
Putting all that together you should have a secure config location or share on the application servers which is excluded from host level backups. Into that location you put a symmetric key read only to your application server user id. The application then uses that to encrypt/decrypt the users SRP verifier as it is saved/loaded to the main db. The keys you backup on segregated hosts in each data centre. If you loose absolutely everything then you rebuild your db from offsite tapes and create a fresh symmetric key. All your uses will no longer be able to login but will simply use your password reset logic to set a new verifier.