Request a Demo

The Noggin Platform

The world’s leading platform for integrated safety & security management.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
A guide to developing your covid-19 return to work plan
Whitepaper

Developing Your COVID-19 Return to Work Plan

Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More

14 Core Features of the Incident Command System (ICS)

If you’re involved in emergency management in the U.S., you’ve probably heard of the Incident Command System (ICS). A key feature of the U.S. National Incident Management System (NIMS), ICS is an operational incident management structure that provides a standardized approach to the command, control, and coordination of emergency response in the U.S.

Since it first came out in the 1970s, the system has been so popular that it’s inspired the development of new, comparable models around the world (see: the Australian Inter-Service Incident Management System). So, the question is, what makes ICS such a durable success in all-hazards disaster response, especially given the fact that the system was originally conceived of as fire suppression-specific command structure? If we can hazard a guess, it’d be that ICS’ 14 essential features continue to be extremely apt to incident response, both in emergency and non-emergency situations. Let’s take a closer look at the features themselves:

First of all, each of the 14 core principles underpinning ICS is clustered around one of a handful of categories or types: standardization, command, planning and organizational structure, facilities and resources, communications and information management, and professionalism. And these larger categories speak directly to the operational errors (in large-scale, inter-agency emergency response) that ICS was originally created to redress:

    • Lack of common organization
    • Poor on-scene and inter-agency communications
    • Inadequate joint planning
    • Lack of valid and timely intelligence
    • Inadequate resource management
    • Narrow prediction capability

Now, if we examine the features themselves, we’ll get an even clearer understanding of ICS’ original aims:

    1. Use of a common terminology to define organizational functions, incidents, facilities, resource descriptions, and position titles.
    2. Establishment and transfer of command, meaning command must be clearly established from the outset of the incident. Command should only be transferred after a briefing that captures all essential information for continuing safe and effective operations.
    3. Chain and unity of command clarifies reporting relationships, eliminates confusion, and ensures that Incident Managers are able to control the actions of all personnel under their supervision. Chain of command, in particular, refers to the orderly line of authority within the ranks of the incident management organization. Meanwhile, unity of command means that every individual has a designated supervisor to report to at the scene of the incident.
    4. Unified command enables agencies with different legal, geographic, and functional authorities and responsibilities to work together effectively under individual agency authority, responsibility, or accountability.
    5. Management by objectives includes establishing overarching objectives, developing strategies based on incident objectives, developing and issuing assignments, plans, procedures, and protocols, establishing specific, measurable objectives for various incident management functional activities and directing efforts to attain them, in support of defined strategies, and finally documenting results to measure performance and facilitate corrective action.
    6. A modular organization is based on the size and complexity of the incident, as well as the specifics of the hazard environment created by the incident.
    7. Incident action planning offers a coherent means of communicating the overall incident objectives in the context of both operational and support activities.
    8. Manageable span of control prescribes a span of control that ranges from three to seven subordinates for any one individual.
    9. Incident locations and facilities establishes operational support facilities (e.g. incident command posts, bases, camps, staging areas, mass casualty triage areas, etc.) in the vicinity of the incident.
    10. Comprehensive resource management stipulates accurate, up-to-date accounting of resource use.
    11. Integrated communications calls for the development and use of a common (incident) communications plan and interoperable communications, processes, and structures.
    12. Information and intelligence management establishes a process for gathering, analyzing, sharing, and managing incident-related information and intelligence.
    13. Effective accountability is considered essential during incident operations; therefore, the following principles must be adhered to: check-in, incident action plan, unity of command, personal responsibility, span of control, and real-time resource tracking.
    14. Dispatch/deployment means that personnel and equipment should only respond when requested or when dispatched by the appropriate authority.

Of course, there’s much more to ICS than its 14 animating features, but understanding those principles is key to comprehending the sustained success of the system. 

---

For more great content from Noggin, visit our Resources Center.