Request a Demo

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • Emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • Emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
Resource 4
Whitepaper

A Comprehensive Guide to Understanding ISO45001

Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More

Get to Know the JESIP Joint Doctrine

Starting with the Incident Command System (ICS) in the late 1970s, major incident command, frameworks have emerged to tackle the challenges associated with multi-agency cooperation in emergency response. One such framework is the JESIP Joint Doctrine. What’s this framework all about? 

The JESIP Joint Doctrine and the importance of interagency working

For starters, the JESIP Joint Doctrine, as the name suggests, is all about interagency working. Why’s that?

Well, inter-service cooperation, in the context of major incident response, is rarely simple, with responding agencies bringing their own competencies, experiences, systems, and terminology.

Without previously agreed upon terms of engagement, melding everything together becomes well-nigh impossible. And JESIP provides one such way to meld everything together.

The JESIP Joint Doctrine and principles for joint working

JESIP itself is the governing interoperability framework in the U.K., standardizing how multiple agencies work together during the full lifecycle of an incident.

Not just that. The JESIP Joint Doctrine, as its practitioners note, has outgrown its initial focus on simply improving multi-agency response. Nowadays, it also provides a framework of joint working that can be applied to any type of multi-agency incident, including planned events.

What then are some of its key principles?

The most important principle outlines how multiple agencies can work together jointly, in all phases of an incident, irrespective of scale and whether the incident was spontaneous or pre-planned.

JESIP principles for joint working include:

Principle 1: Co-locate

Co-locate with other responders as soon as practicably possible at a single, safe, and easily identified location.

Benefits of co-location include improved communication and understanding that support joint working.

Co-location supports responders to jointly agree upon objectives and develop a coordinated plan to effectively resolve an incident.

Principle 2: Communicate

Communicate using clear language, free from technical jargon and abbreviations.

Meaningful and effective communication between responders and responder organizations underpins effective joint working.

The “talk not tell” process involves control room personnel passing information and asking other organizations what their response to the incident will be. This is achieved by:

  • Sharing information from all available sources along with immediate resource availability and decisions
  • Nominating a point of contact in each control room and establishing a method of communication between all of them
  • Co-ordinating the setting up of multi-agency interoperable voice communications for responders and operational working if necessary

Principle 3: Co-ordinate

Co-ordinate by agreeing on the lead organization. Identify priorities, resources, capabilities, and limitations for an effective response, including the timing of further meetings.

Co-ordination involves control rooms and responders of all levels discussing the available resources and activities of each responder organization, agreeing to priorities, and making joint decisions throughout the incident.  

Co-ordination underpins joint working by avoiding potential conflicts, preventing duplication of effort, and minimizing risk.

For effective co-ordination, however, one organization generally needs to take a lead role. To decide who the lead should be, factors such as the phase of the incident, the need for specialist capabilities and investigation, during both the response and recovery phases should be considered.

An Introductory Guide to JESIP Principles - Download Now

Principle 4: Jointly understand risk

Jointly understand risk by sharing information about the likelihood and potential impact of threats and hazards, to agree upon appropriate control measures.

By jointly understanding risks and their associated mitigating actions, organizations can promote the safety of responders and reduce the impact that risks may have on members of the public, infrastructure, and the environment.  

But as different responder organizations may see, understand, and treat risks differently, each organization should carry out their own risk assessments, then share the results, so that they can plan control measures and contingencies together more effectively.

Individual dynamic risk assessment findings may be used to develop the analytical risk assessment for the incident.

Principle 5: Shared situational awareness

Establish shared situational awareness by using M/ETHANE and the Joint Decision Model.

Shared situational awareness is a common understanding of the circumstances, immediate consequences, and implications of the emergency, along with an appreciation of the available capabilities and the priorities of the responder organizations.

Achieving shared situational awareness is essential for effective interoperability. And establishing shared situational awareness is important for developing a Common Operating Picture (COP) at all levels of command, between incident commanders, and between control rooms.

Communications between control rooms greatly assists the creation of shared situational awareness in the initial stages and throughout the incident.

Of course, those principles don’t scratch the surface of what JESIP is all about. To find out more, especially the meaning and import of the M/ETHANE acronym, download our Introductory Guide to JESIP Principles and Supporting Systems.

 An Introductory Guide to JESIP Principles - Download Now