Request a Demo

The Noggin Platform

The world’s leading platform for integrated safety & security management.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • Emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • Emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
Guide

10 Steps to an Effective Crisis Management Plan

Read the Guide
Noggin - 10 Steps to an Effective Crisis Management Plan THUMBNAIL - 2022
Article

The Stages of Crisis: Understanding the Crisis Management Lifecycle

Read the Guide
crisis_decisionmaking_400x236
eBook

Understanding ISO 22361 for Crisis Management

Read the Guide
Guide to ISO 22361_Thumbnail
eBook

Best Practice Strategies to Maintain Resilience

Read the Guide
Noggin - Best-Practice Strategies to Maintain Resilience amidst Complex Disruptions - 2022
NEWS

Technology expert's tips for safety management platforms

Read the Article
Male factory worker and supervisor are analyzing plans
NEWS

A Comprehensive Guide to Understanding ISO45001

Read the Article
Incident Commander image_Noggin AFR feature

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More

What is Critical Event Management?

Definitions, Benefits, and What to Look For

Critical events have become increasingly disruptive facts of corporate life. A recent Forrester report documented that all companies experienced a critical event in the last two years. In fact, many dealt with multiple incidents, the average being more than four discrete critical events in a two-year period.

The critical events themselves can run the gambit: severe weather, intellectual/physical property theft, IT failure, cyber attacks, even slower boil critical issues that when left unattended spiral into major incidents. The costs of inaction or poor preparation, though, remain steep, lost productivity, eroded corporate reputation, supply chain instability, and lower revenue. So what, then, are the most effective means of counteracting the critical event threat? All indicators point towards an integrated method of rapid enterprise incident response. And that’s the provenance of critical event management.

Defining Critical Event Management (CEM)

As a concept and practice, the nascent field of critical event management bears some definition, especially since critical event is simply a catchall term for a disruptive incident of extreme consequence. Critical event management practitioners will say that their field offers thought-through measures to ensure effective critical issues and crisis preparation, response, and recovery, and thus borrows generously from techniques in incident management and response, crisis management, business continuity planning, and emergency management.

The unique intervention of critical event management, however, is that it’s conceived foremost as an integrated, or cross-functional, all-hazards practice. That means a large part of the work of critical event management practitioners is aligning a wide range of resources from across the entire business to respond to disruptive incidents; this work includes regrouping stakeholders from multiple, relevant business lines, improving inter-departmental (or multi-stakeholder) coordination and communication flows, integrating necessary processes, and post-hoc reporting and analysis.

How to know if this integrated, critical event management approach makes sense for your business? Well, it’s pretty simple. Critical incidents might sprout up in one line of the business, but they rarely stay put. The damage spreads; and it spreads quickly.

The role of technology in responding to critical events

Indeed, individual departments do invest heavily in advanced technologies as well as undertake extensive planning cycles to anticipate and respond to likely critical threats (within their business unit). However, those efforts remain largely siloed, when, in fact, a pre-planned, integrated response would prove a far more effective means for the enterprise as a whole to deal with a critical event.

What’s more, incident management siloing, whether in a business line or IT, isn’t just a less good alternative, it can actually be counterproductive. Siloing not only hinders the eventual response – when teams who lack a common operating framework are forced to work together – but also compromises the effectiveness of critical event preparedness efforts, which rely on developing a full threat picture across the business. They’re other downstream consequences of not integrating critical event management, too, such as procurement redundancies for management tools, as well as the likelihood that without a common approach, existing tools will be implemented unevenly in pockets of the organization.

On the other hand, integrated, critical event management has enormous upside. Advanced critical event management platforms enable effective, interdepartmental communication, give teams a dynamic, consolidated view of threats, automated functionality to assess and respond to those threats, as well as information capture capabilities for critical event reporting. Other business benefits include greater operational efficiency (from fewer system and process redundancies), reduced costs, and better situational awareness and response visibility (for business leaders). And, of course, the ultimate goal of integrated, critical event management: to improve your organization’s ability to keep its employees and customers safe.

Critical Event Management (CEM) platform features to consider

Finally, since the field is relatively new, you might not know where to turn. So if you’re in the market for a critical event management platform, here are some key software platform features to consider:

    • Critical issue and crisis management. Record and share information about any issue or crisis, with dashboards summarizing the situation, impact, response, actions, media, and talking points.
    • Integrated, secure chat. Secure chat functionality allows teams to collaborate quickly on every issue or crisis.
    • Update logs. Post updates on every issue or crisis, to keep teams informed throughout the critical event lifecycle.
    • Action tracking. Quickly and easily add issue actions as a simple checklist or assign each action and add more details.
    • Impact and trend Indicators. Impact and trend indicators to monitor current and potential impacts and see at-a-glance if situations are improving or worsening.
    • Track duration and resolution times. Duration and resolution timers to clearly monitor how long each issue has run for and when it will be resolved.
    • Crisis and BCP contacts. Manage crisis teams, business continuity stakeholders, and other contacts all in one place.
    • Crisis management plans. Quickly select from a series of pre-configured crisis management planning templates, or upload and enact your own customized plans.
    • Template library. Select from a library of pre-configured, customizable crisis response planning templates and quickly enact them when needed.
    • Crisis team stand up. Set up and activate any team via push notifications. Easily view who’s responded to a team activation and who’s currently acting in every role.
    • Reputation monitoring. Monitor the conversation about your brand and the reputational impact of a critical issue or crisis. Track the volume of, sentiment behind, and engagement with your social media posts alongside your crisis timeline, actions, and updates
    • Security Certified. Hosting in ISO27001 and SOC2 compliant data centers. All data is encrypted in transit using TLS v1.2 with data sovereignty provided within the US, Australia, and Europe.

Sources:
Tech Republic, How to Speed up Cyberattack Recovery with Critical Event Management
Forrester: Take a Unified Approach To Critical Event Management
EMA Research: From Incident Management to Critical Event Management

---

For more great resources from Noggin, visit our Resources Center