Request a Demo

The Noggin Platform

The world’s leading platform for integrated safety & security management.

Learn More
Find Your Solution
  • Crisis management Crisis Management
  • emergency Management Emergency Management

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Safety Management Safety Management
  • Employee Health & Wellbeing Employee Health & Wellbeing
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Asset Management Asset Management
  • Contractor Management Contractor Management
  • Visitor Management Visitor Management
  • emergency Management Emergency Management

All the tools needed to automate your safety management system in one easy-to-use platform, following ISO standards. Increase efficiency with powerful automation capabilities and provide real time insights to all levels of your business. Configurable notifications, workflows, analytics, and mapping empower your safety personnel to make better decisions wherever they are.

Learn More
Request a Demo

Maintain a comprehensive view of the wellbeing of your workers, their needs, and the wellbeing initiatives conducted in your organization. Through various assessments, checks, analytics, and resources you can easily manage both the physical and mental wellbeing of personnel across various locations and programs.

Learn More
Request a Demo

A suite of tools to collect risk data from across your organziation from a range of stakeholders, in real time, and based on ISO standards. Fully customisable, with everything from a simple pre-task assessment though to an organisational risk register, we make it easy to capture risk data and provide the analytics to derive rich insights, to keep your organisation safe and compliant.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilisation, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo
  • Physical Security Physical Security
  • Cyber Security Cyber Security
  • Visitor Management Visitor Management
  • Critical Infrastructure Protection Critical Infrastructure Protection
  • Emergency Management Emergency Management
  • Governance Risk & Compliance Governance, Risk & Compliance
  • Asset Management Asset Management
  • Contractor Management Contractor Management

Proactively manage all aspects of physical security operations from anywhere, on any device. Based on ISO standards, streamline your operations using workflow automations to guide information capture, enrichment, follow up tasks, and notifications. Validate threats and risks to drive better investment of your resources.

Learn More
Request a Demo

Manage cyber threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions, and drive continual improvement review cycles.

Learn More
Request a Demo

Streamline visitor sign-in using a QR code on a form tailored for your organisation. Visitors can complete inductions, answer questions and acknowledge content then have notifications triggered to their host based on their responses. Once on site, manage visitor cards, broadcast notifications and understand visitor trends to optimise your processes.

Learn More
Request a Demo

Consolidate the threat and risk picture across all your assets, easily demonstrate compliance with security obligations, and gain an ‘all threats’ perspective encompassing physical, cyber, personnel and supply chain. Address and manage cyber threats without having to implement costly new ICT systems and drive continuous improvement and review cycles.

Learn More
Request a Demo

All the information and tools needed to manage any incident effectively through the entire lifecycle of mitigation, preparedness, response, and recovery, following ISO, ICS and other national standards. Keep your whole team following the same plans, communicating on the same platform, and viewing the same operating picture - from any place or device.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Track all your assets from your vehicle fleet, fixed or mobile plant and equipment though to your critical infrastructure using our range of tools. Plan maintenance ahead of time and by collecting lead indicator data from checklists and assessments on any mobile device, then enable users to update the status of your assets to track utilization, share documentation and report issues.

Learn More
Request a Demo

Save time and money by enabling contractors to self-register and progress through a customizable workflow, to check documentation before becoming an approved contractor. Contractors can then be automatically followed up using workflows and notifications to keep their organziation compliant.

Learn More
Request a Demo
  • Business Continuity Planning Business Continuity Planning
  • Crisis Management Crisis Management
  • Governance Risk & Compliance Governance, Risk & Compliance (GRC)
  • Continuity of Operations Continuity of Operations (COOP)

Follow ISO standard approaches to determine disruption impacts and develop plans & recovery strategies to address risks. Track gaps, dependencies and tests, capture exercises, and manage insurance details. Scale up to any incident and back down to business as usual as quickly as possible and drive continuous improvement.

Learn More
Request a Demo

Apply best practices to plan for, respond to, and manage critical events and exercises. Built on ISO standards, you can respond faster with better collaboration using plans and playbooks, smart workflows, and real-time dashboards and insights, to ensure better incident response, decision-making, and continuous improvement.

Learn More
Request a Demo

Manage cyber, emergency and security threats, risks, and treatments based on industry best-practice guidelines and ISO standards. Plan objectives and set targets, manage all elements of standards-compliance, and schedule and record audits and inspections. Manage non-compliances and corrective actions and drive continual improvement review cycles.

Learn More
Request a Demo

Ensure preparedness across your organisation. Conduct business impact assessments and quickly identify essential functions. Assess hazard and threat risks. Identify technology, assets, facilities, and critical personnel. Gather and assemble essential information and documents. Develop, test and maintain your COOP plans. From readiness and preparedness to reconstitution, manage all four phases of the Continuity of Operations Plan to minimize business loss and disruption.

Learn More
Request a Demo
A guide to developing your covid-19 return to work plan
Whitepaper

Developing Your COVID-19 Return to Work Plan

Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
Featured Article

How Australian SMEs can prepare for stricter critical infrastructure regulations

Written By James Boddam-Whetham for Dynamic Business

Article originally published in Dynamic Business, original article available here.

The Government has changed the rules: critical infrastructure assets are no longer the exclusive preserve of large corporations, and SMEs need to ensure they are compliant.

Over time, we have learned that our most vital assets are dangerously exposed to cyber-attacks and other disruptive events perpetrated by bad actors seeking to harm the national interest or simply extract steep ransoms. 

The Commonwealth Government has addressed this by pursuing reforms intended to shore up the security of the critical infrastructure sector. The Security of Critical Infrastructure Act (the Act), passed three years ago, ramped up regulatory scrutiny on the ownership and operation of assets classified as critical infrastructure. However, critical infrastructure assets were limited to certain ports, electricity, gas, and water assets. 

What qualified then as critical in the eyes of policymakers? A bigger footprint meant more importance. Critical electricity assets, for instance, comprised networks, systems, or interconnectors for the transmission or distribution of electricity to ultimately service at least 100,000 customers.

But that was before the COVID-19 crisis. If anything, the pandemic demonstrated the criticality of any number of sectors to the nation’s health and wellbeing. The surge in cyber-attacks accompanying the pandemic, often targeting these key sectors, illustrated their extreme vulnerability.

Something had to change. Policymakers took up the challenge, proposing amendments to the Act. Currently before Parliament, the Security Legislation Amendment (Critical Infrastructure) Bill 2020 will have the effect of expanding the number of regulated sectors to include banking/finance, communications, data and the cloud, defence, education, research and innovation, food and grocery, health, energy, space, transport, and water.

In many of these sectors, small and medium-sized businesses (SMEs) proliferate, along with big players. So, how can these formerly unregulated businesses prepare for myriad changes in the offing?

Read more: Cybersecurity threats increase during pandemic

How smaller businesses can ensure compliance

It won’t be easy, but technologies are available to ease the transition. At Noggin, we recommend regulated entities invest in software solutions purposefully designed to protect critical infrastructure assets and address stricter compliance drivers.

Positive Security Obligations (PSOs), for instance, are representative of this stricter compliance regime. PSOs consist of requirements for regulated entities to: 

  • Adopt and maintain an all-hazards critical infrastructure risk management program
  • Report serious cyber-security incidents to the government
  • Provide ownership and operation information to a Register of Critical Infrastructure Assets 

These aren’t the only proposed regulations. Quite a bit remains to be hashed out at the sectoral level. However, we do know that proposed changes to the existing risk management framework for critical infrastructure will be extensive – especially for smaller businesses with no prior experience of the first framework. 

The changes include: 

  • Requiring certain entities relating to a critical infrastructure asset to provide certain information and to notify if certain events occur 
  • Allowing the Minister to require certain entities relating to a critical infrastructure asset to do, or refrain from doing, an act or thing provided the Minister is satisfied that there is a security risk
  • Allowing the Secretary to require certain entities relating to a critical infrastructure asset to provide certain information or documents
  • Allowing the Secretary to undertake an assessment of a critical infrastructure asset to determine if there is a risk to national security relating to the asset     
  • Digital solutions can help bring clarity. For example, critical infrastructure protection solutions consolidate the threat and risk picture across all operating assets under management and provide the visibility-enhancing tools government, state-owned corporations, and businesses (of all sizes) require to achieve an “all threats” perspective. This perspective encompasses physical, cyber, personnel, and supply chain. 

Key capabilities include:

  • Maintain key details of assets and stakeholder contacts
  • Assess risks and threats using industry-standard tools
  • Conduct security threat assessments, inspections, crowded place, and impact assessments
  • Disseminate notifications and products, such as official advice to asset custodians
  • Tracklogs and tasks
  • Prepare for or respond to planned events or incidents

Both regulator and operator user groups also have access to the functionality, a valuable feature-set. So too are tools that provide situational awareness to stakeholders, given the Government’s intent to boost identification and threat-sharing capabilities among regulated entities.

Finally, the COVID-19 pandemic has upended our traditional understanding of critical infrastructure. Now, more entities than ever are directly implicated in the nation’s wellbeing. 

No matter how small, those organisations will have to shoulder the burden of mitigating security risks. But with critical infrastructure protecting software solutions, they won’t have to shoulder the burden alone. Unlike the many costly systems that purposely price out the SME market, these solutions get organisations up and running quickly, driving the continuous improvements necessary to ensure compliance and keep networks, systems, services, and the nation safe. 

Image source: Liam Tucker on Unsplash

New call-to-action