SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
THOUGHT LEADERS FOR MANUFACTURING & SUPPLY CHAIN
ARC INSIGHTS
By Asish Ghosh
INSIGHT# 2003-08MP&H
JANUARY 30, 2003
The U. S. Department of Justice has
recently released a report that compares
and contrasts many of the commercially
available crisis information management
software packages. These packages can
be usefully deployed in large
manufacturing sites.
Benefits of CIMS Tools
• Provide real-time data, reports, and analysis
to emergency management personnel
• Provide assessment of the situation
• Support decisions on the application of
available resources
• Disseminate information to other interested
parties
Appropriate Crisis Management Infrastructure
Is Essential to Your Long Term Viability
Keywords
Crisis Management, Incident Management, Security
Summary
Crisis conditions resulting in disasters are usually caused by a combination
of natural and human induced events. Adequate response to such a disas-
ter usually requires multi-organization and multi-
jurisdiction efforts. This organizational complexity
often leads to inadequate intelligence and mis-
communications, causing further escalation of that
event. For consistent, coordinated, and construc-
tive actions there must be a common vocabulary,
model, and understanding of the problems for all
those that are involved in mitigating the situation.
The United States Department of Justice has recently released a report on
crisis information management that compares and contrasts many of the
commercially available software packages that are available in this area.
Analysis
Although the importance of security and crisis management has been rec-
ognized for a long time by manufacturing industries, its significance has
increased greatly since the events of September 11, 2001. Traditionally, cri-
sis management operated with scarce in-
formation about the event, whether fire,
hurricane, chemical spill, or arson. Today,
they may be overwhelmed with a glut of
information, with little knowledge or tools
to handle the data.
Crisis Information Management Software
(CIMS) is a part of an integrated incident
management system (IMS). The objective of an integrated IMS is a system
that connects all elements of an organization's response profile, such as
ARC Insights, Page 2
©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com
Common Problems for Safety Personnel
• Which software package to use?
• Is one product better than another?
• How to choose one?
• How to implement a new package?
• What is the securely over the Internet?
• Does it have all the needed features?
• What is the installed cost?
• What is the life-cycle cost?
telecommunications, wireless, network, voice,
video, and audio and eliminates the need for
separate communication channels. The fun-
damental objective is to optimizing emergency
management operations by the use of technol-
ogy tools that augment and enhance the
deployment of emergency response assets.
An integrated IMS requires that an emergency
management department use an integrated sys-
tem of technical capabilities that operates
seamlessly and without duplication. This notion combines the elements of
policy and procedure within a comprehensive emergency response plan
that is aided by information technology.
P r o c e s s
P la n t
P r o c e s s
P la n t
Crisis Management and Protection Layers
Crisis Information Management Software
In October 2002, the United States Department of Justice released a feature
comparison report on CIMS. The report compares and contrasts ten com-
mercially available software packages. It provides information on packages
that maintain control over the flood of information that are available during
an emergency. The report evaluates three main areas: system environment,
functions, and product support. It is available at:
http://www.ncjrs.org/pdffiles1/nij/197065.pdf
In addition to this report, this project produced a Feature Comparison Ma-
trix, a Microsoft Excel-based spreadsheet that allows users to input criteria
specific to their needs to select appropriate CIMS products. The matrix is
available at:
http://www.ojp.usdoj.gov/nij/temp/publications/197065-Matrix.zip.
ARC Insights, Page 3
©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com
Supplier Product Web Site
Blue292 Blue292 www.blue292.com
Ship Analytics International CRISIS www.shipanalytics.com
Specialized Disaster Systems Int. EM2000 www.sdsintl.net
E-Team E-Team www.eteam.com
Essential Information Systems Incident Mas-
ter & InfoBook
www.essential-technologies.com
Alert Technologies OpsCenter www.alerttech.com
RAMsafe RAMSAFE www.ramsafe.com
E. A. Renfroe RESPONSE www.earenfroe.com
SoftRisk Technologies SoftRisk www.softrisk.com
Emergency Services Integrators WebEOC www.esi911.com
Products Evaluated in the CIMS Report
Recommendations
• Industrial companies need to assess potential hazards, security vulner-
abilities, and crisis management capabilities in their manufacturing
sites. This assessment should be carried out in conjunction with the lo-
cal authorities responsible for crisis management.
• Based on the needs, manufacturers should select appropriate crisis
management software along with the necessary hardware platform to
install or upgrade their crisis management capabilities.
• Crisis information management software suppliers should develop ex-
pertise in assessing requirements and recommending appropriate
systems for CIM applications in manufacturing environments.
Please help us improve our deliverables to you – take our survey linked to this
transmittal e-mail or at www.arcweb.com/myarc in the Client Area. For further
information, contact your account manager or the author at aghosh@arcweb.com.
Recommended circulation: All MAS-H & P clients. ARC Insights are published
and copyrighted by ARC Advisory Group. The information is proprietary to ARC
and no part of it may be reproduced without prior permission from ARC.

Contenu connexe

Tendances

Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMNorman Disney & Young
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
Safety and asset integrity for deepwater
Safety and asset integrity for deepwaterSafety and asset integrity for deepwater
Safety and asset integrity for deepwaterAdvisian
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...David Sweigert
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Unified threat management
Unified threat managementUnified threat management
Unified threat managementYabibo
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 

Tendances (20)

Information Security
Information SecurityInformation Security
Information Security
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISM
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Safety and asset integrity for deepwater
Safety and asset integrity for deepwaterSafety and asset integrity for deepwater
Safety and asset integrity for deepwater
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Unified threat management
Unified threat managementUnified threat management
Unified threat management
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 

Similaire à Appropriate Crisis Management Infrastructure Is Essential to Your Long Term Viability

Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...ARC Advisory Group
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
Ultimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxUltimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxBIS Safety
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpointLonda77
 
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)Becky Ward
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxmccormicknadine86
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfwardell henley
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design EssayTracy Berry
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company Abdulrahman Alamri
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docxlorainedeserre
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 

Similaire à Appropriate Crisis Management Infrastructure Is Essential to Your Long Term Viability (20)

Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Ultimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptxUltimate Guide to EHS Management.pptx
Ultimate Guide to EHS Management.pptx
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpoint
 
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
IJIS Institute_Use Cases in Public Safety CAD-to-CAD (Nov 2015)
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design Essay
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 

Plus de ARC Advisory Group

Information Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldInformation Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldARC Advisory Group
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)ARC Advisory Group
 
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumAsset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumARC Advisory Group
 
Three market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelThree market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelARC Advisory Group
 
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum ARC Advisory Group
 
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...ARC Advisory Group
 
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...ARC Advisory Group
 
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...ARC Advisory Group
 
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum ARC Advisory Group
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...ARC Advisory Group
 
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum ARC Advisory Group
 
Current Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortCurrent Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortARC Advisory Group
 
CPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumCPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumARC Advisory Group
 
Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?ARC Advisory Group
 
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayConoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayARC Advisory Group
 
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersComponent Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersARC Advisory Group
 
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsCombined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsARC Advisory Group
 
Collaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesCollaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesARC Advisory Group
 
Closing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingClosing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingARC Advisory Group
 

Plus de ARC Advisory Group (20)

Eam guide-video-2015
Eam guide-video-2015Eam guide-video-2015
Eam guide-video-2015
 
Information Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected WorldInformation Driven Enterprise for the Connected World
Information Driven Enterprise for the Connected World
 
Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)Stork Presentation on Migration (Willem Hazenberg)
Stork Presentation on Migration (Willem Hazenberg)
 
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry ForumAsset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
Asset Information Management (AIM) Presentation @ ARC's 2011 Industry Forum
 
Three market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next levelThree market trends drive collaborative value networks to the next level
Three market trends drive collaborative value networks to the next level
 
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
Mobile Technologies and Supply Chain @ ARC's 2011 Industry Forum
 
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
Enterprise Mobility - Current Practices and Future Plans for Mobility Systems...
 
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
Energy Management Strategies for Operational Excellence @ ARC's 2011 Industry...
 
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...Energy Management and the Evolution of Intelligent Motor Control and Drives @...
Energy Management and the Evolution of Intelligent Motor Control and Drives @...
 
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
Driving Innovation, Sustainability and Performance @ ARC's 2011 Industry Forum
 
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
Anti-counterfeiting and Brand Protection (ABP) Workshop @ ARC's 2011 Industry...
 
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
Strategies for Asset Performance Management @ ARC's 2011 Industry Forum
 
Current Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall ShortCurrent Automation Purchasing Strategies Fall Short
Current Automation Purchasing Strategies Fall Short
 
CPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC ForumCPM Identified as RPM Engine at ARC Forum
CPM Identified as RPM Engine at ARC Forum
 
Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?Controls to CPM Connection: Are We There?
Controls to CPM Connection: Are We There?
 
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the WayConoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
Conoco on Path to Reliability Centered Loop Management: Enhancing ROA on the Way
 
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics ProvidersComponent Based Solutions Well Aligned with Needs of Service Logistics Providers
Component Based Solutions Well Aligned with Needs of Service Logistics Providers
 
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes SolutionsCombined Fluid Power and Mechatronic Technology Optimizes Solutions
Combined Fluid Power and Mechatronic Technology Optimizes Solutions
 
Collaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and StrategiesCollaborative Asset Lifecycle Management Vision and Strategies
Collaborative Asset Lifecycle Management Vision and Strategies
 
Closing the Gap on Digital Manufacturing
Closing the Gap on Digital ManufacturingClosing the Gap on Digital Manufacturing
Closing the Gap on Digital Manufacturing
 

Dernier

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Appropriate Crisis Management Infrastructure Is Essential to Your Long Term Viability

  • 1. THOUGHT LEADERS FOR MANUFACTURING & SUPPLY CHAIN ARC INSIGHTS By Asish Ghosh INSIGHT# 2003-08MP&H JANUARY 30, 2003 The U. S. Department of Justice has recently released a report that compares and contrasts many of the commercially available crisis information management software packages. These packages can be usefully deployed in large manufacturing sites. Benefits of CIMS Tools • Provide real-time data, reports, and analysis to emergency management personnel • Provide assessment of the situation • Support decisions on the application of available resources • Disseminate information to other interested parties Appropriate Crisis Management Infrastructure Is Essential to Your Long Term Viability Keywords Crisis Management, Incident Management, Security Summary Crisis conditions resulting in disasters are usually caused by a combination of natural and human induced events. Adequate response to such a disas- ter usually requires multi-organization and multi- jurisdiction efforts. This organizational complexity often leads to inadequate intelligence and mis- communications, causing further escalation of that event. For consistent, coordinated, and construc- tive actions there must be a common vocabulary, model, and understanding of the problems for all those that are involved in mitigating the situation. The United States Department of Justice has recently released a report on crisis information management that compares and contrasts many of the commercially available software packages that are available in this area. Analysis Although the importance of security and crisis management has been rec- ognized for a long time by manufacturing industries, its significance has increased greatly since the events of September 11, 2001. Traditionally, cri- sis management operated with scarce in- formation about the event, whether fire, hurricane, chemical spill, or arson. Today, they may be overwhelmed with a glut of information, with little knowledge or tools to handle the data. Crisis Information Management Software (CIMS) is a part of an integrated incident management system (IMS). The objective of an integrated IMS is a system that connects all elements of an organization's response profile, such as
  • 2. ARC Insights, Page 2 ©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com Common Problems for Safety Personnel • Which software package to use? • Is one product better than another? • How to choose one? • How to implement a new package? • What is the securely over the Internet? • Does it have all the needed features? • What is the installed cost? • What is the life-cycle cost? telecommunications, wireless, network, voice, video, and audio and eliminates the need for separate communication channels. The fun- damental objective is to optimizing emergency management operations by the use of technol- ogy tools that augment and enhance the deployment of emergency response assets. An integrated IMS requires that an emergency management department use an integrated sys- tem of technical capabilities that operates seamlessly and without duplication. This notion combines the elements of policy and procedure within a comprehensive emergency response plan that is aided by information technology. P r o c e s s P la n t P r o c e s s P la n t Crisis Management and Protection Layers Crisis Information Management Software In October 2002, the United States Department of Justice released a feature comparison report on CIMS. The report compares and contrasts ten com- mercially available software packages. It provides information on packages that maintain control over the flood of information that are available during an emergency. The report evaluates three main areas: system environment, functions, and product support. It is available at: http://www.ncjrs.org/pdffiles1/nij/197065.pdf In addition to this report, this project produced a Feature Comparison Ma- trix, a Microsoft Excel-based spreadsheet that allows users to input criteria specific to their needs to select appropriate CIMS products. The matrix is available at: http://www.ojp.usdoj.gov/nij/temp/publications/197065-Matrix.zip.
  • 3. ARC Insights, Page 3 ©2003 • ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • ARCweb.com Supplier Product Web Site Blue292 Blue292 www.blue292.com Ship Analytics International CRISIS www.shipanalytics.com Specialized Disaster Systems Int. EM2000 www.sdsintl.net E-Team E-Team www.eteam.com Essential Information Systems Incident Mas- ter & InfoBook www.essential-technologies.com Alert Technologies OpsCenter www.alerttech.com RAMsafe RAMSAFE www.ramsafe.com E. A. Renfroe RESPONSE www.earenfroe.com SoftRisk Technologies SoftRisk www.softrisk.com Emergency Services Integrators WebEOC www.esi911.com Products Evaluated in the CIMS Report Recommendations • Industrial companies need to assess potential hazards, security vulner- abilities, and crisis management capabilities in their manufacturing sites. This assessment should be carried out in conjunction with the lo- cal authorities responsible for crisis management. • Based on the needs, manufacturers should select appropriate crisis management software along with the necessary hardware platform to install or upgrade their crisis management capabilities. • Crisis information management software suppliers should develop ex- pertise in assessing requirements and recommending appropriate systems for CIM applications in manufacturing environments. Please help us improve our deliverables to you – take our survey linked to this transmittal e-mail or at www.arcweb.com/myarc in the Client Area. For further information, contact your account manager or the author at aghosh@arcweb.com. Recommended circulation: All MAS-H & P clients. ARC Insights are published and copyrighted by ARC Advisory Group. The information is proprietary to ARC and no part of it may be reproduced without prior permission from ARC.