SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
INCIDENTCONTROLROOM.COM™   10 THINGS | YOU’LL
                           HAVE TO EXPLAIN TO
                           YOUR CRISIS
                           MANAGEMENT TEAM
                           ONE DAY
#1 Our crisis management plan is paper
   based. I haven’t explored the
   benefits of software yet......
#2 I appreciate the need for software but
    we’ve always done it in paper.....
#3 I have trained that team 4 times this year, I
    can’t fathom how they didn’t know what
    to do.......
#4 Data Center is gone down.......We have
   trained for this type of outage....just not
   recently...
#5 What do you mean it was the wrong
   number?.....I’m sure those contact
   directories are up to date....
#6 I know you didn’t have the most up to
    date Crisis Management Plan but we
    were just about to update it............
#7 It’s going to take a couple of hours to get
    the CMT together on a call...
#8 The Deputy Controller didn’t know what
    information to give the Emergency
    Services when they arrived....he’s new..
#9 The Investigation Process is taking longer
    than we thought initially.....
#10 We’re having a hard time understanding
     who did what........
Why not Consider Software to Support
Crisis Management? It’s not such a Huge
Step....
#Solution - Incidentcontrolroom.com™
enables large organisations to make better
decisions by providing access to information and
seamless communication through mobile &
desktop apps………..




                                                   02
Fundamentals - Access to Information
Paper Based Systems                            Incidentcontrolroom.com™                        iPhone® & iPad®




                      Configured by Admin                                     Deployed




                       By Access Information                              To control




       Fire                                      Logical Progressive                              Available 24/7
                                                   Technology™




                                                                                         www.incidentcontrolroom.com
Have an Incidentcontrolroom in your
 pocket. Understand the developing
      incident from Anywhere in the
                            World.
Communication & Decision Making
Incident Controller                   Incidentcontrolroom.com                      CMT



                      Communicating                             Accessible By
                        Real Time




                                         Understand Incident




                                                                          www.incidentcontrolroom.com
Automatically Generate
  Incredible Reports &
               Metrics.
Benefits
•    Support your CMT team from
     anywhere / anytime;
•    Deploy Information Securely to
     Mobile Apps - Access
     Information Faster;
•    Respond Consistently,
     Communicate Better, Minimise
     Downtime;
•    Preserve Corporate Reputation;
10 THINGS | YOU’LL
HAVE TO EXPLAIN TO
YOUR CRISIS
MANAGEMENT TEAM
ONE DAY



                  http://www.incidentcontrolroom.com/request-a-demo/	
  


WWW.INCIDENTCONTROLROOM.COM

Weitere ähnliche Inhalte

Andere mochten auch

Online Crisis Management + Case Studies - Elkottab Workshop
Online Crisis Management + Case Studies - Elkottab WorkshopOnline Crisis Management + Case Studies - Elkottab Workshop
Online Crisis Management + Case Studies - Elkottab WorkshopAhmed Maher
 
How to manage a crisis ?
How to manage a crisis ?How to manage a crisis ?
How to manage a crisis ?Philippe Roques
 
Crisis management presentation
Crisis management presentationCrisis management presentation
Crisis management presentationiChange
 
Crisis Management
Crisis Management Crisis Management
Crisis Management Brett Atwood
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and ExamplesNupur Bhardwaj
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Andere mochten auch (7)

Online Crisis Management + Case Studies - Elkottab Workshop
Online Crisis Management + Case Studies - Elkottab WorkshopOnline Crisis Management + Case Studies - Elkottab Workshop
Online Crisis Management + Case Studies - Elkottab Workshop
 
How to manage a crisis ?
How to manage a crisis ?How to manage a crisis ?
How to manage a crisis ?
 
Crisis management presentation
Crisis management presentationCrisis management presentation
Crisis management presentation
 
Crisis Management
Crisis Management Crisis Management
Crisis Management
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and Examples
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Ähnlich wie 10 things you’ll have to explain to your Crisis Management Team One Day!

CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Managementguest64c5c
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Teamvblackwell
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Teamvblackwell
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystepAllan Crowe PCIP
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Cenzic
 
The on-call survival guide - how to be confident on-call
The on-call survival guide - how to be confident on-call The on-call survival guide - how to be confident on-call
The on-call survival guide - how to be confident on-call Raygun
 
4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy24/7 Software
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation Adlan Hussain
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
How to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful AnalyticsHow to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful Analytics24/7 Software
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxCNSHacking
 
DevOpsRoadTrip San Francisco Final Speaking Deck
DevOpsRoadTrip San Francisco Final Speaking Deck DevOpsRoadTrip San Francisco Final Speaking Deck
DevOpsRoadTrip San Francisco Final Speaking Deck VictorOps
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 

Ähnlich wie 10 things you’ll have to explain to your Crisis Management Team One Day! (20)

CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Team
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Team
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Monitor magazine
Monitor magazineMonitor magazine
Monitor magazine
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
The on-call survival guide - how to be confident on-call
The on-call survival guide - how to be confident on-call The on-call survival guide - how to be confident on-call
The on-call survival guide - how to be confident on-call
 
4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
How to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful AnalyticsHow to Build Your Incident Management Infrastructure for Useful Analytics
How to Build Your Incident Management Infrastructure for Useful Analytics
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
 
DevOpsRoadTrip San Francisco Final Speaking Deck
DevOpsRoadTrip San Francisco Final Speaking Deck DevOpsRoadTrip San Francisco Final Speaking Deck
DevOpsRoadTrip San Francisco Final Speaking Deck
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

10 things you’ll have to explain to your Crisis Management Team One Day!

  • 1. INCIDENTCONTROLROOM.COM™ 10 THINGS | YOU’LL HAVE TO EXPLAIN TO YOUR CRISIS MANAGEMENT TEAM ONE DAY
  • 2. #1 Our crisis management plan is paper based. I haven’t explored the benefits of software yet......
  • 3. #2 I appreciate the need for software but we’ve always done it in paper.....
  • 4. #3 I have trained that team 4 times this year, I can’t fathom how they didn’t know what to do.......
  • 5. #4 Data Center is gone down.......We have trained for this type of outage....just not recently...
  • 6. #5 What do you mean it was the wrong number?.....I’m sure those contact directories are up to date....
  • 7. #6 I know you didn’t have the most up to date Crisis Management Plan but we were just about to update it............
  • 8. #7 It’s going to take a couple of hours to get the CMT together on a call...
  • 9. #8 The Deputy Controller didn’t know what information to give the Emergency Services when they arrived....he’s new..
  • 10. #9 The Investigation Process is taking longer than we thought initially.....
  • 11. #10 We’re having a hard time understanding who did what........
  • 12. Why not Consider Software to Support Crisis Management? It’s not such a Huge Step....
  • 13. #Solution - Incidentcontrolroom.com™ enables large organisations to make better decisions by providing access to information and seamless communication through mobile & desktop apps……….. 02
  • 14. Fundamentals - Access to Information Paper Based Systems Incidentcontrolroom.com™ iPhone® & iPad® Configured by Admin Deployed By Access Information To control Fire Logical Progressive Available 24/7 Technology™ www.incidentcontrolroom.com
  • 15. Have an Incidentcontrolroom in your pocket. Understand the developing incident from Anywhere in the World.
  • 16. Communication & Decision Making Incident Controller Incidentcontrolroom.com CMT Communicating Accessible By Real Time Understand Incident www.incidentcontrolroom.com
  • 17. Automatically Generate Incredible Reports & Metrics.
  • 18. Benefits •  Support your CMT team from anywhere / anytime; •  Deploy Information Securely to Mobile Apps - Access Information Faster; •  Respond Consistently, Communicate Better, Minimise Downtime; •  Preserve Corporate Reputation;
  • 19. 10 THINGS | YOU’LL HAVE TO EXPLAIN TO YOUR CRISIS MANAGEMENT TEAM ONE DAY http://www.incidentcontrolroom.com/request-a-demo/   WWW.INCIDENTCONTROLROOM.COM