SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Integrated Safety and Security Management System   Viyya Technologies The Right Information.  To the Right People.  At the Right Time.  Presents the
About Us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],The Problem
Crisis A sudden, generally unanticipated event that profoundly and negatively affects a significant segment of the population and often involves serious injury or death.
A Crisis Can Happen to Anyone – Anytime, Anywhere! Safety and Security Planning Must be Integrated with Timely Communication to be Effective
It’s A Fact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Now is Too Late! ,[object Object],[object Object],[object Object],[object Object],What to do when the media hits the fan . . .
The Solution ,[object Object]
Building Blocks of Safety and Security
Mass Notification Alone Cannot Create a Culture of Preparedness! ,[object Object],[object Object],[object Object],[object Object]
What Does the SSMS Do? The SSMS Will Integrate the Essential Elements of Safety and Security Management Planning for Any Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Features of VIYYA Integrated System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSMS Supports Multiple Devices
Emergency Preparedness VRED has taken steps to ensure that organizations continue to function in the event of an emergency. The resources and information contained on this page are designed to help you cope with an emergency situation and protect yourself and your colleagues should the region experience an incident. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Alerts No Active Alerts In the event of an alert, important safety and security information will be displayed here Emergency Procedures Explosions Fire Evacuations Medical Emergencies Gas Leaks Hazardous Materials Bomb Threats Awareness Bulletin Robberies Evacuations Safety Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vertical Markets Government VIYYA Technologies Web Services - API Commercial Defense and Military K-12 and Higher Education Client Communication Via phones, web, email
Benefits of the SSMS Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],Continuity ,[object Object],[object Object],[object Object],[object Object],Regulatory Compliance ,[object Object],[object Object],[object Object],Community Health & Safety ,[object Object],[object Object],[object Object],[object Object],Planning and Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Organizational Outcomes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary  How Well You Respond — Depends on How Well You are Prepared!

Weitere ähnliche Inhalte

Was ist angesagt?

Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2Robin Patras
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookJAMES E. McDONALD, PSNA
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinSuzanne Hartin
 
Risk based approach
Risk based approach Risk based approach
Risk based approach Robin Patras
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greerAbramsLearning-ALIS
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Morlai Kargbo, FCCA
 
Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Waqas I. YOUSAFZAI
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016Stefanie Vogt
 
How to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateHow to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateIRM India Affiliate
 
Wvi Operations Management Presentation Dha
Wvi Operations Management Presentation DhaWvi Operations Management Presentation Dha
Wvi Operations Management Presentation Dhaguest5c8420
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementAnu Damodaran
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Doreen Loeber
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Global Risk Forum GRFDavos
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateIRM India Affiliate
 

Was ist angesagt? (20)

Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_book
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne Hartin
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greer
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
IT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENTIT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENT
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020
 
Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016
 
How to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateHow to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia Affiliate
 
Wvi Operations Management Presentation Dha
Wvi Operations Management Presentation DhaWvi Operations Management Presentation Dha
Wvi Operations Management Presentation Dha
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India Affiliate
 

Andere mochten auch

Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Businessaccenture
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012Bindner
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Galina Yaceiko
 

Andere mochten auch (6)

Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
International Conference on Building Security Capacity
International Conference on Building Security CapacityInternational Conference on Building Security Capacity
International Conference on Building Security Capacity
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012
 
Its & complex safety
Its & complex safetyIts & complex safety
Its & complex safety
 
Seminar ppt...; )
Seminar ppt...; )Seminar ppt...; )
Seminar ppt...; )
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
 

Ähnlich wie Viyya Ssms Overview 2009

U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityMegan Espinoza
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentationwbesse
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systemsglobal
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Jisc
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010Vernon Turner
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Situation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopSituation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopChamindra de Silva
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Lennart Bredberg
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergLennart Bredberg
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfCyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfAhad
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing EventsMark Bennett
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionGisli Olafsson
 
Summerschool presentation - Annas
Summerschool presentation - AnnasSummerschool presentation - Annas
Summerschool presentation - AnnasAnnaGry
 

Ähnlich wie Viyya Ssms Overview 2009 (20)

U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland Security
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentation
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systems
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Situation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopSituation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement Workshop
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart Bredberg
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfCyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing Events
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk Reduction
 
Summerschool presentation - Annas
Summerschool presentation - AnnasSummerschool presentation - Annas
Summerschool presentation - Annas
 

Kürzlich hochgeladen

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Kürzlich hochgeladen (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Viyya Ssms Overview 2009

  • 1. Integrated Safety and Security Management System Viyya Technologies The Right Information. To the Right People. At the Right Time. Presents the
  • 2.
  • 3.
  • 4. Crisis A sudden, generally unanticipated event that profoundly and negatively affects a significant segment of the population and often involves serious injury or death.
  • 5. A Crisis Can Happen to Anyone – Anytime, Anywhere! Safety and Security Planning Must be Integrated with Timely Communication to be Effective
  • 6.
  • 7.  
  • 8.
  • 9.
  • 10. Building Blocks of Safety and Security
  • 11.
  • 12.
  • 13.
  • 15.
  • 16. Vertical Markets Government VIYYA Technologies Web Services - API Commercial Defense and Military K-12 and Higher Education Client Communication Via phones, web, email
  • 17.
  • 18.
  • 19. Summary How Well You Respond — Depends on How Well You are Prepared!