SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Chapter 11 Triggers, Traps, and Working within Incident Command Systems
Objectives ,[object Object],[object Object],[object Object]
Objectives (con’t.) ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-2   Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traps ,[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-4   The ISO who takes the Bunker Cop approach misses the big picture.
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Working within Command Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-6   The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-7   The ISO can be part of the solution path, as opposed to just bringing problems to the table.
Figure 11-8   The ISO should strive to be a consultant to the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-10   An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Chapter 11

Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxbartholomeocoombs
 
Ics part 3
Ics part 3Ics part 3
Ics part 3NPSCAVO
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxwviola
 
Ics part 2
Ics part 2Ics part 2
Ics part 2NPSCAVO
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdfNickPalmisano2
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxjeanettehully
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command SystemRyann Castro
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Mark Magnussen
 

Ähnlich wie Chapter 11 (20)

Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docx
 
Ics part 3
Ics part 3Ics part 3
Ics part 3
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
Level 1 Slides   Lessons 11 15 V4 Wb70 MlLevel 1 Slides   Lessons 11 15 V4 Wb70 Ml
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docx
 
Ics part 2
Ics part 2Ics part 2
Ics part 2
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docx
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command System
 
Ics
IcsIcs
Ics
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201
 

Mehr von snoshoesam (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 

Kürzlich hochgeladen

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Chapter 11

  • 1. Chapter 11 Triggers, Traps, and Working within Incident Command Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Figure 11-2 Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
  • 11.
  • 12.
  • 13.
  • 14. Figure 11-4 The ISO who takes the Bunker Cop approach misses the big picture.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Figure 11-6 The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
  • 21.
  • 22. Figure 11-7 The ISO can be part of the solution path, as opposed to just bringing problems to the table.
  • 23. Figure 11-8 The ISO should strive to be a consultant to the incident commander.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Figure 11-10 An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
  • 30.
  • 31.
  • 32.
  • 33.