SlideShare uma empresa Scribd logo
1 de 33
Chapter 11 Triggers, Traps, and Working within Incident Command Systems
Objectives ,[object Object],[object Object],[object Object]
Objectives (con’t.) ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-2   Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traps ,[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-4   The ISO who takes the Bunker Cop approach misses the big picture.
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Working within Command Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-6   The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-7   The ISO can be part of the solution path, as opposed to just bringing problems to the table.
Figure 11-8   The ISO should strive to be a consultant to the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-10   An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Chapter 11

Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxbartholomeocoombs
 
Ics part 3
Ics part 3Ics part 3
Ics part 3NPSCAVO
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxwviola
 
Ics part 2
Ics part 2Ics part 2
Ics part 2NPSCAVO
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdfNickPalmisano2
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxjeanettehully
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command SystemRyann Castro
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Mark Magnussen
 

Semelhante a Chapter 11 (20)

Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docx
 
Ics part 3
Ics part 3Ics part 3
Ics part 3
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
Level 1 Slides   Lessons 11 15 V4 Wb70 MlLevel 1 Slides   Lessons 11 15 V4 Wb70 Ml
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docx
 
Ics part 2
Ics part 2Ics part 2
Ics part 2
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docx
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command System
 
Ics
IcsIcs
Ics
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201Bulldog Active Shooter Lesson Plan D.201
Bulldog Active Shooter Lesson Plan D.201
 

Mais de snoshoesam (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Chapter 11

  • 1. Chapter 11 Triggers, Traps, and Working within Incident Command Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Figure 11-2 Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
  • 11.
  • 12.
  • 13.
  • 14. Figure 11-4 The ISO who takes the Bunker Cop approach misses the big picture.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Figure 11-6 The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
  • 21.
  • 22. Figure 11-7 The ISO can be part of the solution path, as opposed to just bringing problems to the table.
  • 23. Figure 11-8 The ISO should strive to be a consultant to the incident commander.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Figure 11-10 An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
  • 30.
  • 31.
  • 32.
  • 33.