SlideShare uma empresa Scribd logo
1 de 22
Extreme Behavioral  Risk Management LLC BCP h ™ The Human Factor in Business Continuity Planning
XBRM ,[object Object],[object Object],[object Object]
Unique Properties and Models Psychological First Aid Responder ™  Training TeleCrisis Solutions ™  Threat Management Software Business Continuity Human Factors ™ Represented at major conferences in disaster recovery, emergency management and business continuity nationwide. Published articles in all major industry trade journals and magazines.
Intellectual Properties ,[object Object],[object Object],[object Object],[object Object],[object Object]
XBRM’s Clients * *A Partial List ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A preferred provider a violence prevention, crisis management and disaster recovery services.
Federal Government Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State & City Government Clients   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TeleCrisis Solutions ™ Telephone Threat Management System
TeleCrisis Solutions™  Telephone Threat Management System  TeleCrisis Advisor 3.1 Computer-Assisted Threat Management Software  Crisis management resources at your fingertips… where you need them, when you need them.
Help Desk  Call Center Customer Service Switchboard Operator Hotline Front Desk  Reception Area Exclusively for Frontline Employees
Hardening the  National Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],In any sector having public contact by phone, telephone threat management must be an essential component of the overall safety and security plan.
Universal Vulnerability   Even the best prepared organizations are at risk. ,[object Object],[object Object],[object Object],[object Object],Core Assumptions
TeleCrisis Advisor ™   Version 3.1 Now includes specific protocols for handling written and e-mailed threats, as well as threats received by phone. ,[object Object],[object Object],[object Object]
TeleCrisis Advisor 3.1 ™  for Windows ® Instant access to critical threat management resources
A Virtual Safety Net TeleCrisis Advisor 3.1 guides frontline employees through focused checklists and expert advice in handling the most likely crisis scenarios.  The instant-launching desktop application is always available with just one click. For Windows XP ®   and all earlier versions. Intuitive interface. No special computer skills are needed. No IT support required.
TeleCrisis is a virtual safety net. It is always running in the background. One click on the icon instantly displays the Main Menu. TeleCrisis Icon
Select a Threat Type TeleCrisis Main Menu
Use the Scroll Bar to move up and down through Checklists and Tips
Pre-configure your Incident Report recipient list to include all of your key internal and external emergency contacts.
Use the Incident Report to quickly organize and communicate critical information.
XBRM Transforming Frontline Employees into the First Line of Defense! The Psychology of Homeland Security ™
For More Information Extreme Behavioral Risk Management LLC Tel 212.366.8200 Fax 212.366.8558 Web www.xbrm.com Email  [email_address] The Psychology of Homeland Security ™

Mais conteúdo relacionado

Mais procurados

Crisis communication riverside
Crisis communication riversideCrisis communication riverside
Crisis communication riversidececiliah86
 
Crisis management
Crisis managementCrisis management
Crisis managementRajat Ghosh
 
Chapter 4 insurability of risk
Chapter 4 insurability of riskChapter 4 insurability of risk
Chapter 4 insurability of riskDr Riyaz Muhmmad
 
Incident Command System in the Private Sector - An Overview
Incident Command System in the Private Sector - An OverviewIncident Command System in the Private Sector - An Overview
Incident Command System in the Private Sector - An OverviewReginaPhelps
 
Risk managment in aviation environment
Risk managment in aviation environmentRisk managment in aviation environment
Risk managment in aviation environmentCristiane Freitas
 
Risk mangement
Risk mangementRisk mangement
Risk mangementcollege
 
Crisis Management for Business Sustainability
Crisis Management for Business SustainabilityCrisis Management for Business Sustainability
Crisis Management for Business SustainabilityChandani Kanthi Basnayake
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Global Risk Forum GRFDavos
 
Crisis communication management
Crisis communication managementCrisis communication management
Crisis communication managementAqeelAhmed170
 
School Incident Management Presentation
School Incident Management PresentationSchool Incident Management Presentation
School Incident Management Presentationguestd6096bf
 
INCIDENT RESPONSE SYSTEM (IRS)
INCIDENT RESPONSE SYSTEM (IRS)INCIDENT RESPONSE SYSTEM (IRS)
INCIDENT RESPONSE SYSTEM (IRS)udit dixit
 
About Risks - WinValencia
About Risks - WinValenciaAbout Risks - WinValencia
About Risks - WinValenciawinvalencia
 
Introduction to Risk Mangement
Introduction to Risk MangementIntroduction to Risk Mangement
Introduction to Risk MangementVipul Kumar
 
Risk managment and insurance chap 4 5
Risk managment and insurance chap 4 5Risk managment and insurance chap 4 5
Risk managment and insurance chap 4 5Ashenafi Abera Wolde
 

Mais procurados (19)

Crisis communication riverside
Crisis communication riversideCrisis communication riverside
Crisis communication riverside
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Chapter 4 insurability of risk
Chapter 4 insurability of riskChapter 4 insurability of risk
Chapter 4 insurability of risk
 
Incident Command System in the Private Sector - An Overview
Incident Command System in the Private Sector - An OverviewIncident Command System in the Private Sector - An Overview
Incident Command System in the Private Sector - An Overview
 
Risk managment in aviation environment
Risk managment in aviation environmentRisk managment in aviation environment
Risk managment in aviation environment
 
ICS and you
ICS and youICS and you
ICS and you
 
Risk mangement
Risk mangementRisk mangement
Risk mangement
 
Risk 6
Risk 6Risk 6
Risk 6
 
Types of-risk
Types of-riskTypes of-risk
Types of-risk
 
Crisis Management for Business Sustainability
Crisis Management for Business SustainabilityCrisis Management for Business Sustainability
Crisis Management for Business Sustainability
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...
 
Crisis communication management
Crisis communication managementCrisis communication management
Crisis communication management
 
School Incident Management Presentation
School Incident Management PresentationSchool Incident Management Presentation
School Incident Management Presentation
 
INCIDENT RESPONSE SYSTEM (IRS)
INCIDENT RESPONSE SYSTEM (IRS)INCIDENT RESPONSE SYSTEM (IRS)
INCIDENT RESPONSE SYSTEM (IRS)
 
COSO VS ERM -
COSO VS ERM - COSO VS ERM -
COSO VS ERM -
 
About Risks - WinValencia
About Risks - WinValenciaAbout Risks - WinValencia
About Risks - WinValencia
 
The risk from the point of view of an actuary
The risk from the point of view of an actuaryThe risk from the point of view of an actuary
The risk from the point of view of an actuary
 
Introduction to Risk Mangement
Introduction to Risk MangementIntroduction to Risk Mangement
Introduction to Risk Mangement
 
Risk managment and insurance chap 4 5
Risk managment and insurance chap 4 5Risk managment and insurance chap 4 5
Risk managment and insurance chap 4 5
 

Destaque

Design for Social Sharing Workshop
Design for Social Sharing WorkshopDesign for Social Sharing Workshop
Design for Social Sharing WorkshopRashmi Sinha
 
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps Mauricio Portugal Ribeiro
 
Latihan korelasi ganda
Latihan korelasi gandaLatihan korelasi ganda
Latihan korelasi gandapindp
 
Orange Sparkle Ball: Who We Are and What We Do
Orange Sparkle Ball: Who We Are and What We DoOrange Sparkle Ball: Who We Are and What We Do
Orange Sparkle Ball: Who We Are and What We DoOrange Sparkle Ball, Inc.
 
Tonometer Final NSF I-Corps presentation
Tonometer Final NSF I-Corps presentationTonometer Final NSF I-Corps presentation
Tonometer Final NSF I-Corps presentationStanford University
 
Seres Dos CartõEs
Seres Dos CartõEsSeres Dos CartõEs
Seres Dos CartõEsSérgio Luiz
 
Ergen medeeleh 201604 sar
Ergen medeeleh  201604 sarErgen medeeleh  201604 sar
Ergen medeeleh 201604 sarrtumur
 
A good horse runs even at the shadow of the whip
A good horse runs even at the shadow of the whipA good horse runs even at the shadow of the whip
A good horse runs even at the shadow of the whipRhea Myers
 
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.Rakesh Kumar
 
Prasanth Kumar Nadh Dehydrogenase Subunit 1
Prasanth Kumar Nadh Dehydrogenase Subunit 1Prasanth Kumar Nadh Dehydrogenase Subunit 1
Prasanth Kumar Nadh Dehydrogenase Subunit 1Prasanthperceptron
 
case study on bride burning
case study on bride burningcase study on bride burning
case study on bride burningPriyansha Gupta
 
Nc verification and re processing for collaborative machining
Nc verification and re processing for collaborative machiningNc verification and re processing for collaborative machining
Nc verification and re processing for collaborative machiningLiu PeiLing
 
A Little Pumpkin Likes Reading Books
A Little Pumpkin Likes Reading BooksA Little Pumpkin Likes Reading Books
A Little Pumpkin Likes Reading BooksPEPY Empowering Youth
 
Question 3 – what have you learnt from
Question 3 – what have you learnt fromQuestion 3 – what have you learnt from
Question 3 – what have you learnt fromnushy1993
 

Destaque (20)

Design for Social Sharing Workshop
Design for Social Sharing WorkshopDesign for Social Sharing Workshop
Design for Social Sharing Workshop
 
Jft 13-desktop-optical-power-meter-jfopt
Jft 13-desktop-optical-power-meter-jfoptJft 13-desktop-optical-power-meter-jfopt
Jft 13-desktop-optical-power-meter-jfopt
 
rajesh - Updated
rajesh - Updatedrajesh - Updated
rajesh - Updated
 
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps
A Lei 12.766/12 e o nivel de detalhamento dos estudos de engenharia em ppps
 
C11 nhandangtamgiac
C11 nhandangtamgiacC11 nhandangtamgiac
C11 nhandangtamgiac
 
Latihan korelasi ganda
Latihan korelasi gandaLatihan korelasi ganda
Latihan korelasi ganda
 
Orange Sparkle Ball: Who We Are and What We Do
Orange Sparkle Ball: Who We Are and What We DoOrange Sparkle Ball: Who We Are and What We Do
Orange Sparkle Ball: Who We Are and What We Do
 
Hugps138
Hugps138Hugps138
Hugps138
 
Tonometer Final NSF I-Corps presentation
Tonometer Final NSF I-Corps presentationTonometer Final NSF I-Corps presentation
Tonometer Final NSF I-Corps presentation
 
Seres Dos CartõEs
Seres Dos CartõEsSeres Dos CartõEs
Seres Dos CartõEs
 
Ergen medeeleh 201604 sar
Ergen medeeleh  201604 sarErgen medeeleh  201604 sar
Ergen medeeleh 201604 sar
 
A good horse runs even at the shadow of the whip
A good horse runs even at the shadow of the whipA good horse runs even at the shadow of the whip
A good horse runs even at the shadow of the whip
 
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.
Zed-Sales™ - a flagship product of Zed-Axis Technologies Pvt. Ltd.
 
Prasanth Kumar Nadh Dehydrogenase Subunit 1
Prasanth Kumar Nadh Dehydrogenase Subunit 1Prasanth Kumar Nadh Dehydrogenase Subunit 1
Prasanth Kumar Nadh Dehydrogenase Subunit 1
 
posititude - Dec 14
posititude - Dec 14posititude - Dec 14
posititude - Dec 14
 
case study on bride burning
case study on bride burningcase study on bride burning
case study on bride burning
 
fgfdgdfg
fgfdgdfg fgfdgdfg
fgfdgdfg
 
Nc verification and re processing for collaborative machining
Nc verification and re processing for collaborative machiningNc verification and re processing for collaborative machining
Nc verification and re processing for collaborative machining
 
A Little Pumpkin Likes Reading Books
A Little Pumpkin Likes Reading BooksA Little Pumpkin Likes Reading Books
A Little Pumpkin Likes Reading Books
 
Question 3 – what have you learnt from
Question 3 – what have you learnt fromQuestion 3 – what have you learnt from
Question 3 – what have you learnt from
 

Semelhante a Xbrm Overview 2009

Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Ransomware Mitigation Strategies
Ransomware Mitigation StrategiesRansomware Mitigation Strategies
Ransomware Mitigation StrategiesLANDESK
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceI-Pix Technologies
 
Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?Arrow Institute
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinDavid X Martin
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today Justine Shaffer
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threatsDean Evans
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docxalinainglis
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesDavid Sweigert
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Disaster Management
Disaster ManagementDisaster Management
Disaster Managementrashs
 
Malware removal super techman
Malware removal  super techmanMalware removal  super techman
Malware removal super techmanYajal Derson
 

Semelhante a Xbrm Overview 2009 (20)

Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Ransomware Mitigation Strategies
Ransomware Mitigation StrategiesRansomware Mitigation Strategies
Ransomware Mitigation Strategies
 
Emergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for ResilienceEmergency Response & Crisis Management for Resilience
Emergency Response & Crisis Management for Resilience
 
Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
AtHocProductBrochure_V2
AtHocProductBrochure_V2AtHocProductBrochure_V2
AtHocProductBrochure_V2
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Disaster Management
Disaster ManagementDisaster Management
Disaster Management
 
Malware removal super techman
Malware removal  super techmanMalware removal  super techman
Malware removal super techman
 

Xbrm Overview 2009

  • 1. Extreme Behavioral Risk Management LLC BCP h ™ The Human Factor in Business Continuity Planning
  • 2.
  • 3. Unique Properties and Models Psychological First Aid Responder ™ Training TeleCrisis Solutions ™ Threat Management Software Business Continuity Human Factors ™ Represented at major conferences in disaster recovery, emergency management and business continuity nationwide. Published articles in all major industry trade journals and magazines.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. TeleCrisis Solutions ™ Telephone Threat Management System
  • 9. TeleCrisis Solutions™ Telephone Threat Management System TeleCrisis Advisor 3.1 Computer-Assisted Threat Management Software Crisis management resources at your fingertips… where you need them, when you need them.
  • 10. Help Desk Call Center Customer Service Switchboard Operator Hotline Front Desk Reception Area Exclusively for Frontline Employees
  • 11.
  • 12.
  • 13.
  • 14. TeleCrisis Advisor 3.1 ™ for Windows ® Instant access to critical threat management resources
  • 15. A Virtual Safety Net TeleCrisis Advisor 3.1 guides frontline employees through focused checklists and expert advice in handling the most likely crisis scenarios. The instant-launching desktop application is always available with just one click. For Windows XP ® and all earlier versions. Intuitive interface. No special computer skills are needed. No IT support required.
  • 16. TeleCrisis is a virtual safety net. It is always running in the background. One click on the icon instantly displays the Main Menu. TeleCrisis Icon
  • 17. Select a Threat Type TeleCrisis Main Menu
  • 18. Use the Scroll Bar to move up and down through Checklists and Tips
  • 19. Pre-configure your Incident Report recipient list to include all of your key internal and external emergency contacts.
  • 20. Use the Incident Report to quickly organize and communicate critical information.
  • 21. XBRM Transforming Frontline Employees into the First Line of Defense! The Psychology of Homeland Security ™
  • 22. For More Information Extreme Behavioral Risk Management LLC Tel 212.366.8200 Fax 212.366.8558 Web www.xbrm.com Email [email_address] The Psychology of Homeland Security ™