SlideShare a Scribd company logo
1 of 33
Chapter 11 Triggers, Traps, and Working within Incident Command Systems
Objectives ,[object Object],[object Object],[object Object]
Objectives (con’t.) ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-2   Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
Triggers (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traps ,[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-4   The ISO who takes the Bunker Cop approach misses the big picture.
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traps (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Working within Command Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-6   The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-7   The ISO can be part of the solution path, as opposed to just bringing problems to the table.
Figure 11-8   The ISO should strive to be a consultant to the incident commander.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 11-10   An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
Working within Command Systems (con’t.) ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (con’t.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Fire protection engineering
Fire protection engineeringFire protection engineering
Fire protection engineeringchristawilliams
 
0ur fire project..
0ur fire project..0ur fire project..
0ur fire project..kv1 halwara
 
Teaching Firefighters how to draw fire!
Teaching Firefighters how to draw fire!Teaching Firefighters how to draw fire!
Teaching Firefighters how to draw fire!slrichardson
 
Fire Prevention Chapter 3
Fire Prevention Chapter 3Fire Prevention Chapter 3
Fire Prevention Chapter 3Shyla Chaplin
 
Fire Prevention Chapter 2
Fire Prevention Chapter 2Fire Prevention Chapter 2
Fire Prevention Chapter 2Shyla Chaplin
 
Essentials fire6 chapter 6_protection
Essentials fire6 chapter 6_protectionEssentials fire6 chapter 6_protection
Essentials fire6 chapter 6_protectionYoshua Zapata Parrao
 
Chapter 09
Chapter 09Chapter 09
Chapter 09Joe
 
Clt mtb seminar_presentation_seven
Clt mtb seminar_presentation_sevenClt mtb seminar_presentation_seven
Clt mtb seminar_presentation_sevenFWPA
 
Understanding Fire-Rated Assemblies
Understanding Fire-Rated AssembliesUnderstanding Fire-Rated Assemblies
Understanding Fire-Rated AssembliesHector Rubio
 
Smoke Control in Buildings
Smoke Control in BuildingsSmoke Control in Buildings
Smoke Control in BuildingsIllinois ASHRAE
 
[INS301] Fire safety project.ppt
[INS301] Fire safety project.ppt[INS301] Fire safety project.ppt
[INS301] Fire safety project.ppthaiyen261092
 
Fire alarm system_nec_september[1]
Fire alarm system_nec_september[1]Fire alarm system_nec_september[1]
Fire alarm system_nec_september[1]Jennifer Kleinhenz
 
Fire Prevention Measures for High Rise Buildings
Fire Prevention Measures for High Rise BuildingsFire Prevention Measures for High Rise Buildings
Fire Prevention Measures for High Rise BuildingsRanjeet Kumar
 
Smoke extraction in buildings
Smoke extraction in buildingsSmoke extraction in buildings
Smoke extraction in buildingsvysakhmanohar
 
Chapter 07-High-Rise Building Fires
Chapter 07-High-Rise Building FiresChapter 07-High-Rise Building Fires
Chapter 07-High-Rise Building Firessnoshoesam
 
Building Codes And The Design Process
Building Codes And The Design ProcessBuilding Codes And The Design Process
Building Codes And The Design ProcessEric Anderson
 
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E Antea Group
 

Viewers also liked (20)

Fire protection engineering
Fire protection engineeringFire protection engineering
Fire protection engineering
 
0ur fire project..
0ur fire project..0ur fire project..
0ur fire project..
 
Teaching Firefighters how to draw fire!
Teaching Firefighters how to draw fire!Teaching Firefighters how to draw fire!
Teaching Firefighters how to draw fire!
 
Fire Prevention Chapter 3
Fire Prevention Chapter 3Fire Prevention Chapter 3
Fire Prevention Chapter 3
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Fire Prevention Chapter 2
Fire Prevention Chapter 2Fire Prevention Chapter 2
Fire Prevention Chapter 2
 
Essentials fire6 chapter 6_protection
Essentials fire6 chapter 6_protectionEssentials fire6 chapter 6_protection
Essentials fire6 chapter 6_protection
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Clt mtb seminar_presentation_seven
Clt mtb seminar_presentation_sevenClt mtb seminar_presentation_seven
Clt mtb seminar_presentation_seven
 
BS 9999 Fire Engineering
BS 9999 Fire EngineeringBS 9999 Fire Engineering
BS 9999 Fire Engineering
 
Understanding Fire-Rated Assemblies
Understanding Fire-Rated AssembliesUnderstanding Fire-Rated Assemblies
Understanding Fire-Rated Assemblies
 
Smoke Control in Buildings
Smoke Control in BuildingsSmoke Control in Buildings
Smoke Control in Buildings
 
[INS301] Fire safety project.ppt
[INS301] Fire safety project.ppt[INS301] Fire safety project.ppt
[INS301] Fire safety project.ppt
 
Fire alarm system_nec_september[1]
Fire alarm system_nec_september[1]Fire alarm system_nec_september[1]
Fire alarm system_nec_september[1]
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Fire Prevention Measures for High Rise Buildings
Fire Prevention Measures for High Rise BuildingsFire Prevention Measures for High Rise Buildings
Fire Prevention Measures for High Rise Buildings
 
Smoke extraction in buildings
Smoke extraction in buildingsSmoke extraction in buildings
Smoke extraction in buildings
 
Chapter 07-High-Rise Building Fires
Chapter 07-High-Rise Building FiresChapter 07-High-Rise Building Fires
Chapter 07-High-Rise Building Fires
 
Building Codes And The Design Process
Building Codes And The Design ProcessBuilding Codes And The Design Process
Building Codes And The Design Process
 
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E
Life Safety Code: NFPA 101, IFC 2015 & OSHA Subpart E
 

Similar to Chapter 11

6742 Ch 10 PowerPoint.pptx
6742 Ch 10 PowerPoint.pptx6742 Ch 10 PowerPoint.pptx
6742 Ch 10 PowerPoint.pptxNickPalmisano2
 
Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxbartholomeocoombs
 
Ics part 3
Ics part 3Ics part 3
Ics part 3NPSCAVO
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxwviola
 
Ics part 2
Ics part 2Ics part 2
Ics part 2NPSCAVO
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdfNickPalmisano2
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxjeanettehully
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command SystemRyann Castro
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 

Similar to Chapter 11 (20)

6742 Ch 10 PowerPoint.pptx
6742 Ch 10 PowerPoint.pptx6742 Ch 10 PowerPoint.pptx
6742 Ch 10 PowerPoint.pptx
 
Chapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docxChapter 101.  List two passive triggers that an ISO can .docx
Chapter 101.  List two passive triggers that an ISO can .docx
 
Ics part 3
Ics part 3Ics part 3
Ics part 3
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
Level 1 Slides   Lessons 11 15 V4 Wb70 MlLevel 1 Slides   Lessons 11 15 V4 Wb70 Ml
Level 1 Slides Lessons 11 15 V4 Wb70 Ml
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Discuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docxDiscuss the four steps involved in the maintenance of the indicent res.docx
Discuss the four steps involved in the maintenance of the indicent res.docx
 
Ics part 2
Ics part 2Ics part 2
Ics part 2
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf6742 Ch 11 PowerPoint.pdf
6742 Ch 11 PowerPoint.pdf
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docx
 
Incident Command System
Incident Command SystemIncident Command System
Incident Command System
 
Ics
IcsIcs
Ics
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 

More from snoshoesam (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Chapter 11

  • 1. Chapter 11 Triggers, Traps, and Working within Incident Command Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Figure 11-2 Often a simple reminder (a soft intervention) is all that is needed to prevent an injury.
  • 11.
  • 12.
  • 13.
  • 14. Figure 11-4 The ISO who takes the Bunker Cop approach misses the big picture.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Figure 11-6 The ISO must respect the fact that the ultimate authority for firefighter safety rests with the incident commander.
  • 21.
  • 22. Figure 11-7 The ISO can be part of the solution path, as opposed to just bringing problems to the table.
  • 23. Figure 11-8 The ISO should strive to be a consultant to the incident commander.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Figure 11-10 An organizational chart for scaling the ISO function into units, used to bridge an NIMS weakness.
  • 30.
  • 31.
  • 32.
  • 33.