SlideShare a Scribd company logo
Critical Event
Management
March 2020
© Everbridge, Inc. Confidential & Proprietary. 2
We provide enterprise software
applications to improve organizational
response for critical events to help
Everbridge
Keep People Safe and Businesses
Running. Faster.
ASSETS
People
• Employees
• Travelers
• Expatriates
• Visitors
Buildings/Facilities
Supply Chain
• Supply Routes
• Suppliers
IT Systems
Reputation/Brand
RISKEVENTS
Internal
• Workplace/Safety
• System Failures
• Disruptions/Process Failures
• Fraud/Theft
External
• Weather/Natural Disasters
• Terrorism/Civil Unrest
• Disease/Hazmat
• Crime
• Cyber attacks
What Makes a Bad Thing a Critical Event?
CRITICAL
EVENT
Most Common Critical Events
When a critical event occurs…
Increased Business & Employee Impact
Increased Time to Resolve
Is that event
important to us?
• Where is it?
• What are the impacts?
• Is it a reliable source?
Activate Plan?
• Find the plan?
• Notify & account for
constituents?
• Keep executives
informed?
Who is impacted?
• Campus employees?
• Travelers? Visitors?
• Branch Offices?
• Manufacturing?
After Action
Reports?
• Audit trails?
• Response
Improvements?
When a critical event occurs…
Minimize Impact
Accelerate Time to Resolve
Know
early
Know
the
impact
Respond
Quickly
Know
how you
did
© Everbridge, Inc. Confidential & Proprietary. 7
Event Communication to Critical Event Management
Company
Founded
2002-2011
• Aware
• SmartGIS
• Matrix
Mass
Notification
2012
• Everbridge Suite
launched
• Leader in
Gartner Magic
Quadrant
Safety
Connection
2016
• Safety
Connection
launched
• EVBG IPO
Visual
Command
Center
2017
• Crisis
Commander
acquisition
• IDV Software
acquisition
Nixle
2015
• Community
Engagement &
Secure
Messaging
launched
• DHS SAFETY
Certification
IT
Alerting
• Vocal acquisition
• New European
data centers
• Leader in Gartner
Magic Quadrant
20142013
• Incident
Management
launched
• IPAWS
integration
Incident
Management
Population
Alerting
2018
• UMS
acquisition
• Respond
acquisition
• PlanetRisk
acquisition
• FedRAMP
Certified
Crisis
Management
2019
• Crisis
Management
launched
• Mission Mode
acquisition
• NC4
acquisition
• ISO 27001
Certified
© Everbridge, Inc. Confidential & Proprietary. 8
EVERBRIDGE OPEN
SECURITY &
DATA PRIVACY
CONTACT &
ASSET MGMT
SCALABILITY &
RELIABILITY
REPORTING &
ANALYTICS
SELF SERVICE
ADMIN
LOCATION
SERVICES
MOBILE
SERVICES
GLOBAL
COMMS &
COLLABORATION
EVERBRIDGE PLATFORM
Security & Risk I Line of Business l Information Technology
CRO CSO COO CHRO CFO CIO CISO
LIFE SAFETY OPERATIONAL
CORRELATION ORCHESTRATION
360for MOBILITYfor SAFETY &
CONTINUITY
ASSESS
Events
LOCATE
Impacted
People and
Assets
ACT
ANALYZE
Performance
Initiate and
Manage
Response
ASSESS
Events
LOCAT
Assess: Alert, Context , and Reference Risk Data Sources
AIRPORT
WEATHER
CCTV
SOCIAL
MEDIA
MAP
IMAGERY
TRAFFIC
COUNTRY RISK
PROFILE
NIXLE
ADVISORY
CONTEXT
TRANSPORTATION
LAW
ENFORCEMENT
GEOGRAPHY
BANKING/
FINANCIAL
EMERGENCY
MANAGEMENT
EDUCATIONENERGY
WATER CONSUMER
ATTRACTIONS
CHEMICALS
REFERENCEALERT
EARTHQUAKE
AMBER
ALERT
GANGS
DRUG
INTERDICTION
AVIATION
INCIDENT
TERROR
FIRE
FLOOD
BORDER
SECURITY
FOOD & DRUG
INCIDENT
ACTIVISM
HAZMAT
OUTBREAKHURRICANE
VOLCANO
SYSTEM
WARNING
WILDFIRES
WINTER
INCIDENT
TORNADO TWITTER
INCIDENT
CYBERIT
OUTAGE
PUBLIC
CRISES
CLINICAL
DISCHARGE
SUPPLY
CHAIN
PRODUCT
RECALL
IT TICKET SYSTEM
ALERT
Boil Water Advisory
Food Advisory
Homeland Security
Advisory
Meteorological Advisory
Planned Event
Planned Protest
Planned Strike
Public Health Advisory
Public Safety Advisory
Supply Chain Disruption
Terrorism Advisory
Travel Advisory
Advisory
Armed Clash
Bank Robbery
Bomb Threat
Civil Unrest
Coup
Curfew
Disturbance
Explosion
Explosive Device
Hostage Situation
Insurgent Attack
Military Operation
Officer-Involved Shooting
Planned Protest
Police Activity
Protest
Rally
Riot
Robbery
School Lock Down
Shooting
Stabbing
Stampede
Suspicious Device
Suspicious Package
Violent Crime
Biohazard
Chemical Spill
Explosive Materials
Fuel Spill
Fumes
Hazmat Response
Natural Gas Leak
Oil Spill
Radioactive Material
Unknown Substance
Hazmat
Cargo Transportation Strike
Civil Service Strike
Energy Sector Strike
General Strike
Industrial Strike
Medical Services Strike
Mine Workers Strike
Port Strike
Aviation Worker Strike
Public Transportation Strike
Labor
1- Alarm Fire
2- Alarm Fire
3- Alarm Fire
4- Alarm Fire
5- Alarm Fire
6- Alarm Fire
Brush Fire
Electrical Fire
Explosion
High Rise Fire
Industrial Fire
Maritime Fire
Structure Fire
Train Fire
Vehicle Fire
Wildfire
FireSecurity
Bridge Collapse
Building Collapse
Dam Collapse
Mine Incident
Partial Collapse
Structure Collapse
Tunnel Collapse
Unsafe Structure
Structural
Atmospheric/Space
Avalanche
Earthquake
Landslide
Sinkhole
Tsunami
Volcano
Geophysical
Air Travel Delay
Aircraft Fire
Aircraft Incident
Airspace Restriction
Airliner Crash
Airport Closure
Plane Crash
Emergency Landing
Helicopter Crash
Aviation Infrastructure
Disease Outbreak
Public Health
Quarantine
Health
Blizzard
Flooding
Hurricane
Ice Storm
Storm
Tornado
Tropical
Cyclone
Tropical Storm
Meteorological
Border Closure
Maritime Incident
Motor Vehicle Accident
Port Closure
Public Transportation
Disruption
Roadway Closure
Train Accident
Train Derailment
Waterway Closure
Transportation
Bio-Terrorism
Bombing
Chemical Terrorism
Advisory
Nuclear Device
Radiological
Terrorist Attack
Terrorism
Comprehensive, All Hazard Coverage – 142 Incident Types
Fuel Disruption
Network Outage
Power Outage
Product Stoppage
Rolling Blackout
Sewage Problem
Telecom Outage
Water Main Break
Water Outage
Other
Evacuation
?
You Choose
Distance
You can set distance by severity
+
Severity Level
Incident Type(s)
+
Highly Granular Alerting Profiles for Assets
Dorian
• 15M + messages sent
• Special Reports
• Hyper-local Alerts
STATIC MANUAL LAST KNOWN EXPECTED
Aggregate Location Data from Multiple Sources
MOBILE AWARE
Everbridge mobile app check-ins
ACCESS AWARE
LAST KNOWN LOCATIONS
WEARABLES for
SOS & Safe Corridor
MANUAL LOCATIONS
MANUAL UPDATE
of Locations
• Muster points
• Safety Check calls
EXPECTED LOCATIONS
OFFICE 365
SCHEDULE AWARE
TRAVEL AWARE
TRAVELMANAGEMENT
SERVICES
TRAVELITINERARY
AGGREGATOR
Travel PNR Details
NON-EMERGENCY EMERGENCY!
LOCATE: Two Way Communications
Locate: “Wearables
Easy access to SOS Panic Button
ACT
Initiate and
Manage
Response
ACT: Earthquake
A magnitude 7.2
earthquake strikes the
greater Costa Mesa, CA
area
ACT: Automate Response
• Activate a Plan including documents and images
• Assign & Track Tasks
• Report issues and send pictures
• Notify victims and stakeholders
LAUNCH CRITICAL EVENT
7.2 EARTHQUAKE STRIKES , COSTA MESA, CA
An earthquake with preliminary magnitude of 7.2 has struck
43 miles north of Tokyo. Initial reports show there is
significant damage with likely causalities.
ACTIVATE PLAN
EARTHQUAKE JAPAN PLAN
7.2 EARTHQUAKE STRIKES TOKYO, JAPAN
ACT
Initiate and
Manage
Response
I’m OK
AUTOMATICALLY SEND THE MESSAGE EVALUATE RESPONSES PRESCRIBE ACTION AS NEEDED
“An
earthquake
has impacted
your area !”
Wellness Check
I need help!
Pending
ACT: Automate Wellness Check
40+ Delivery Methods &
Publishing Options
Multiple contact selectionsMultiple methods per recipient
Everbridge ENS: Flexibility & Reach
Individuals
Groups
Rules
Map
Initiate and
Manage
Response
ANALYZE
Performance
ANALYZE: Drive Continuous Improvement
TEAM
PERFORMANCEAAR
OPERATIONAL
RESPONSEBENCHMARKS
DETAILED
NOTIFICATION
ANALYSIS
ANALYZE: Automated Situation Reports
+ All activity is logged and available in real time
+ All details are available in the situation report
After the event is over, you can evaluate various aspects of your performance. All activities in
Everbridge are logged, and important data – like commentary on preparation and metrics on your
message delivery times and response rates – can help you identify any gaps in your process.
ANALYZE: Measure Response Trends
ASSESS
Events
LOCATE
Impacted
People and
Assets
ACT
Initiate and
Manage
Response
ANALYZE
Performance
Everbridge Critical Event Management
Information
Technology
Supply
Chain
Employee
Life Safety
Business
Continuity
With CEM…
• Hospitality chain
kept more hotels
open during
Hurricane Irma
• Food retailer was
able to staff stores
during a natural
disaster
• Tech company
now ensures all
staff safe within
15 minutes
• Oil exploration
company now
operates in 3
riskier geographies
because they can
keep people safer
• Auto Co eliminated
downtime from
supply chain
disruptions costing
$20K per minute
• Pharmacy chain
able to avoid supply
chain disruptions
and ensure insulin
gets to patients
• US restaurant
chain reduced
system downtime
to recover $3M
• Telco provider cut
response time from
30 minutes to 5 to
improve customer
service
Everbridge Platform: HighAvailability, Scale, Redundancy & Secure
Transactional Availability / “First Responder Grade”
HIGH
AVAILABILITY
& SCALABILITY
15 data centers,
flexible capacity,
and full stack
redundancy
MULTIPLE LIVE
SUPPORT
TEAMS
Global live support
team with
24x7x365
tier 1 and tier 2
staffing and live
operator service
REDUNDANCY
ACROSS MAJOR
MODALITIES
Multiple SMS and
voice providers
vetted to ensure
no downstream
inter-dependencies,
optimized for
local delivery
SMS
REDUNDANT
NOC’S
Two geographically
distributed NOC’s
staffed 24x7x365
LEADING
SECURITY &
COMPLIANCE
Multiple
certifications
confirmed by
accredited 3rd party
auditors
Public Warning
Product Overview
Everbridge Public Warning
Multi-modal approach to
protecting population featuring
Location-Based SMS
Unique IP
Leverages telco
infrastructure to
anonymously locate
all people in an area
without predefined
databases based on
their connection to
cell towers
Most Common Alternatives
Cell Broadcast
+ One-way blast messages
to all phones in an area
+ Requires newer phones or
re-configuration
Mobile Application
+ Requires download
Higher Reach
90%+
REACH
GLOBALLY
50-60%
for Cell
Broadcast-
based
solutions
VS.
Reach Visitors and Tourists
Automatically detect nationality based on SIM card and
tailor messages by language
Unique Follow-Up Messaging Capability
Send follow-up
messages or
corrections
Traveler Alert System
Locate and
communicate
with nationals
traveling abroad
Questions

More Related Content

What's hot

ServiceNow Configuration Management Database
ServiceNow Configuration Management Database ServiceNow Configuration Management Database
ServiceNow Configuration Management Database
Jade Global
 
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFSRobotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Idan Tohami
 
Deal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayDeal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL Way
Linpei Zhang
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
Top 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About ThemTop 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About Them
SolarWinds
 
ITIL Service Level Agreement Template
ITIL Service Level Agreement TemplateITIL Service Level Agreement Template
ITIL Service Level Agreement Template
Flevy.com Best Practices
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident Management
NorthCoastHDI
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
Flevy.com Best Practices
 
Applying for Driving License
Applying for Driving License Applying for Driving License
Applying for Driving License
Hemkund Tata
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
Prasad Deshpande
 
Microsoft Volume Licensing Basics
Microsoft Volume Licensing BasicsMicrosoft Volume Licensing Basics
Microsoft Volume Licensing Basics
FlorisKlaver1
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
guest75acf2
 
Managed Services Support
Managed Services SupportManaged Services Support
Managed Services Support
jdivalerio
 
Example Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow DiagramExample Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow Diagram
Equilibria, Inc.
 
Customer service presentation
Customer service presentationCustomer service presentation
Customer service presentation
Israel Murillo Hernández
 
Topic 9 handling difficult guests
Topic 9 handling difficult guestsTopic 9 handling difficult guests
Topic 9 handling difficult guests
sly mot
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdeskArchana Negi
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
KHNOG
 
Excellent customer service
Excellent customer serviceExcellent customer service
Excellent customer service
Lorenta Erhabor
 

What's hot (20)

ServiceNow Configuration Management Database
ServiceNow Configuration Management Database ServiceNow Configuration Management Database
ServiceNow Configuration Management Database
 
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFSRobotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
 
Deal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL WayDeal With Production Issues - The ITIL Way
Deal With Production Issues - The ITIL Way
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
ITIL Service Desk
 
Top 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About ThemTop 3 Help Desk Challenges & What You Can Do About Them
Top 3 Help Desk Challenges & What You Can Do About Them
 
ITIL Service Level Agreement Template
ITIL Service Level Agreement TemplateITIL Service Level Agreement Template
ITIL Service Level Agreement Template
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident Management
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
 
Applying for Driving License
Applying for Driving License Applying for Driving License
Applying for Driving License
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
 
Microsoft Volume Licensing Basics
Microsoft Volume Licensing BasicsMicrosoft Volume Licensing Basics
Microsoft Volume Licensing Basics
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
 
Managed Services Support
Managed Services SupportManaged Services Support
Managed Services Support
 
Example Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow DiagramExample Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow Diagram
 
Customer service presentation
Customer service presentationCustomer service presentation
Customer service presentation
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
Topic 9 handling difficult guests
Topic 9 handling difficult guestsTopic 9 handling difficult guests
Topic 9 handling difficult guests
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdesk
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
Excellent customer service
Excellent customer serviceExcellent customer service
Excellent customer service
 

Similar to TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic with Everbridge

Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
Jisc
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
 
Benchmarking risk againt national data
Benchmarking risk againt national data   Benchmarking risk againt national data
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
tim_owen
 
Professional Ethics in Engineering
Professional Ethics in Engineering Professional Ethics in Engineering
Professional Ethics in Engineering
Karthikeyan I
 
Life On-Call, Availa-liberty, and the Pursuit of Happiness
Life On-Call, Availa-liberty, and the Pursuit of HappinessLife On-Call, Availa-liberty, and the Pursuit of Happiness
Life On-Call, Availa-liberty, and the Pursuit of Happiness
Dave Cliffe
 
PSG.ppt
PSG.pptPSG.ppt
PSG.ppt
kapilshah34
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
AMIT SAHU
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
AMIT SAHU
 
515 Changing Faces of Loss Control - Safety 2015 FinalMMurray
515 Changing Faces of Loss Control - Safety 2015 FinalMMurray515 Changing Faces of Loss Control - Safety 2015 FinalMMurray
515 Changing Faces of Loss Control - Safety 2015 FinalMMurrayMichael F. Murray
 
Incident Response
Incident Response Incident Response
Incident Response
InnoTech
 
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdfreStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
Ken Fuller
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
ISA Boston Section
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
Tudor Damian
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
iqbal524087
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
Inuit AB
 
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
Global Business Intel
 
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdfreStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
Ken Fuller
 

Similar to TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic with Everbridge (20)

Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
Benchmarking risk againt national data
Benchmarking risk againt national data   Benchmarking risk againt national data
Benchmarking risk againt national data
 
Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
 
Professional Ethics in Engineering
Professional Ethics in Engineering Professional Ethics in Engineering
Professional Ethics in Engineering
 
Life On-Call, Availa-liberty, and the Pursuit of Happiness
Life On-Call, Availa-liberty, and the Pursuit of HappinessLife On-Call, Availa-liberty, and the Pursuit of Happiness
Life On-Call, Availa-liberty, and the Pursuit of Happiness
 
PSG.ppt
PSG.pptPSG.ppt
PSG.ppt
 
Risk
RiskRisk
Risk
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 
515 Changing Faces of Loss Control - Safety 2015 FinalMMurray
515 Changing Faces of Loss Control - Safety 2015 FinalMMurray515 Changing Faces of Loss Control - Safety 2015 FinalMMurray
515 Changing Faces of Loss Control - Safety 2015 FinalMMurray
 
Incident Response
Incident Response Incident Response
Incident Response
 
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdfreStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
reStartEvents 5:25 Nationwide All-Clearances Employer Directory.pdf
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Risk
RiskRisk
Risk
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
 
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdfreStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
reStartEvents 11:16 DC metro & Beyond Employer Directory.pdf
 

More from SaraPia5

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
SaraPia5
 
AppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersAppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus Partners
SaraPia5
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with Everbridge
SaraPia5
 
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
SaraPia5
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
SaraPia5
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
SaraPia5
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
SaraPia5
 
Creating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurrayCreating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard Murray
SaraPia5
 
The Strategy of Platforms
The Strategy of PlatformsThe Strategy of Platforms
The Strategy of Platforms
SaraPia5
 
How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.
SaraPia5
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
SaraPia5
 
Finding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabFinding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNab
SaraPia5
 
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramAmy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
SaraPia5
 
Security Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor HersomSecurity Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor Hersom
SaraPia5
 
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
SaraPia5
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP Engineering
SaraPia5
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusLinkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
SaraPia5
 
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskThe Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
SaraPia5
 

More from SaraPia5 (20)

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
 
AppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersAppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus Partners
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with Everbridge
 
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
 
Creating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurrayCreating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard Murray
 
The Strategy of Platforms
The Strategy of PlatformsThe Strategy of Platforms
The Strategy of Platforms
 
How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Finding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabFinding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNab
 
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramAmy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
 
Security Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor HersomSecurity Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor Hersom
 
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP Engineering
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusLinkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
 
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskThe Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic with Everbridge

  • 2. © Everbridge, Inc. Confidential & Proprietary. 2 We provide enterprise software applications to improve organizational response for critical events to help Everbridge Keep People Safe and Businesses Running. Faster.
  • 3. ASSETS People • Employees • Travelers • Expatriates • Visitors Buildings/Facilities Supply Chain • Supply Routes • Suppliers IT Systems Reputation/Brand RISKEVENTS Internal • Workplace/Safety • System Failures • Disruptions/Process Failures • Fraud/Theft External • Weather/Natural Disasters • Terrorism/Civil Unrest • Disease/Hazmat • Crime • Cyber attacks What Makes a Bad Thing a Critical Event? CRITICAL EVENT
  • 5. When a critical event occurs… Increased Business & Employee Impact Increased Time to Resolve Is that event important to us? • Where is it? • What are the impacts? • Is it a reliable source? Activate Plan? • Find the plan? • Notify & account for constituents? • Keep executives informed? Who is impacted? • Campus employees? • Travelers? Visitors? • Branch Offices? • Manufacturing? After Action Reports? • Audit trails? • Response Improvements?
  • 6. When a critical event occurs… Minimize Impact Accelerate Time to Resolve Know early Know the impact Respond Quickly Know how you did
  • 7. © Everbridge, Inc. Confidential & Proprietary. 7 Event Communication to Critical Event Management Company Founded 2002-2011 • Aware • SmartGIS • Matrix Mass Notification 2012 • Everbridge Suite launched • Leader in Gartner Magic Quadrant Safety Connection 2016 • Safety Connection launched • EVBG IPO Visual Command Center 2017 • Crisis Commander acquisition • IDV Software acquisition Nixle 2015 • Community Engagement & Secure Messaging launched • DHS SAFETY Certification IT Alerting • Vocal acquisition • New European data centers • Leader in Gartner Magic Quadrant 20142013 • Incident Management launched • IPAWS integration Incident Management Population Alerting 2018 • UMS acquisition • Respond acquisition • PlanetRisk acquisition • FedRAMP Certified Crisis Management 2019 • Crisis Management launched • Mission Mode acquisition • NC4 acquisition • ISO 27001 Certified
  • 8. © Everbridge, Inc. Confidential & Proprietary. 8 EVERBRIDGE OPEN SECURITY & DATA PRIVACY CONTACT & ASSET MGMT SCALABILITY & RELIABILITY REPORTING & ANALYTICS SELF SERVICE ADMIN LOCATION SERVICES MOBILE SERVICES GLOBAL COMMS & COLLABORATION EVERBRIDGE PLATFORM Security & Risk I Line of Business l Information Technology CRO CSO COO CHRO CFO CIO CISO LIFE SAFETY OPERATIONAL CORRELATION ORCHESTRATION 360for MOBILITYfor SAFETY & CONTINUITY
  • 11. Assess: Alert, Context , and Reference Risk Data Sources AIRPORT WEATHER CCTV SOCIAL MEDIA MAP IMAGERY TRAFFIC COUNTRY RISK PROFILE NIXLE ADVISORY CONTEXT TRANSPORTATION LAW ENFORCEMENT GEOGRAPHY BANKING/ FINANCIAL EMERGENCY MANAGEMENT EDUCATIONENERGY WATER CONSUMER ATTRACTIONS CHEMICALS REFERENCEALERT EARTHQUAKE AMBER ALERT GANGS DRUG INTERDICTION AVIATION INCIDENT TERROR FIRE FLOOD BORDER SECURITY FOOD & DRUG INCIDENT ACTIVISM HAZMAT OUTBREAKHURRICANE VOLCANO SYSTEM WARNING WILDFIRES WINTER INCIDENT TORNADO TWITTER INCIDENT CYBERIT OUTAGE PUBLIC CRISES CLINICAL DISCHARGE SUPPLY CHAIN PRODUCT RECALL IT TICKET SYSTEM ALERT
  • 12. Boil Water Advisory Food Advisory Homeland Security Advisory Meteorological Advisory Planned Event Planned Protest Planned Strike Public Health Advisory Public Safety Advisory Supply Chain Disruption Terrorism Advisory Travel Advisory Advisory Armed Clash Bank Robbery Bomb Threat Civil Unrest Coup Curfew Disturbance Explosion Explosive Device Hostage Situation Insurgent Attack Military Operation Officer-Involved Shooting Planned Protest Police Activity Protest Rally Riot Robbery School Lock Down Shooting Stabbing Stampede Suspicious Device Suspicious Package Violent Crime Biohazard Chemical Spill Explosive Materials Fuel Spill Fumes Hazmat Response Natural Gas Leak Oil Spill Radioactive Material Unknown Substance Hazmat Cargo Transportation Strike Civil Service Strike Energy Sector Strike General Strike Industrial Strike Medical Services Strike Mine Workers Strike Port Strike Aviation Worker Strike Public Transportation Strike Labor 1- Alarm Fire 2- Alarm Fire 3- Alarm Fire 4- Alarm Fire 5- Alarm Fire 6- Alarm Fire Brush Fire Electrical Fire Explosion High Rise Fire Industrial Fire Maritime Fire Structure Fire Train Fire Vehicle Fire Wildfire FireSecurity Bridge Collapse Building Collapse Dam Collapse Mine Incident Partial Collapse Structure Collapse Tunnel Collapse Unsafe Structure Structural Atmospheric/Space Avalanche Earthquake Landslide Sinkhole Tsunami Volcano Geophysical Air Travel Delay Aircraft Fire Aircraft Incident Airspace Restriction Airliner Crash Airport Closure Plane Crash Emergency Landing Helicopter Crash Aviation Infrastructure Disease Outbreak Public Health Quarantine Health Blizzard Flooding Hurricane Ice Storm Storm Tornado Tropical Cyclone Tropical Storm Meteorological Border Closure Maritime Incident Motor Vehicle Accident Port Closure Public Transportation Disruption Roadway Closure Train Accident Train Derailment Waterway Closure Transportation Bio-Terrorism Bombing Chemical Terrorism Advisory Nuclear Device Radiological Terrorist Attack Terrorism Comprehensive, All Hazard Coverage – 142 Incident Types Fuel Disruption Network Outage Power Outage Product Stoppage Rolling Blackout Sewage Problem Telecom Outage Water Main Break Water Outage Other Evacuation ?
  • 13. You Choose Distance You can set distance by severity + Severity Level Incident Type(s) + Highly Granular Alerting Profiles for Assets
  • 14.
  • 15. Dorian • 15M + messages sent • Special Reports • Hyper-local Alerts
  • 16. STATIC MANUAL LAST KNOWN EXPECTED Aggregate Location Data from Multiple Sources MOBILE AWARE Everbridge mobile app check-ins ACCESS AWARE LAST KNOWN LOCATIONS WEARABLES for SOS & Safe Corridor MANUAL LOCATIONS MANUAL UPDATE of Locations • Muster points • Safety Check calls EXPECTED LOCATIONS OFFICE 365 SCHEDULE AWARE TRAVEL AWARE TRAVELMANAGEMENT SERVICES TRAVELITINERARY AGGREGATOR
  • 19. Locate: “Wearables Easy access to SOS Panic Button
  • 21. ACT: Earthquake A magnitude 7.2 earthquake strikes the greater Costa Mesa, CA area
  • 22. ACT: Automate Response • Activate a Plan including documents and images • Assign & Track Tasks • Report issues and send pictures • Notify victims and stakeholders LAUNCH CRITICAL EVENT 7.2 EARTHQUAKE STRIKES , COSTA MESA, CA An earthquake with preliminary magnitude of 7.2 has struck 43 miles north of Tokyo. Initial reports show there is significant damage with likely causalities. ACTIVATE PLAN EARTHQUAKE JAPAN PLAN 7.2 EARTHQUAKE STRIKES TOKYO, JAPAN
  • 23.
  • 24.
  • 25.
  • 27. I’m OK AUTOMATICALLY SEND THE MESSAGE EVALUATE RESPONSES PRESCRIBE ACTION AS NEEDED “An earthquake has impacted your area !” Wellness Check I need help! Pending ACT: Automate Wellness Check
  • 28. 40+ Delivery Methods & Publishing Options Multiple contact selectionsMultiple methods per recipient Everbridge ENS: Flexibility & Reach Individuals Groups Rules Map
  • 30. ANALYZE: Drive Continuous Improvement TEAM PERFORMANCEAAR OPERATIONAL RESPONSEBENCHMARKS DETAILED NOTIFICATION ANALYSIS
  • 31. ANALYZE: Automated Situation Reports + All activity is logged and available in real time + All details are available in the situation report
  • 32. After the event is over, you can evaluate various aspects of your performance. All activities in Everbridge are logged, and important data – like commentary on preparation and metrics on your message delivery times and response rates – can help you identify any gaps in your process. ANALYZE: Measure Response Trends
  • 35. Information Technology Supply Chain Employee Life Safety Business Continuity With CEM… • Hospitality chain kept more hotels open during Hurricane Irma • Food retailer was able to staff stores during a natural disaster • Tech company now ensures all staff safe within 15 minutes • Oil exploration company now operates in 3 riskier geographies because they can keep people safer • Auto Co eliminated downtime from supply chain disruptions costing $20K per minute • Pharmacy chain able to avoid supply chain disruptions and ensure insulin gets to patients • US restaurant chain reduced system downtime to recover $3M • Telco provider cut response time from 30 minutes to 5 to improve customer service
  • 36. Everbridge Platform: HighAvailability, Scale, Redundancy & Secure Transactional Availability / “First Responder Grade” HIGH AVAILABILITY & SCALABILITY 15 data centers, flexible capacity, and full stack redundancy MULTIPLE LIVE SUPPORT TEAMS Global live support team with 24x7x365 tier 1 and tier 2 staffing and live operator service REDUNDANCY ACROSS MAJOR MODALITIES Multiple SMS and voice providers vetted to ensure no downstream inter-dependencies, optimized for local delivery SMS REDUNDANT NOC’S Two geographically distributed NOC’s staffed 24x7x365 LEADING SECURITY & COMPLIANCE Multiple certifications confirmed by accredited 3rd party auditors
  • 38.
  • 39. Everbridge Public Warning Multi-modal approach to protecting population featuring Location-Based SMS
  • 40. Unique IP Leverages telco infrastructure to anonymously locate all people in an area without predefined databases based on their connection to cell towers
  • 41. Most Common Alternatives Cell Broadcast + One-way blast messages to all phones in an area + Requires newer phones or re-configuration Mobile Application + Requires download
  • 43. Reach Visitors and Tourists Automatically detect nationality based on SIM card and tailor messages by language
  • 44. Unique Follow-Up Messaging Capability Send follow-up messages or corrections
  • 45. Traveler Alert System Locate and communicate with nationals traveling abroad