Introduction to the DM Program and DMIS Tools
|
|
|
- Brianne Logan
- 9 years ago
- Views:
Transcription
1 Introduction to the DM Program and DMIS Tools 1
2 Topics Outline DM Program Overview DMIS Demo Registration Info 2
3 Disaster Management (DM) E-Gov One of President s 24 E-Government interagency initiatives established by the Office of Management and Budget Objective: Improve all-hazards incident response and recovery by creating the ability to securely share information across the Nation s emergency management community. 3
4 DM Program Components Open Platform for Emergency Networks (OPEN) Interoperability infrastructure enabling alert and incident information sharing Disaster Management Interoperability Services (DMIS) Provides basic incident management software tools Messaging Standards Initiative (DHS S&T/OIC) Public-private partnership creating messaging standards Facilitates information sharing between disparate incident management systems and software applications 4
5 How do OPEN, DMIS & Messaging Standards relate? OPEN provides a backbone that allows data sharing to occur between distributed & disparate systems. DMIS provides a basic incident management toolset to groups that have no mechanism, so they can manage and share information with others through OPEN. DMIS and OPEN both use Collaborative Operating Groups (COGs) as addresses to identify groups with which to share data. Messaging Standards provides the standards by which disparate systems can develop interfaces to OPEN so that they may share data. 5
6 What is DMIS? DMIS is a client server based system That means software must be loaded onto a user s local workstation, which enables it to communicate with a server through the Internet. This architecture allows users to share data with others, yet still have some limited local capability if Internet connectivity is lost. DMIS is not web-based DMIS uses a VPN (Virtual Private Network) to ensure privacy Local Group Administrators control the users in their own group... more on that later 6
7 What is a COG? A COG is a group of DMIS Operators who need to coordinate actions and work on incident records together using the DMIS Tools A COG can also be a group using an outside system interfaced to OPEN to share Alerts A COG could represent a County Emergency Management Office, Police/Fire Department, State EM, Tribal EM, Federal Agency, etc. 7
8 How do COGs work with DMIS? Internal COG Collaboration Create, update information collaboratively Members with appropriate privileges: Have updates as information is saved Can edit the information External COG Information Sharing Directed (posted) to selected COGs Recipients can view information and then comment using on-line chat (Messenger) Recipients can forward snapshots of information if originator grants permissions 8
9 How do COGs work with OPEN? External COG Information Sharing Directs Alerts to other COGs using CAP standard message formats 9
10 DMIS Tools Capabilities Tactical Information Exchange Mapping with collaborative markups Incident Information Sharing Weather Observations Journal with auto time/date stamp DMIS Messenger Common Alerting Protocol (CAP) Alerts NOAA HazCollect interface 10
11 DMIS Demo 11
12 NOAA HazCollect NWEM Authoring Tool Sample screen shot of NWEM Alert NWEM Alerts would be displayed in a format that is native to your software app or device NWEMs provide critical and actionable info 12
13 How Do I Establish a DM COG? Register for a COG at Select Enter Website then Register then Registration Form. Complete and submit the form. Use the Remarks field to state how the group wants to use DMIS Tools or DM OPEN. Only one person per group needs to register. The local Group Admin can create additional users Please be explicit as to how your group intends to use the COG (how large the COG is projected to be, membership construct, the group s current business process and how it wants DMIS or OPEN to automate that, planned frequency of use, etc.) It will take several days for the DM Team to validate the request, create accounts and then DMIS download information, account logins and initial training links. 13
Technological Advances In Emergency Management
Technological Advances In Emergency Management Closing the gap between Preparation and Recovery Will Fontan, P.E. Regional Director, ONRG Americas Office Priorities of Technology Application Government-led
Centrix Helps Banks Manage Risk Optimize Efficiency Simplify Compliance
Western States User Group Centrix Helps Banks Manage Risk Optimize Efficiency Simplify Compliance Brad Johnson Director of Business Development Email - [email protected] Software Solutions
1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
HSIN R3 User Accounts: Manual Identity Proofing Process
for the HSIN R3 User Accounts: Manual Identity Proofing Process DHS/OPS/PIA-008(a) January 15, 2013 Contact Point James Lanoue DHS Operations HSIN Program Management Office (202) 282-9580 Reviewing Official
Instant Messenger Operator Manual
Instant Messenger Operator Manual Introduction The Sparks Instant Messenger client not only allows for general chat services but also provides departments who offer customer service to provide an additional
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Composite Enterprise Architecture: The Direction of FEMA s EA
UNCLASSIFIED/FOUO Composite Enterprise Architecture: The Direction of FEMA s EA Ira Grossman Chief Enterprise Architect June 8, 2009 FEMA Enterprise Architecture Objective - Intuitive visualization that
Deploying ArcGIS for Server Using Esri Managed Services
Federal GIS Conference 2014 February 10 11, 2014 Washington DC Deploying ArcGIS for Server Using Esri Managed Services Andrew Sakowicz Erin Ross Cloud Overview Deploying ArcGIS for Server What is Cloud:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Core Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX
Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile
Deploying ArcGIS for Server using Managed Services
2013 Esri International User Conference July 8 12, 2013 San Diego, California Technical Workshop Deploying ArcGIS for Server using Managed Services Erin Ross Andrew Sakowicz Esri UC2013. Technical cal
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Linux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
Android App Quick Start Guide
Android App Quick Start Guide We have made this app available FREE to all members of entities that have a current subscription to IamResponding.com. If you are not a member of an entity with a current
Computer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
Sametime 101: Feature Overview. Roberto Chiabra IBM Certified IT Specialist
Sametime 101: Feature Overview Roberto Chiabra IBM Certified IT Specialist IBM Sametime software 101: Feature Overview Rich Presence Enterprise Instant Messaging Mobility Online Meetings Voice & Video
Bulk Downloader. Call Recording: Bulk Downloader
Call Recording: Bulk Downloader Contents Introduction... 3 Getting Started... 3 Configuration... 4 Create New Job... 6 Running Jobs... 7 Job Log... 7 Scheduled Jobs... 8 Recent Runs... 9 Storage Device
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS
Outlook Web Access (OWA) QUESTIONS Q1. With OWA and ActiveSync going away, how does an employee/contractor access Outlook (email, calendar and contacts)? A1. An employee must use their government/contractor
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
Customers can select one or more of our services as per their requirements.
Introduction Now Solutions is a dynamic company that offers a variety of IT services for small to medium sized businesses. This info pack describes the spectrum of services that are available to our customers.
Remote Access Procedure. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
Implementing a Microsoft SQL Server 2005 Database
This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led
Cisco Jabber IM for iphone
Data Sheet Cisco Jabber IM for iphone Cisco Collaboration Solutions improve team and customer experiences to help organizations encourage innovation and improve decision making while building trust and
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
[email protected] 2009 STREAM FRBC
Virtualization ti Dave Balka [email protected] Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Using Delphix Server with Microsoft SQL Server (BETA)
Using Delphix Server with Microsoft SQL Server (BETA) Table of Contents Architecture High level components in linking a SQL Server database to Delphix High level components in provisioning a SQL Server
AppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction
Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction Each time that this test is taken online, questions and answers are scrambled to protect the integrity of the exam Completion
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
MarkVision printer management software
MarkVision printer management software MarkVision for Windows 95/98/2000, Windows NT 4.0, and Macintosh is shipped with your printer on the Drivers, MarkVision and Utilities CD. 1 The MarkVision graphical
Mobile Access Software Blade
Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.
Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com
Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident
Core Filtering Admin Guide
Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Essential Components of Emergency Management Plans at Community Health Centers Crosswalk of Plan Elements
Plan Components Health centers will have an emergency management plan Plan and organization are NIMS compliant Bureau of Primary Health Care Policy Information Notice 2007-15 Plans and procedures for emergency
Code - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
VOLICO. Backup Service Solutions. Enterprise Hosting Solutions. 888 865 4261 [email protected] www.volico.com
888 865 4261 [email protected] www.volico.com Data Disasters: Don t Wait Until It s Too Late! Malware Theft Flood Corruption Hurricane Fire Tornado Viruses Drive Failure Earthquake Be prepared before disaster
One-Man Shop. How to build a functional security program with limited resources DEF CON 22
One-Man Shop How to build a functional security program with limited resources DEF CON 22 One-Man Shop Agenda Caveats & Considerations People and Processes Network Architecture System Design Continuous
Email: [email protected] Tel: 020 3 195 3897 Kemp House 152-160 City Road London EC1V 2NX. Dynamics CRM Sales Process Case Study
Email: [email protected] Tel: 020 3 195 3897 Kemp House 152-160 City Road London EC1V 2NX Dynamics CRM Sales Process Case Study 1 C o n te n t s 1 CONTENTS... 1 2 OVERVIEW... 2 2.1 Project Background...2
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
How To Develop A Cloud In Hong Kong
The Cloud Journey From Planning to Action Mr. Victor Lam Deputy Government Chief Information Officer (Consulting and Operations) 1 Is Cloud Computing New? John McCarthy Computation may someday be organized
Installing VinNOW Client Computers
Installing VinNOW Client Computers Please review this entire document prior to proceeding Client computers must use UNC path for database connection and can t be connected using a mapped network drive.
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015
Maryland Preparedness Planning Certificate Program Pilot 2014 2015 Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 A Center for Preparedness Excellence A Center for
OPERATIONS DASHBOARD A PILOT PROJECT FOR SECURITY OPERATIONS SCAUG 2014
OPERATIONS DASHBOARD A PILOT PROJECT FOR SECURITY OPERATIONS SCAUG 2014 ABOUT ACCESS THE NEED Access Midstream Corporate Security 24/7 Security Operations Center Tasked with ensuring employee, contractor
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
Hitachi Visualization. Twin Cities Public Safety Presentation
Hitachi Visualization Twin Cities Public Safety Presentation Safer, Smarter, More Efficient Communities INTEGRATED REPORTING AND ANALYTICS: ACTIONABLE INSIGHT ENERGY UTILITY VEHICLE TRANSIT PUBLIC SAFETY
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
This section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Washington State Fusion Center. The Pacific Northwest Economic Region
FUSION CENTER SPOTLIGHT Washington State Fusion Center and the Pacific Northwest Economic Region: Building a Critical Infrastructure/ Key resource Information Sharing Capability Washington State Fusion
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Integrated Public Alert and Warning System (IPAWS) Get Alerts. Stay Alive. Texas Emergency Division of Emergency Management
Integrated Public Alert and Warning System (IPAWS) Get Alerts. Stay Alive. Texas Emergency Division of Emergency Management Antwane Johnson, Director May 14, 2014 Presidential Direction Executive Order
Introduction to Key Management Services Managing keys in the data center
Introduction to Key Management Services Managing keys in the data center Landon Curt Noll 2010-Apr-30 v1.30 An espresso shot served by by Landon Curt Noll 1 Talk Outline Review: What is Key Management?
IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first
IRC Forensic Basics by: James Guess Origins of IRC Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first globally accessible chat network. The designers originally intended
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Deploying ArcGIS for Server Using Managed Services
Deploying ArcGIS for Server Using Managed Services Andrew Sakowicz Erin Ross Sridhar Karra Agenda Introduction Program Overview - Overview - Methodology - Tools Customer Deployments - Architecture and
Link and Sync Guide for Hosted QuickBooks Files
Link and Sync Guide for Hosted QuickBooks Files A How-To Guide for Syncing QuickBooks Files Table of Contents Hosted QuickBooks Files Overview:... 2 Rules Overview:... 2 Link and Sync Hosted QuickBooks
OneDrive in Office 365
OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents
Call Center and Clearing System. ID Technologies Inc
Call Center and Clearing System ID Technologies Inc Features Enterprise level ticket generation, clearing and tracking system GIS based integrated graphical information. Multi-format map integration Real
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition Service Requirements Your device will require one of the following: Cellular connection supporting data transmission through your mobile
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
The following NIMS FAQ was prepared by NIMS on-line, which has additional information at www.nimsonline.com.
The National Incident Management System is a structure for management large-scale or multi-jurisdictional incidents. It is being phased in at the federal, state and local levels. Eventually, any jurisdiction
InstaFile. Complete Document management System
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
