Introduction to the DM Program and DMIS Tools



Similar documents
Technological Advances In Emergency Management

Centrix Helps Banks Manage Risk Optimize Efficiency Simplify Compliance

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

MAC Web Based VPN Connectivity Details and Instructions

HSIN R3 User Accounts: Manual Identity Proofing Process

Instant Messenger Operator Manual

Use of Exchange Mail and Diary Service Code of Practice

Composite Enterprise Architecture: The Direction of FEMA s EA

Deploying ArcGIS for Server Using Esri Managed Services

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Core Protection Suite

INCIDENT RESPONSE CHECKLIST

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Deploying ArcGIS for Server using Managed Services

Client Security Risk Assessment Questionnaire

Linux Web Based VPN Connectivity Details and Instructions

Android App Quick Start Guide

Computer Visions Course Outline

Sametime 101: Feature Overview. Roberto Chiabra IBM Certified IT Specialist

Bulk Downloader. Call Recording: Bulk Downloader

Livezilla How to Install on Shared Hosting By: Jon Manning

OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS

HOL9449 Access Management: Secure web, mobile and cloud access

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Customers can select one or more of our services as per their requirements.

Remote Access Procedure. e-governance

Implementing a Microsoft SQL Server 2005 Database

Cisco Jabber IM for iphone

THE TOP 4 CONTROLS.

STREAM FRBC

ISO COMPLIANCE WITH OBSERVEIT

Using Delphix Server with Microsoft SQL Server (BETA)

AppSense Environment Manager. Enterprise Design Guide

Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction

HIPAA Privacy & Security White Paper

MarkVision printer management software

Mobile Access Software Blade

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support.

Core Filtering Admin Guide

Windows Web Based VPN Connectivity Details & Instructions

Essential Components of Emergency Management Plans at Community Health Centers Crosswalk of Plan Elements

Code - A Date Approved: July 24/01

VOLICO. Backup Service Solutions. Enterprise Hosting Solutions

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Tel: Kemp House City Road London EC1V 2NX. Dynamics CRM Sales Process Case Study

Procedure Title: TennDent HIPAA Security Awareness and Training

Introducing Cisco Voice and Unified Communications Administration Volume 1

Introduction to Endpoint Security

How To Develop A Cloud In Hong Kong

Installing VinNOW Client Computers

Centrify Cloud Connector Deployment Guide

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015

OPERATIONS DASHBOARD A PILOT PROJECT FOR SECURITY OPERATIONS SCAUG 2014

Easy Data Centralization with Webster. User Guide

Hitachi Visualization. Twin Cities Public Safety Presentation

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

This section includes troubleshooting topics about single sign-on (SSO) issues.

Retention & Destruction

Washington State Fusion Center. The Pacific Northwest Economic Region

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Integrated Public Alert and Warning System (IPAWS) Get Alerts. Stay Alive. Texas Emergency Division of Emergency Management

Introduction to Key Management Services Managing keys in the data center

IRC Forensic Basics. by: James Guess. Internet Relay Chat (IRC) first met the world in the late 1980 s. It was the first

BlackBerry 10.3 Work and Personal Corporate

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013


USM IT Security Council Guide for Security Event Logging. Version 1.1

Deploying ArcGIS for Server Using Managed Services

Link and Sync Guide for Hosted QuickBooks Files

OneDrive in Office 365

Call Center and Clearing System. ID Technologies Inc

How To Protect A Hampden County Hmis From Being Hacked

Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition

Ovation Security Center Data Sheet

The following NIMS FAQ was prepared by NIMS on-line, which has additional information at

InstaFile. Complete Document management System

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Transcription:

Introduction to the DM Program and DMIS Tools 1

Topics Outline DM Program Overview DMIS Demo Registration Info 2

Disaster Management (DM) E-Gov One of President s 24 E-Government interagency initiatives established by the Office of Management and Budget Objective: Improve all-hazards incident response and recovery by creating the ability to securely share information across the Nation s emergency management community. 3

DM Program Components Open Platform for Emergency Networks (OPEN) Interoperability infrastructure enabling alert and incident information sharing Disaster Management Interoperability Services (DMIS) Provides basic incident management software tools Messaging Standards Initiative (DHS S&T/OIC) Public-private partnership creating messaging standards Facilitates information sharing between disparate incident management systems and software applications 4

How do OPEN, DMIS & Messaging Standards relate? OPEN provides a backbone that allows data sharing to occur between distributed & disparate systems. DMIS provides a basic incident management toolset to groups that have no mechanism, so they can manage and share information with others through OPEN. DMIS and OPEN both use Collaborative Operating Groups (COGs) as addresses to identify groups with which to share data. Messaging Standards provides the standards by which disparate systems can develop interfaces to OPEN so that they may share data. 5

What is DMIS? DMIS is a client server based system That means software must be loaded onto a user s local workstation, which enables it to communicate with a server through the Internet. This architecture allows users to share data with others, yet still have some limited local capability if Internet connectivity is lost. DMIS is not web-based DMIS uses a VPN (Virtual Private Network) to ensure privacy Local Group Administrators control the users in their own group... more on that later 6

What is a COG? A COG is a group of DMIS Operators who need to coordinate actions and work on incident records together using the DMIS Tools A COG can also be a group using an outside system interfaced to OPEN to share Alerts A COG could represent a County Emergency Management Office, Police/Fire Department, State EM, Tribal EM, Federal Agency, etc. 7

How do COGs work with DMIS? Internal COG Collaboration Create, update information collaboratively Members with appropriate privileges: Have updates as information is saved Can edit the information External COG Information Sharing Directed (posted) to selected COGs Recipients can view information and then comment using on-line chat (Messenger) Recipients can forward snapshots of information if originator grants permissions 8

How do COGs work with OPEN? External COG Information Sharing Directs Alerts to other COGs using CAP standard message formats 9

DMIS Tools Capabilities Tactical Information Exchange Mapping with collaborative markups Incident Information Sharing Weather Observations Journal with auto time/date stamp DMIS Messenger Common Alerting Protocol (CAP) Alerts NOAA HazCollect interface 10

DMIS Demo 11

NOAA HazCollect NWEM Authoring Tool Sample screen shot of NWEM Alert NWEM Alerts would be displayed in a format that is native to your software app or device NWEMs provide critical and actionable info 12

How Do I Establish a DM COG? Register for a COG at www.dmi-services.org. Select Enter Website then Register then Registration Form. Complete and submit the form. Use the Remarks field to state how the group wants to use DMIS Tools or DM OPEN. Only one person per group needs to register. The local Group Admin can create additional users Please be explicit as to how your group intends to use the COG (how large the COG is projected to be, membership construct, the group s current business process and how it wants DMIS or OPEN to automate that, planned frequency of use, etc.) It will take several days for the DM Team to validate the request, create accounts and then email DMIS download information, account logins and initial training links. 13