Udi Segall

director of business development, Qognify

Author Bio ▼

Udi Segall is director of vertical marketing at Qognify. In this role he is responsible for devising and executing go-to-market strategies and solutions aimed to improve organizations operational efficiency and security. Prior to joining Qognify, Mr. Segall spent more than 10 years working in data communication field, holding various positions in engineering management and marketing at both private and public Israeli hi-tech companies. Mr. Segall holds a BSc degree in Electrical Engineering from Hertfordshire University, England and holds a patent for acceleration of web traffic over cellular networks.
April 4, 2016

Sign up to free email newsletters

Download

Mobile access series #1: What you need to know

What Incident Management Solutions Can Learn from the Flight Recorder (the ‘Black Box’)

 

The introduction of what is commonly referred to as a ‘black box’ (although the latest incarnation is orange, as the image below shows) marked an important milestone in aviation history.

 

flight recorder

The not-so-black box – AKA flight recorder

The black box or to use the more precise term flight data recorder (FDR), is used to preserve a flight’s recent history by collecting multiple parameters several times per second. The FDR, combined with the cockpit voice recorder (CVR), which captures the audio including pilot conversations, provide an accurate testimony of a flight’s history, and assists in any further investigation.

A painful lesson that has been learned during investigations of aviation accidents and incidents.  In order to accurately compose the sequence of events that led to an incident, it is critical to capture all flight data parameters together with the pilots’ conversations.

In other words to gain insight from past events it is critical to examine the data parameters of various systems as well as human conduct.

This theme is very much aligned with the findings of the Abnormal Situation Management (ASM) consortium that argues that there are three principal types of sources or causes of abnormal situations:

  • People and work context factors
  • Equipment and technology factors
  • Process factors

How is that relevant to incident management solutions?

Continuous improvement enabled through process excellence and a culture of high performance are key attributes for organizations wishing to maintain a leadership position in today’s markets. To this end, incident management solutions should provide tools that analyze an incident’s complete data, as shown in figure 2.

incident data breakdown

Mining an organisation’s incident performance data allows organisations to detect inefficiencies in processes and/or SOP (Standard Operating Procedures). It can also identify sub-par performance of both individuals and teams relative to an organisation’s benchmarks, and discover anomalies in system performance as reported by IoT (Internet of Things) sensors.

Conducting an analysis with methodologies that have been proven to provide continuous improvement, such as Six Sigma, is critical for organisations that want to create and maintain an adaptive culture.

Black boxes have played an invaluable role in improving aviation safety by dramatically reducing the volume and magnitude of incidents and accidents. Today’s incident management solutions should capture all incident data to provide organisations visibility into how incidents have unfolded.

In addition, with the right analytical tools, they should allow them to extract valuable insights that can transform the way these organisations work. In the same way that that black box has transformed the aviation industry.

Free Download: Cybersecurity and physical security systems: how to implement best practices

If you are involved in the operation or maintenance of physical security systems, this resource from Vanderbilt will help you choose the right equipment for staying diligent. It provides a five step process for strengthening the resilience of those systems against cyber-attack, as well as explaining what cyber-attacks mean in an interconnected world.

Discover the five step process now by clicking here.

Related Topics

1
Leave a Reply

avatar
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
0 Comment authors
CrowdControlGuy Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
CrowdControlGuy
Guest
CrowdControlGuy

ifsecglobal Do what would the Event Black Box contain? Like the FDR – recording of all radio calls? All logged incidents in real time?

Sign up to free email newsletters