top of page
Tamkene Wide Logo .png

Incident Cause Analysis Method (ICAM) Training Service | in Dammam - Riyadh - Jeddah - Makkah

ICAM training covering systematic incident investigation, root cause analysis, and corrective actions for workplace safety and operational excellence.

Course Title

Incident Cause Analysis Method (ICAM)

Course Duration

3 Days

Competency Assessment Criteria

Practical Assessment and Knowledge Assessment

Training Delivery Method

Classroom (Instructor-Led) or Online (Instructor-Led)

Service Coverage

Saudi Arabia - Bahrain - Kuwait - Philippines

Course Average Passing Rate

97%

Post Training Reporting 

Post Training Report(s) + Candidate(s) Training Evaluation Forms

Certificate of Successful Completion

Certification is provided upon successful completion. The certificate can be verified through a QR-Code system.

Certification Provider

Tamkene Saudi Training Center - Approved by TVTC (Technical and Vocational Training Corporation)

Certificate Validity

2 Years (Extendable with additional training hours)

Instructors Languages

English / Arabic / Urdu / Hindi / Pashto

Training Services Design Methodology

ADDIE Training Design Methodology

ADDIE Training Services Design Methodology (1).png

Course Overview

This comprehensive Incident Cause Analysis Method (ICAM) training course provides participants with essential knowledge and practical skills required for conducting systematic workplace incident investigations and identifying underlying organizational factors. The course covers fundamental investigation principles along with advanced techniques for data collection, causal factor analysis, and corrective action development using the ICAM methodology developed by the minerals industry and aligned with ISO 45001 Occupational Health and Safety Management Systems requirements.


Participants will learn to apply industry best practices and structured investigation frameworks to move beyond blame-focused approaches toward understanding systemic failures and organizational deficiencies. This course combines theoretical concepts with extensive practical applications and real-world case studies to ensure participants gain valuable skills applicable to their professional environment while emphasizing prevention of incident recurrence and continuous improvement.

Key Learning Objectives

  • Understand ICAM investigation methodology and underlying principles

  • Conduct systematic incident investigations using structured processes

  • Apply effective evidence collection and preservation techniques

  • Identify causal factors using multiple analytical tools

  • Develop organizational and individual contributing factors analysis

  • Create effective corrective actions addressing root causes

  • Prepare comprehensive investigation reports and recommendations

  • Implement investigation findings for organizational learning

Group Exercises

  • Team investigation simulation based on Middle East industrial scenarios including (role-playing investigation team, coordinating evidence collection, conducting group analysis sessions)

  • The importance of proper training in conducting effective incident investigations and fostering organizational learning culture

Knowledge Assessment

  • Technical quizzes on ICAM methodology including (multiple-choice questions on investigation process stages, matching exercises for causal factor types)

  • Causal factor charting exercises including (constructing event and causal factor charts from case scenarios, applying necessity and sufficiency tests)

  • Root cause analysis application including (conducting Why-Why analysis on sample incidents, performing barrier analysis, identifying organizational factors)

  • Corrective action evaluation including (assessing action effectiveness using hierarchy of controls, developing SMART recommendations, prioritizing interventions)

Course Outline

1. Introduction to Incident Investigation and ICAM

1.1 Investigation Fundamentals
  • Purpose of incident investigation including (learning opportunities, prevention, regulatory compliance)

  • Traditional versus systemic investigation approaches including (blame culture, just culture, learning culture)

  • ICAM methodology overview including (development history, core principles, application scope)

  • Investigation terminology including (incident, accident, near miss, hazard, consequence)

1.2 ICAM Framework and Principles
  • ICAM investigation process stages including (preserve and document, plan investigation, data collection, analysis, corrective actions)

  • Investigation quality criteria including (thoroughness, objectivity, systematic approach, timeliness)

  • Organizational learning concepts including (single-loop learning, double-loop learning, systems thinking)

  • Integration with ISO 45001 requirements including (incident investigation clauses, corrective action, continual improvement)

1.3 Legal and Ethical Considerations
  • Regulatory investigation requirements including (notification, reporting, authority cooperation)

  • Privilege and confidentiality including (legal protection, disclosure risks, evidence handling)

  • Witness rights and protections including (voluntary participation, representation, interview conduct)

  • Investigation team roles including (lead investigator, technical specialists, management support)


2. Incident Response and Initial Actions

2.1 Emergency Response and Scene Management
  • Immediate response priorities including (rescue, medical attention, hazard control, scene preservation)

  • Scene security and access control including (barrier establishment, authorized entry, contamination prevention)

  • Evidence preservation including (photography, physical evidence, transient conditions, environmental factors)

  • Notification procedures including (management, regulatory authorities, stakeholders, investigation team activation)

2.2 Investigation Planning
  • Incident severity classification including (actual harm, potential harm, investigation depth determination)

  • Investigation team selection including (competency requirements, independence, diversity, size)

  • Resource allocation including (time estimates, technical support, equipment needs, budget)

  • Investigation scope definition including (boundaries, depth, timeline, deliverables)

2.3 Preliminary Information Gathering
  • Initial incident details including (time, location, involved parties, immediate sequence)

  • Witness identification including (primary witnesses, secondary witnesses, expert resources)

  • Document identification including (procedures, training records, maintenance logs, prior incidents)

  • Preliminary timeline development including (key events, duration, chronological sequence)


3. Evidence Collection and Documentation

3.1 Physical Evidence Collection
  • Photography and videography including (systematic coverage, reference scales, lighting, perspective)

  • Physical evidence preservation including (chain of custody, labeling, storage, contamination prevention)

  • Site measurements and diagrams including (distances, dimensions, scale drawings, reference points)

  • Equipment examination including (positions, settings, damage assessment, component failure)

3.2 Documentary Evidence
  • Procedure and policy review including (relevant documents, version control, implementation evidence)

  • Training and competency records including (qualification verification, currency, certification)

  • Maintenance and inspection records including (service history, defect reports, test results)

  • Communication records including (emails, messages, shift handovers, work orders)

3.3 Witness Interviews
  • Interview planning including (question preparation, sequencing, environment selection, timing)

  • Interview techniques including (open questions, active listening, probing, clarification)

  • Cognitive interview method including (context reinstatement, detailed recall, perspective changes)

  • Interview documentation including (note-taking, recording considerations, statement verification, witness review)

3.4 Expert and Technical Input
  • Subject matter expert engagement including (technical analysis, specialized knowledge, independent assessment)

  • Testing and analysis including (failure analysis, toxicology, environmental sampling)

  • Reconstruction techniques including (timeline validation, scenario testing, simulation)

  • External resource utilization including (laboratories, consultants, manufacturers, regulators)


4. Incident Timeline and Sequence Development

4.1 Event Sequencing
  • Timeline construction principles including (chronological order, event accuracy, time verification)

  • Multiple source integration including (witness accounts, physical evidence, documentary records)

  • Time verification methods including (system logs, time stamps, witness correlation)

  • Timeline visualization including (graphical representation, critical events highlighting, sequence clarity)

4.2 Scenario Development and Testing
  • Multiple scenario consideration including (alternative explanations, hypothesis generation, plausibility assessment)

  • Scenario testing against evidence including (consistency checks, contradiction identification, refinement)

  • Final sequence determination including (evidence strength, scenario probability, conclusion support)

  • Uncertainty documentation including (conflicting evidence, gaps, assumptions, limitations)


5. ICAM Causal Factor Charting

5.1 Event and Causal Factor Chart Development
  • Chart structure and symbols including (events, conditions, causal factors, consequences)

  • Primary event path identification including (loss event, immediate causes, contributing factors)

  • Causal factor identification including (actions, inactions, conditions, system failures)

  • Chart construction process including (working backwards, logical flow, completeness verification)

5.2 Testing Causal Factors
  • Necessity test application including (removal test, consequence change, causal link strength)

  • Sufficiency evaluation including (multiple factors, combined effects, relative contribution)

  • Causal factor validation including (evidence support, logical reasoning, stakeholder review)

  • Stopping rules application including (investigation depth, practical limits, focus maintenance)


6. Root Cause Analysis Techniques

6.1 Why-Why Analysis
  • Five Whys methodology including (question formulation, depth pursuit, root identification)

  • Common why-why pitfalls including (stopping too early, following single path, blame focus)

  • Multiple causation pathways including (parallel analysis, interconnections, systemic view)

  • Documentation and validation including (logic testing, evidence links, completeness review)

6.2 Barrier Analysis
  • Barrier identification including (physical barriers, administrative controls, behavioral barriers)

  • Barrier failure analysis including (absent barriers, inadequate barriers, failed barriers)

  • Barrier effectiveness assessment including (reliability, robustness, maintenance requirements)

  • Barrier improvement opportunities including (strengthening, redundancy, recovery mechanisms)

6.3 Change Analysis
  • Change identification including (recent changes, planned changes, unplanned variations)

  • Change impact assessment including (risk introduction, control adequacy, communication effectiveness)

  • Normal versus abnormal conditions including (deviation identification, significance evaluation)

  • Change management review including (process compliance, authorization, risk assessment quality)


7. Organizational and Individual Factors Analysis

7.1 Individual Contributing Factors
  • Human factors categories including (skill-based errors, rule-based mistakes, knowledge-based errors, violations)

  • Performance shaping factors including (workload, fatigue, stress, distractions, time pressure)

  • Competency and training issues including (knowledge gaps, skill deficiencies, experience limitations)

  • Communication failures including (misunderstanding, omission, incorrect information, language barriers)

7.2 Task and Environmental Factors
  • Task design issues including (complexity, ambiguity, conflicting demands, time constraints)

  • Workplace conditions including (lighting, noise, temperature, housekeeping, layout)

  • Equipment and tool adequacy including (availability, suitability, condition, usability)

  • Work planning and scheduling including (resource allocation, coordination, sequencing)

7.3 Organizational and Management Factors
  • Leadership and supervision including (oversight adequacy, priorities communication, resource provision)

  • Safety management system weaknesses including (policy gaps, procedure deficiencies, standard absence)

  • Risk management failures including (hazard identification, risk assessment, control selection)

  • Organizational culture issues including (production pressure, normalization of deviance, reporting climate)

7.4 Regulatory and External Influences
  • Regulatory compliance including (standard interpretation, enforcement effectiveness, gap identification)

  • Industry practices including (sector norms, best practices adoption, peer influence)

  • Contractor and supplier issues including (selection criteria, oversight, capability verification)

  • Economic and commercial pressures including (cost reduction, schedule compression, resource constraints)


8. Corrective and Preventive Actions Development

8.1 Hierarchy of Controls Application
  • Elimination opportunities including (process redesign, task removal, hazard elimination)

  • Substitution possibilities including (less hazardous materials, alternative methods, safer equipment)

  • Engineering controls including (guarding, ventilation, interlocks, design improvements)

  • Administrative controls including (procedure revision, training enhancement, permit systems)

  • PPE as last resort including (appropriate selection, limitations recognition, interim measures)

8.2 Action Planning and Prioritization
  • Action effectiveness assessment including (addressing root causes, preventing recurrence, broader application)

  • Prioritization criteria including (severity reduction, implementation feasibility, cost-benefit, timeframe)

  • SMART action development including (specific, measurable, achievable, relevant, time-bound)

  • Responsibility assignment including (action owners, support resources, authority levels)

8.3 Implementation and Verification
  • Action implementation planning including (steps, resources, dependencies, milestones)

  • Progress monitoring including (tracking systems, status updates, obstacle identification)

  • Effectiveness verification including (performance indicators, review periods, validation methods)

  • Closure criteria including (completion evidence, effectiveness demonstration, documentation)


9. Investigation Reporting and Communication

9.1 Investigation Report Structure
  • Executive summary including (incident overview, key findings, critical recommendations)

  • Investigation process description including (team composition, methodology, scope, timeline)

  • Incident description including (sequence of events, timeline, involved parties, consequences)

  • Evidence summary including (physical evidence, witness accounts, documentary review, technical analysis)

9.2 Findings Presentation
  • Causal factor presentation including (event charts, analysis narrative, supporting evidence)

  • Root cause identification including (organizational factors, systemic issues, management influences)

  • Contributing factors summary including (individual, task, environmental, organizational levels)

  • Conclusions and lessons learned including (key insights, broader implications, preventive focus)

9.3 Recommendations and Follow-up
  • Recommendation development including (hierarchy of controls, prioritization, feasibility)

  • Implementation plan including (responsibilities, timelines, resource requirements, dependencies)

  • Monitoring and review including (tracking mechanisms, effectiveness measures, reporting frequency)

  • Report distribution including (audience consideration, confidentiality, regulatory submission)


10. Advanced ICAM Techniques

10.1 AcciMap Analysis
  • AcciMap methodology including (socio-technical levels, vertical analysis, system mapping)

  • Level identification including (government/regulatory, company, management, physical processes)

  • Inter-level influence analysis including (top-down pressures, bottom-up feedback, lateral connections)

  • Systemic pattern recognition including (recurrent themes, structural vulnerabilities, cultural issues)

10.2 Bow-Tie Analysis
  • Bow-Tie diagram construction including (hazard, top event, threats, consequences, barriers)

  • Threat pathway analysis including (escalation factors, barrier identification, control effectiveness)

  • Consequence pathway analysis including (mitigation barriers, recovery measures, emergency response)

  • Bow-Tie application in ICAM including (incident mapping, prevention focus, control verification)

10.3 Systems Thinking Application
  • Systems perspective including (interconnections, feedback loops, emergent properties, boundaries)

  • Drift into failure concepts including (incremental change, normalization, adaptation, boundaries erosion)

  • Resilience engineering principles including (adaptation capacity, monitoring, anticipation, response)

  • Safety-II concepts including (success factors, variability management, positive performance)


11. Investigation Management and Quality

11.1 Investigation Leadership
  • Team leadership including (direction setting, motivation, conflict resolution, decision-making)

  • Stakeholder management including (communication, expectations, involvement, support)

  • Resource management including (time allocation, budget control, specialist engagement)

  • Investigation momentum including (progress maintenance, obstacle removal, deadline management)

11.2 Investigation Quality Assurance
  • Quality criteria including (thoroughness, objectivity, accuracy, timeliness, clarity)

  • Peer review process including (independent assessment, constructive feedback, quality improvement)

  • Common investigation pitfalls including (confirmation bias, hindsight bias, availability bias, groupthink)

  • Quality improvement techniques including (lessons learned, process refinement, benchmarking)


12. Organizational Learning and Culture

12.1 Just Culture Principles
  • Just culture framework including (human error, at-risk behavior, reckless behavior)

  • Accountability versus blame including (system accountability, individual accountability, balanced approach)

  • Reporting culture development including (psychological safety, non-punitive reporting, open communication)

  • Learning environment including (error tolerance, experimentation, knowledge sharing)

12.2 Knowledge Management
  • Investigation database development including (storage, categorization, retrieval, analysis)

  • Trend analysis including (pattern recognition, emerging risks, systemic issues)

  • Lessons learned dissemination including (bulletins, training integration, procedure updates)

  • Performance monitoring including (investigation quality metrics, action completion, recurrence tracking)

12.3 Continuous Improvement Integration
  • Management system integration including (ISO 45001 alignment, audit findings, performance reviews)

  • Feedback loops including (investigation outcomes, action effectiveness, process refinement)

  • Benchmarking and best practices including (industry comparison, external learning, innovation adoption)

  • Safety culture maturation including (generative culture development, proactive risk management, resilience building)

Practical Assessment

  • Comprehensive investigation exercise including (conducting full ICAM investigation of simulated incident, collecting and analyzing evidence, interviewing witnesses)

  • Causal analysis demonstration including (developing complete event and causal factor chart, identifying root causes using multiple techniques, documenting analysis logic)

  • Investigation report preparation including (writing executive summary with key findings, presenting recommendations with hierarchy of controls application, developing implementation plan)

Gained Core Technical Skills

  • ICAM investigation methodology application

  • Evidence collection and preservation techniques

  • Witness interview and statement taking

  • Event and causal factor chart construction

  • Root cause analysis using multiple techniques

  • Organizational and individual factors analysis

  • Corrective action development using hierarchy of controls

  • Investigation report writing and presentation

  • AcciMap and Bow-Tie analysis methods

  • Just culture principles application

Training Design Methodology

ADDIE Training Design Methodology

Targeted Audience

  • Safety Managers conducting incident investigations

  • HSE Coordinators responsible for investigation programs

  • Operations Managers overseeing incident response

  • Investigation Team Leaders coordinating analysis efforts

  • Safety Engineers performing technical investigations

  • Risk Managers analyzing organizational factors

  • Quality Assurance Personnel investigating process failures

  • Compliance Officers ensuring regulatory adherence

  • Senior Supervisors participating in investigations

  • Consultants providing investigation services

Why Choose This Course

  • Comprehensive coverage of systematic ICAM investigation methodology

  • Integration of multiple root cause analysis techniques

  • Focus on organizational factors and systemic issues beyond individual blame

  • Extensive hands-on practice with realistic incident scenarios

  • Advanced techniques including AcciMap and Bow-Tie analysis

  • Emphasis on actionable corrective actions using hierarchy of controls

  • Development of comprehensive investigation and reporting skills

  • Alignment with ISO 45001 management system requirements

  • Just culture and organizational learning integration

  • Regional case studies addressing Middle East industrial contexts

Note

Note: This course outline, including specific topics, modules, and duration, can be customized based on the specific needs and requirements of the client.

Course Outline

1. Introduction to Incident Investigation and ICAM

1.1 Investigation Fundamentals
  • Purpose of incident investigation including (learning opportunities, prevention, regulatory compliance)

  • Traditional versus systemic investigation approaches including (blame culture, just culture, learning culture)

  • ICAM methodology overview including (development history, core principles, application scope)

  • Investigation terminology including (incident, accident, near miss, hazard, consequence)

1.2 ICAM Framework and Principles
  • ICAM investigation process stages including (preserve and document, plan investigation, data collection, analysis, corrective actions)

  • Investigation quality criteria including (thoroughness, objectivity, systematic approach, timeliness)

  • Organizational learning concepts including (single-loop learning, double-loop learning, systems thinking)

  • Integration with ISO 45001 requirements including (incident investigation clauses, corrective action, continual improvement)

1.3 Legal and Ethical Considerations
  • Regulatory investigation requirements including (notification, reporting, authority cooperation)

  • Privilege and confidentiality including (legal protection, disclosure risks, evidence handling)

  • Witness rights and protections including (voluntary participation, representation, interview conduct)

  • Investigation team roles including (lead investigator, technical specialists, management support)


2. Incident Response and Initial Actions

2.1 Emergency Response and Scene Management
  • Immediate response priorities including (rescue, medical attention, hazard control, scene preservation)

  • Scene security and access control including (barrier establishment, authorized entry, contamination prevention)

  • Evidence preservation including (photography, physical evidence, transient conditions, environmental factors)

  • Notification procedures including (management, regulatory authorities, stakeholders, investigation team activation)

2.2 Investigation Planning
  • Incident severity classification including (actual harm, potential harm, investigation depth determination)

  • Investigation team selection including (competency requirements, independence, diversity, size)

  • Resource allocation including (time estimates, technical support, equipment needs, budget)

  • Investigation scope definition including (boundaries, depth, timeline, deliverables)

2.3 Preliminary Information Gathering
  • Initial incident details including (time, location, involved parties, immediate sequence)

  • Witness identification including (primary witnesses, secondary witnesses, expert resources)

  • Document identification including (procedures, training records, maintenance logs, prior incidents)

  • Preliminary timeline development including (key events, duration, chronological sequence)


3. Evidence Collection and Documentation

3.1 Physical Evidence Collection
  • Photography and videography including (systematic coverage, reference scales, lighting, perspective)

  • Physical evidence preservation including (chain of custody, labeling, storage, contamination prevention)

  • Site measurements and diagrams including (distances, dimensions, scale drawings, reference points)

  • Equipment examination including (positions, settings, damage assessment, component failure)

3.2 Documentary Evidence
  • Procedure and policy review including (relevant documents, version control, implementation evidence)

  • Training and competency records including (qualification verification, currency, certification)

  • Maintenance and inspection records including (service history, defect reports, test results)

  • Communication records including (emails, messages, shift handovers, work orders)

3.3 Witness Interviews
  • Interview planning including (question preparation, sequencing, environment selection, timing)

  • Interview techniques including (open questions, active listening, probing, clarification)

  • Cognitive interview method including (context reinstatement, detailed recall, perspective changes)

  • Interview documentation including (note-taking, recording considerations, statement verification, witness review)

3.4 Expert and Technical Input
  • Subject matter expert engagement including (technical analysis, specialized knowledge, independent assessment)

  • Testing and analysis including (failure analysis, toxicology, environmental sampling)

  • Reconstruction techniques including (timeline validation, scenario testing, simulation)

  • External resource utilization including (laboratories, consultants, manufacturers, regulators)


4. Incident Timeline and Sequence Development

4.1 Event Sequencing
  • Timeline construction principles including (chronological order, event accuracy, time verification)

  • Multiple source integration including (witness accounts, physical evidence, documentary records)

  • Time verification methods including (system logs, time stamps, witness correlation)

  • Timeline visualization including (graphical representation, critical events highlighting, sequence clarity)

4.2 Scenario Development and Testing
  • Multiple scenario consideration including (alternative explanations, hypothesis generation, plausibility assessment)

  • Scenario testing against evidence including (consistency checks, contradiction identification, refinement)

  • Final sequence determination including (evidence strength, scenario probability, conclusion support)

  • Uncertainty documentation including (conflicting evidence, gaps, assumptions, limitations)


5. ICAM Causal Factor Charting

5.1 Event and Causal Factor Chart Development
  • Chart structure and symbols including (events, conditions, causal factors, consequences)

  • Primary event path identification including (loss event, immediate causes, contributing factors)

  • Causal factor identification including (actions, inactions, conditions, system failures)

  • Chart construction process including (working backwards, logical flow, completeness verification)

5.2 Testing Causal Factors
  • Necessity test application including (removal test, consequence change, causal link strength)

  • Sufficiency evaluation including (multiple factors, combined effects, relative contribution)

  • Causal factor validation including (evidence support, logical reasoning, stakeholder review)

  • Stopping rules application including (investigation depth, practical limits, focus maintenance)


6. Root Cause Analysis Techniques

6.1 Why-Why Analysis
  • Five Whys methodology including (question formulation, depth pursuit, root identification)

  • Common why-why pitfalls including (stopping too early, following single path, blame focus)

  • Multiple causation pathways including (parallel analysis, interconnections, systemic view)

  • Documentation and validation including (logic testing, evidence links, completeness review)

6.2 Barrier Analysis
  • Barrier identification including (physical barriers, administrative controls, behavioral barriers)

  • Barrier failure analysis including (absent barriers, inadequate barriers, failed barriers)

  • Barrier effectiveness assessment including (reliability, robustness, maintenance requirements)

  • Barrier improvement opportunities including (strengthening, redundancy, recovery mechanisms)

6.3 Change Analysis
  • Change identification including (recent changes, planned changes, unplanned variations)

  • Change impact assessment including (risk introduction, control adequacy, communication effectiveness)

  • Normal versus abnormal conditions including (deviation identification, significance evaluation)

  • Change management review including (process compliance, authorization, risk assessment quality)


7. Organizational and Individual Factors Analysis

7.1 Individual Contributing Factors
  • Human factors categories including (skill-based errors, rule-based mistakes, knowledge-based errors, violations)

  • Performance shaping factors including (workload, fatigue, stress, distractions, time pressure)

  • Competency and training issues including (knowledge gaps, skill deficiencies, experience limitations)

  • Communication failures including (misunderstanding, omission, incorrect information, language barriers)

7.2 Task and Environmental Factors
  • Task design issues including (complexity, ambiguity, conflicting demands, time constraints)

  • Workplace conditions including (lighting, noise, temperature, housekeeping, layout)

  • Equipment and tool adequacy including (availability, suitability, condition, usability)

  • Work planning and scheduling including (resource allocation, coordination, sequencing)

7.3 Organizational and Management Factors
  • Leadership and supervision including (oversight adequacy, priorities communication, resource provision)

  • Safety management system weaknesses including (policy gaps, procedure deficiencies, standard absence)

  • Risk management failures including (hazard identification, risk assessment, control selection)

  • Organizational culture issues including (production pressure, normalization of deviance, reporting climate)

7.4 Regulatory and External Influences
  • Regulatory compliance including (standard interpretation, enforcement effectiveness, gap identification)

  • Industry practices including (sector norms, best practices adoption, peer influence)

  • Contractor and supplier issues including (selection criteria, oversight, capability verification)

  • Economic and commercial pressures including (cost reduction, schedule compression, resource constraints)


8. Corrective and Preventive Actions Development

8.1 Hierarchy of Controls Application
  • Elimination opportunities including (process redesign, task removal, hazard elimination)

  • Substitution possibilities including (less hazardous materials, alternative methods, safer equipment)

  • Engineering controls including (guarding, ventilation, interlocks, design improvements)

  • Administrative controls including (procedure revision, training enhancement, permit systems)

  • PPE as last resort including (appropriate selection, limitations recognition, interim measures)

8.2 Action Planning and Prioritization
  • Action effectiveness assessment including (addressing root causes, preventing recurrence, broader application)

  • Prioritization criteria including (severity reduction, implementation feasibility, cost-benefit, timeframe)

  • SMART action development including (specific, measurable, achievable, relevant, time-bound)

  • Responsibility assignment including (action owners, support resources, authority levels)

8.3 Implementation and Verification
  • Action implementation planning including (steps, resources, dependencies, milestones)

  • Progress monitoring including (tracking systems, status updates, obstacle identification)

  • Effectiveness verification including (performance indicators, review periods, validation methods)

  • Closure criteria including (completion evidence, effectiveness demonstration, documentation)


9. Investigation Reporting and Communication

9.1 Investigation Report Structure
  • Executive summary including (incident overview, key findings, critical recommendations)

  • Investigation process description including (team composition, methodology, scope, timeline)

  • Incident description including (sequence of events, timeline, involved parties, consequences)

  • Evidence summary including (physical evidence, witness accounts, documentary review, technical analysis)

9.2 Findings Presentation
  • Causal factor presentation including (event charts, analysis narrative, supporting evidence)

  • Root cause identification including (organizational factors, systemic issues, management influences)

  • Contributing factors summary including (individual, task, environmental, organizational levels)

  • Conclusions and lessons learned including (key insights, broader implications, preventive focus)

9.3 Recommendations and Follow-up
  • Recommendation development including (hierarchy of controls, prioritization, feasibility)

  • Implementation plan including (responsibilities, timelines, resource requirements, dependencies)

  • Monitoring and review including (tracking mechanisms, effectiveness measures, reporting frequency)

  • Report distribution including (audience consideration, confidentiality, regulatory submission)


10. Advanced ICAM Techniques

10.1 AcciMap Analysis
  • AcciMap methodology including (socio-technical levels, vertical analysis, system mapping)

  • Level identification including (government/regulatory, company, management, physical processes)

  • Inter-level influence analysis including (top-down pressures, bottom-up feedback, lateral connections)

  • Systemic pattern recognition including (recurrent themes, structural vulnerabilities, cultural issues)

10.2 Bow-Tie Analysis
  • Bow-Tie diagram construction including (hazard, top event, threats, consequences, barriers)

  • Threat pathway analysis including (escalation factors, barrier identification, control effectiveness)

  • Consequence pathway analysis including (mitigation barriers, recovery measures, emergency response)

  • Bow-Tie application in ICAM including (incident mapping, prevention focus, control verification)

10.3 Systems Thinking Application
  • Systems perspective including (interconnections, feedback loops, emergent properties, boundaries)

  • Drift into failure concepts including (incremental change, normalization, adaptation, boundaries erosion)

  • Resilience engineering principles including (adaptation capacity, monitoring, anticipation, response)

  • Safety-II concepts including (success factors, variability management, positive performance)


11. Investigation Management and Quality

11.1 Investigation Leadership
  • Team leadership including (direction setting, motivation, conflict resolution, decision-making)

  • Stakeholder management including (communication, expectations, involvement, support)

  • Resource management including (time allocation, budget control, specialist engagement)

  • Investigation momentum including (progress maintenance, obstacle removal, deadline management)

11.2 Investigation Quality Assurance
  • Quality criteria including (thoroughness, objectivity, accuracy, timeliness, clarity)

  • Peer review process including (independent assessment, constructive feedback, quality improvement)

  • Common investigation pitfalls including (confirmation bias, hindsight bias, availability bias, groupthink)

  • Quality improvement techniques including (lessons learned, process refinement, benchmarking)


12. Organizational Learning and Culture

12.1 Just Culture Principles
  • Just culture framework including (human error, at-risk behavior, reckless behavior)

  • Accountability versus blame including (system accountability, individual accountability, balanced approach)

  • Reporting culture development including (psychological safety, non-punitive reporting, open communication)

  • Learning environment including (error tolerance, experimentation, knowledge sharing)

12.2 Knowledge Management
  • Investigation database development including (storage, categorization, retrieval, analysis)

  • Trend analysis including (pattern recognition, emerging risks, systemic issues)

  • Lessons learned dissemination including (bulletins, training integration, procedure updates)

  • Performance monitoring including (investigation quality metrics, action completion, recurrence tracking)

12.3 Continuous Improvement Integration
  • Management system integration including (ISO 45001 alignment, audit findings, performance reviews)

  • Feedback loops including (investigation outcomes, action effectiveness, process refinement)

  • Benchmarking and best practices including (industry comparison, external learning, innovation adoption)

  • Safety culture maturation including (generative culture development, proactive risk management, resilience building)

Why Choose This Course?

  • Comprehensive coverage of systematic ICAM investigation methodology

  • Integration of multiple root cause analysis techniques

  • Focus on organizational factors and systemic issues beyond individual blame

  • Extensive hands-on practice with realistic incident scenarios

  • Advanced techniques including AcciMap and Bow-Tie analysis

  • Emphasis on actionable corrective actions using hierarchy of controls

  • Development of comprehensive investigation and reporting skills

  • Alignment with ISO 45001 management system requirements

  • Just culture and organizational learning integration

  • Regional case studies addressing Middle East industrial contexts

Note: This course outline, including specific topics, modules, and duration, can be customized based on the specific needs and requirements of the client.

Practical Assessment

  • Comprehensive investigation exercise including (conducting full ICAM investigation of simulated incident, collecting and analyzing evidence, interviewing witnesses)

  • Causal analysis demonstration including (developing complete event and causal factor chart, identifying root causes using multiple techniques, documenting analysis logic)

  • Investigation report preparation including (writing executive summary with key findings, presenting recommendations with hierarchy of controls application, developing implementation plan)

Course Overview

This comprehensive Incident Cause Analysis Method (ICAM) training course provides participants with essential knowledge and practical skills required for conducting systematic workplace incident investigations and identifying underlying organizational factors. The course covers fundamental investigation principles along with advanced techniques for data collection, causal factor analysis, and corrective action development using the ICAM methodology developed by the minerals industry and aligned with ISO 45001 Occupational Health and Safety Management Systems requirements.


Participants will learn to apply industry best practices and structured investigation frameworks to move beyond blame-focused approaches toward understanding systemic failures and organizational deficiencies. This course combines theoretical concepts with extensive practical applications and real-world case studies to ensure participants gain valuable skills applicable to their professional environment while emphasizing prevention of incident recurrence and continuous improvement.

Key Learning Objectives

  • Understand ICAM investigation methodology and underlying principles

  • Conduct systematic incident investigations using structured processes

  • Apply effective evidence collection and preservation techniques

  • Identify causal factors using multiple analytical tools

  • Develop organizational and individual contributing factors analysis

  • Create effective corrective actions addressing root causes

  • Prepare comprehensive investigation reports and recommendations

  • Implement investigation findings for organizational learning

Knowledge Assessment

  • Technical quizzes on ICAM methodology including (multiple-choice questions on investigation process stages, matching exercises for causal factor types)

  • Causal factor charting exercises including (constructing event and causal factor charts from case scenarios, applying necessity and sufficiency tests)

  • Root cause analysis application including (conducting Why-Why analysis on sample incidents, performing barrier analysis, identifying organizational factors)

  • Corrective action evaluation including (assessing action effectiveness using hierarchy of controls, developing SMART recommendations, prioritizing interventions)

Targeted Audience

  • Safety Managers conducting incident investigations

  • HSE Coordinators responsible for investigation programs

  • Operations Managers overseeing incident response

  • Investigation Team Leaders coordinating analysis efforts

  • Safety Engineers performing technical investigations

  • Risk Managers analyzing organizational factors

  • Quality Assurance Personnel investigating process failures

  • Compliance Officers ensuring regulatory adherence

  • Senior Supervisors participating in investigations

  • Consultants providing investigation services

Main Service Location

Suggested Products

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

ISO 9001 Internal Auditor

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Defensive Driving (Heavy Duty) - TTT

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Defensive Driving (Light Vehicle) - TTT

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

HSE Leadership

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Welding Safety

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Permit to Dangerous Work (PTDW)

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Pyrotechnic Safety Awareness

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Safe Handling of Gases

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

Advanced Security Officer

This item is connected to a text field in your database. Double click the dataset icon to add your own content.

H2s Awareness

bottom of page