1428Executive Summary: Event Security and Site Protection
Conferences, meetings, and tradeshows can be a great way for organizations to showcase themselves to the public, discuss important issues, and boost employee morale. However, high profile events can present operational and reputational risks if they are not conducted effectively. Security issues, in particular, can hamper operations and raise challenges to event organizers. If not handled deftly, these issues could lead to incidents that prove both embarrassing and costly to the hosting company.
To ensure the seamless integration of security into an event’s operations, the security professionals at IMG believe that security personnel should be involved in event planning from Day 1. By including security personnel during the preliminary stages, event planners will ensure that security is incorporated into planning at every stage of the process. This will help avoid unforeseen complications and last minute alterations.
Event security planning can be an involved and complicated process, and some outsiders may underestimate the challenges involved. Additionally, some may question why security personnel need to be included in so many aspects of event planning from venue selection, to guest lists, to hotel booking. To provide more clarification on security’s role in event planning, IMG (http://www.theimg.com/) has released 5 tips on event security and site protection. This information should provide non-security personnel with an overview of event security planning.
5 Tips on Meeting Security and Site Protection from a Leading Executive Protection Firm
Event Security Tip #1: Venue Selection
One of the most important tenets of meeting and conference security is the involvement of security personnel from the start of the event planning process. This is especially true when it comes time for an organization to select a venue. Prior to site selection, security personnel need to conduct a threat assessment of the proposed site to identify potential threats, challenges, and risks. Involvement at the early stages also gives security personnel an opportunity to familiarize themselves with the site and identify any resources, such as floor space or rooms, that will need to be reserved for security purposes.
Event Security Tip #2: Proprietary Information Planning
Another core tenet of conference and meeting security is the identification of sensitive or proprietary information that will be disclosed during the course of the event. For example, some conferences are used to unveil new technology or discuss corporate strategy while some company meetings may involve sensitive issues such as layoffs and acquisitions. In each of these cases, organizations need to think hard about how they want this information disseminated and whom they want to disseminate this information to. Once this determination is made, security personnel can construct plans to protect this data. Additionally, they will be able to provide guidance on the transportation and storage of sensitive materials and designate secure meeting areas for sensitive discussions.
Event Security Tip #3: Access Controls
Another fundamental component of site protection is the development of access controls. At the site itself, security will control physical access by designating points of entry/exit and manning these points appropriately. However, security should also be involved in the formulation of the guest list and the selection of invitations and ID badges. This will allow security personnel to prevent unauthorized access and help identify any event “crashers.” It is also important to note that guests may have different levels of access based on their relationship to the hosting organization. For example, the Media may be given one level of access, company employees given another, while company executives may be given more wide-ranging access. Security will help ensure that guests are given the appropriate level of access and may compartmentalize the area according to access level.
Event Security Tip #4: Transportation, Logistics, and Emergency Planning
It is important to note that comprehensive conference security is not limited to the event site itself. Security personnel should be involved in coordinating transportation to and from the venue. They also may choose to conduct threat assessments on the hotels being used by attendees. Additionally, security may determine if VIPs require special vehicle access or foot escort. This is because VIPs are often at there most vulnerable when traveling to and from a well-publicized event. Finally, the security staff will develop contingency and emergency plans. This often involves identifying the police, fire, rescue, and medical resources in the area so that they may be quickly called upon in the event of an emergency.
Event Security Tip #5: After-Action Reviews
One of the most important, but often overlooked, components of conference security and site protection is the after action review. These reviews are held after the completion of a conference, meeting, or event and should be attended by all of the event organizers. One of the major benefits of these reviews is that they can be used to discuss challenges and target areas for future improvement. Furthermore, these reviews can also be used to assess the impact of possible security breaches. For example, during an after action review event organizers may report incidents such as suspicious behavior, the loss of sensitive material, or access to an unauthorized area. During the review, these issues can be fleshed out in detail as a group and follow on plans developed.
Originally published on Wednesday, 23 July 2014
1342 views at time of republishing