Sponsorship Opportunities Available
BLOG
Oct 19, 2020
CERTIFICATE
Next Available Course:
June 25, 2020
7
Learn best practices and technologies aimed at identifying vulnerabilities, mitigating risk and protecting critical information technology assets.
A Risk/Threat/Vulnerability (RTV) assessment is one of the most important elements of a comprehensive safety and security plan/program.
Objectives:
Implementation:
Involve event Risk Management and/or security department(s) in this process, if one exists.
Insurers may provide resources at no, or minimal cost. NCS4 offers a DHS/FEMA-funded Risk Assessment course.
Keep all of your prior assessments.
Applicability/Scalability:
This should occur regardless of the size of venue or type of event.
Scalability is not necessarily a function of size or attendance.
The same elements are present for both small and large events/facilities. Scaling comes into play during implementation/ mitigation/acceptance.
If you have a static event site (one you use over and over) it will just be a matter of updating after your first assessment. However, if your event location changes for each event, it will be more time consuming. As you return, you will only need to review and update.
Create or utilize your risk assessment/crisis management/security team to conduct a Risk/ Threat/Vulnerability Assessment to determine and evaluate vulnerabilities, threats and areas of risk exposure.
Objectives:
A knowledgeable team to assess and address risks, threats, vulnerability, gaps.
Implementation:
Conduct an annual overall assessment as applicable and an event specific one before each event, evaluate and accept, mitigate or make changes as necessary.
Applicability/Scalability:
Make sure you use qualified personnel to conduct the assessments.
Conduct a Risk/Threat Assessment for vulnerabilities for ALL events including a detailed criminal, terrorism, fire, structural, environmental, safety and medical assessment. Take an all-hazards approach. Review the list in the EAP and ensure they include (as applicable):
Objectives:
Implementation:
Break down assessments into three components:
Local DHS Protective Security Advisor (PSA) can assist.
Applicability/Scalability:
Consider risks/threats as high or low RISK compared to high or low FREQUENCY - compared to high or low IMPACT.
Eight common categories of risk to consider:
Typical Risk Management cycle includes:
Objectives:
Completeness
Implementation:
Larger events will be more complex and some smaller events as well, depending on attendee type.
Applicability/Scalability:
Applicable all size events.
Once risks/threats/vulnerabilities are identified and understood, develop a corrective or mitigation plan to address those considered unacceptable or of concern/needing attention.
Objectives:
Deal with risks, threats and vulnerabilities.
Implementation:
This will be part of the basis for the Emergency Action Plan (EAP).
There are many governmental and private sector resources available to assist.
Applicability/Scalability:
This will help you identify the level of scaling required based upon the assessment and need for mitigation or acceptance.
Conduct event management meetings prior to each event with sufficient lead time to address Risk Management issues and address mitigation where required
Objectives:
Planning and preparation is a year-round function.
Implementation:
Events at different venues occur year-round, so these meetings should occur for each event. As necessary, schedule weekly or at intervals appropriate for scale of events
Applicability/Scalability:
Based upon size, complexity, attendees and RTV assessment will determine depth and frequency of meetings.
For repeat events at the same venue, update and disseminate, as required, to key leaders and appropriate components/ partners.
The same is true for transportation modes used.
Objectives:
Currency and awareness.
Implementation:
Use the last assessment as a starting point to update and build upon.
Applicability/Scalability:
Do not just assume the results of the last assessment.
In all likelihood, information management systems will fall under one or more of the following:
Objectives:
Implementation:
Having a designated person responsible/incharge for this is the best approach.
Each country has different rules for how data may be collected, what must be disclosed about its use, what it can be used for and when records need to be purged.
Work with information management owners to ensure each event is in compliance with data use regulations governing event attendees.
Applicability/Scalability:
Depending on the size of the event, data may determine whether or not professional support may be required.
No matter the size of the organization, collaborating and partnering almost always results in a better outcome.
Types of information management systems used vary by event. Some examples include:
Objectives:
Identify all the ways in which data is collected, stored or exchanged before, during or after the event.
Implementation:
Creating a list of all the ways information is collected, managed, communicated or analyzed helps identify potential vulnerabilities as well as cross-departmental dependencies.
Applicability/Scalability:
Some data collection and management systems may be managed by internal teams other than the meetings department. Others may be contracted to a third party.
The larger the event organizing/production organization, the more likely it is that the meetings/event team will be supported by internal business units. In smaller companies or for smaller meetings/events, the meeting/event organizer may have more direct control over information management systems.
Identify who owns the information policies and content related to and generated by the employed technology system(s):
Objectives:
Implementation:
Event and/or venue may have a Chief Information Officer who is in charge. Determine venue/event needs and whether or not the existing systems meet these needs.
If not, define requirements and identify who can fulfill these needs.
Applicability/Scalability:
Event organizers should be able to tell participants what data is being collected, why it is needed, what it will be used for and how it will be protected.
Transparency is key to building trust, whether it is between buyers and suppliers or event organizers and participants.
Confirm the reliability of the systems and the integrity of the data collected on an annual basis, along with the availability of the information through either automated diagnostics or manual testing.
Objectives:
Unreliable and unavailable data is worthless. Regulations change. Equipment and systems degrade over time and should be tested regularly.
Implementation:
Take ownership with what is under event/venue control and partner with others over what fall outside event/venue control.
Test IT prior to each event to include video cameras and recording capabilities.
Consider using Command Center/event/incident/operations information management software.
Objectives:
Keeps all entities current with the same information and serves as an official record for litigation and after-action.
Implementation:
There are various Information Management Systems on the market that contain modules to enter/maintain/recall reports for use and transmission to public safety units.
Applicability/Scalability:
When possible co-locate event operation centers and staff with local first responders, event security teams and law enforcement. If an incident occurs, relay information to the proper party so it may be resolved.
Make sure all automated systems have redundancy and off-site backup capabilities.
Objectives:
Redundancy is often the only recovery capability.
Implementation:
Off-site backup is a must in case something happens to the primary system or location or its power source.
Applicability/Scalability:
Where is data stored? What happens if the power goes off or a cell tower goes down? If there are physical backups, what steps will be taken to prevent theft? If cloud-based, what kinds of firewalls are in place to deflect bad actors, like hackers? If the system is disrupted in any way, how long will it take to get it back online? What kind of gap will that create? What information do you need to have in physical form at the event if that happens or switch to the back-up system?
Consider using a Geographic Information System (GIS).
Objectives:
For visual situational awareness and managing people movement.
Implementation:
This can accommodate NFC/RFID feeds tied to badges, mobile devices and event apps.
Applicability/Scalability:
Tied to an event app, GIS information can be used to send push notifications to move attendees away from crowded areas to less-trafficked exhibitors or sessions. It also may be used as an emergency communication system to alert affected attendees away from incidents or towards exits, or to convey other emergency-related information.
Access control, patron monitoring systems/software used for data collection and analysis, such as electronic ticketing, RFID, apps, etc., should be protected from unlawful access and use.
Objectives:
To ensure the security of the data collected from event participants or others.
Implementation:
Where is the data being stored and who has access should be addressed. Understand how data should be encrypted and what security is in place to prevent access points from being compromised.
Applicability/Scalability:
Before signing contracts with vendors, become familiar with data collection and use policies and how data will be disposed of post-event. Understand how data is encrypted and protected.
Travel Meeting Management software must have clear security controls as most contain Personally Identifiable Information (PII) and credit card info.
Objectives:
Prevent theft of patrons, personal and financial data.
Implementation:
Where is the data being stored and who has access should be addressed?
Applicability/Scalability:
Make sure vendors are in compliance with PII regulations. If there is a breech, how soon will you know? How would communicate and handle that? What are your notification responsibilities?
Assemble an internal IT/ Risk Assessment team to conduct security assessment on technology and data-handling procedures before contracting vendors.
Objectives:
Determine what is an acceptable risk, internal ownership for each data collection or technology touchpoint and people internally or externally who will be cleared to access the data collected.
Implementation:
Sample discussion-starting questions:
Applicability/Scalability:
This is relevant to all events using digital data.
Set data-handling and privacy policies for the event and be transparent.
Objectives:
Transparency about what is being gathered, why it is being gathered and how it will be used is important.
Implementation:
List the policy or links to policy on all forms and websites where data is being collected or behavior is monitored.
If people are being recorded or if their movements are being tracked, signage or releases may be required.
Include data ownership, treatment and use details in vendor contracts.
Applicability/Scalability:
Most IT departments are aware of European GDPR regulations and have standard privacy and data use policies. Work with vendors and other third-party suppliers to ensure compliance.
Set up internet access, devices and apps in ways that increase event security.
Objectives:
Avoid public access (free) Wi-Fi connections to protect data being transmitted via email or through websites.
Implementation:
Don’t use open or public Wi-Fi channels for events. Instead, require networks that are password-protected. Stipulate in the contract the number of SSIDs and bandwidth required for the event. Know that bandwidth needs to support 3-5 devices per person. Include recourse, reparation and rebate language in the contract that protects the organization and spells out what will happen if something goes wrong with the internet.
Partner with the venue and/or its audiovisual team to ensure greater security: Know where their access points (AP) are, what they are and how they can be secured.
Applicability/Scalability:
Whether for personal or professional use, any device that is set to its preset factory password is vulnerable to cyberattack.
Include security and access information in know-before-you-go communications as well as any applicable warnings about connecting to rogue hotspots.
Regularly screen USB charge ports or don’t use them.
Objectives:
Prevent infection of laptops, mobile phones and other devices by avoiding USB ports.
Implementation:
USB ports are easily infected by malware. In public spaces, such as airport lounges and hotel rooms, use the device’s charger plug rather than the USB port.
Disable USB ports on kiosks and laptops if they are not regularly screened.
Require speakers submit presentations weeks in advance to avoid USB key usage onsite.
Or use AV-supplied laptops, and don’t reuse USB keys after files are downloaded.
Applicability/Scalability:
Providers of charging stations and rental laptops should be able to inform how they prevent malware from infecting USB ports and how often they screen devices.
If a presentation management system is out of budget range, files can be shared by cloud-based technologies, or organizers can require speakers to bring their own laptops.
Evaluate what should and should not be posted on event websites, signage and hotel reader boards.
Objectives:
Implementation:
Consider listing the name of the event rather than the company’s name on transportation signage and hotel reader boards.
If your event website has a “look who’s coming” area, list by companies only. Do not list by individual’s names. Room block poachers use that information to phish attendees. It also allows bad actors to gain access to your event by impersonating someone who’s on your list, or opens attendees up to potential harm if they’re being stalked.
Applicability/Scalability:
Important for all events using electronic information delivery.
Some events, for privacy or security reasons, may opt not to have information listed on the hotel reader boards at all.
Collect emergency contact information when people register, use technology to communicate before and after incidents occur.
Objectives:
Finding information about what to do in case of an emergency should be fast and easy.
Implementation:
Emergency maps, plans and contact numbers should be in a prominent place in the event app.
While people are waiting for the event to begin, AV teams can show videos or slides instructing attendees about emergency procedures.
Push-to-text notifications for different kinds of incidents can be pre-loaded for quick deployment in case of emergency.
Applicability/Scalability:
Applicable to all size events.
Push-to-text notifications are fairly inexpensive but become useless if the mobile network goes down. So finding ways of communicating what people should do before anything happens is the best way to cultivate a safe and aware mindset.
Train employees, attendees and exhibitors to recognize emails phishing for information.
Objectives:
Avoid fraud and theft by educating event stakeholders and participants.
Implementation:
Some phishing emails look like conference communications. Train staff, attendees and exhibitors to avoid emails that deviate from the event’s format, include execution (.exe) files or ask for a password in exchange for downloading a file.
Applicability/Scalability:
In first communication (such as registration confirmation) think about including information about types of communication that will follow.
For example, it will always come from a certain person or outline what instances (if ever) you might require them to enter a password or download a file. Include contact information for whom to alert if they receive a suspicious communication.
Correctly dispose of information and data.
Objectives:
Protect intellectual property and sensitive conference materials.
Implementation:
Bring a shredder onsite. Sweep the conference rooms and dispose of anything left behind.
Know what AV teams will do with rental laptops or presentation management systems after the event ends. Include in contract language expectations for data disposal, treatment and use.
Applicability/Scalability:
Important regardless of event size.
If clean-up falls to venue staff, know what they do with the materials, are they are shredded or how data is disposed.
Use collected data to improve the quality of the event experience.
Objectives:
Implementation:
Include questions about food allergies and physical impairments on the registration form so those needs may be anticipated and met.
Use data collected via surveys and polls, speaker evaluations and attendee movement information from badge-scanning or other tracking technology to determine where attendees went, what attendees liked and disliked. Use information to determine how to improve subsequent events.
Monitor social media for anecdotal evidence as well as complaints for event issues that need to be addressed.
During the post-con meeting, ask venues about event bandwidth usage. It helps organizers estimate need for budgets and determine usage for future events.
Applicability/Scalability:
In today’s use of technology this is applicable to all events.
Few event organizers share how survey data is used. Telling the story of how an event was improved by listening to feedback can be a powerful way to engage audiences and encourage two-way feedback.
Relying on data also will strengthen the meeting or event professional’s strategic role within the organization.
Isolate medical records and other sensitive personal or financial information to a separate encrypted environment.
Objectives:
Block bad actors from accessing sensitive data.
Implementation:
Set different access levels to data based on need-toknow basis.
Anything that needs to be protected should be encrypted.
Applicability/Scalability:
This is applicable regardless of event size.
Consider, block chain, if a practical solution.
Get the latest updates and download the PDF version of The Essential Guide to Safety and Security.