Security of Conferences – Basic Considerations

Published by Marshal on

Some companies hired to provide security at conferences cannot undertaken even basic measures. Here are some rules and best practices to follow (in general – and all depends on the overarching risk assessment in view of the nature and size of the conference etc).

1. Identification and access control measures: This includes issuing identification badges to all attendees, staff, and vendors, and implementing access control measures such as checkpoints, turnstiles, or electronic access systems.

2. Emergency response plan: A comprehensive plan that outlines procedures for various emergency situations, including medical emergencies, fires, natural disasters, or security threats. It should include evacuation routes, designated assembly points, and communication protocols.

3. Security personnel: Hiring trained security personnel to monitor the event, handle access control, and respond to any security incidents or emergencies. The number of security personnel should be based on the size and nature of the conference.

4. Surveillance systems: Installing CCTV cameras in key areas of the conference venue to monitor activities and identify any suspicious behavior or security breaches. The surveillance system should be monitored by trained personnel.

5. Baggage screening: Implementing baggage screening procedures at entry points to detect any prohibited items or potential threats. This can be done through manual bag checks or using X-ray machines.

6. Cybersecurity measures: Ensuring the conference’s IT infrastructure is secure by implementing firewalls, encryption, and other cybersecurity measures to protect against data breaches or hacking attempts.

7. Communication systems: Establishing reliable communication systems, such as two-way radios or mobile apps, to enable quick and effective communication between security personnel, event organizers, and emergency services.

8. Crowd management: Developing a crowd management plan to ensure the safe movement of attendees, especially during peak times or in areas with high foot traffic. This may involve implementing crowd control barriers, designated walkways, or trained personnel to guide attendees.

9. Vendor and contractor screening: Conducting background checks on vendors, contractors, and service providers involved in the conference to ensure they meet security standards and do not pose any risks.

10. Training and drills: Providing comprehensive training to security personnel, event staff, and volunteers on emergency response procedures, crowd management, and security protocols. Regular drills should be conducted to test the effectiveness of the security plan and identify areas for improvement.

Categories: Resilience