Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity & Business Resilience

Super Bowl security tips for planning corporate security strategy

By Ilia Sotnikov
football

Image via Unsplash

February 8, 2024

While football fans are enjoying Super Bowl 58 on February 11, most viewers probably don’t realize how much preparation goes into securing such a colossal event. Like sporting events organizers, corporate teams can benefit from implementing some core ideas from big event security into their own security strategy. To see how, walk in the shoes of an event security team for a bit.

The big stage attracts the big hack

First, consider this iconic scenario: a breathtaking game is in full swing and the stadium suddenly goes dark. Chaos ensues. Now imagine that the lights did not go out because of an accidental power failure. Instead, the lights were turned off by unknown hackers wanting to make a name for themselves. Pulling off something as big as that would certainly gain them the notoriety they were seeking — and perhaps reap financial gains from some strategically placed bets.

Every athlete dreams of pinnacle moments: standing atop the Olympic podium with a gold medal or netting the decisive goal in the FIFA World Cup. But such high-profile occasions also draw the attention of malicious actors. While we can recall two Olympics marred by terror attacks in the past 50 years, it's less known that during the 2018 Olympics, the IT team grappled with a cyberattack that targeted and initially disabled crucial servers underpinning the event's IT infrastructure. When the whole world is watching, it is a great time for athletes and malicious actors alike.

The digital transformation of sports

While digital transformation has delivered significant returns for many businesses, it has also paved the way for an uptick in cyberattacks. The realm of sports, despite its physical nature, hasn't been spared from this new reality. Today, technology is deeply woven into the fabric of nearly every major sport, creating fresh points of vulnerability that cybercriminals are quick to exploit. For example, last year, the San Francisco 49ers football team fell victim to a ransomware attack.

But let’s think bigger now because digital technology creates vulnerabilities where you might least expect them. Imagine if a cybercrime group brought down the digital ticketing systems right before a FIFA World Cup match, barring thousands from entering the venue and compelling officials to pay up to restore access. Or what if during a Formula 1 race like the Monaco Grand Prix, hackers disrupted the critical communication between drivers and their pit crews to stop the race? Or consider a scenario where threat actors manipulated the digital scoring system of the Super Bowl. These hypothetical situations highlight the intertwining of sports and technology and the emerging challenges therein.

Gaming the game

In 1982, an NFL game between the Miami Dolphins and the New England Patriots became notoriously known as the “Snowplow Game.” A heavy snowstorm had kept the score tied at 0-0 until just minutes before the end. Then, in a pivotal moment, a snowplow operator cleared a patch on the field, enabling the Patriots to successfully kick a game-winning field goal. Without this intervention, the game might well have ended in a stalemate. 

Fast forward to today, with vast sums of money bet on the NFL and other high-profile sports (wagers on the Superbowl are now eclipsing $1 million). Imagine if someone, hoping to swing a large bet in their favor, hired a hacker to activate a stadium's sprinkler system, tilting the odds in one team's favor. Indeed, there are multiple ways that outside stakeholders can influence the outcome of a game today. Those who oversee these big events have to be on alert. 

Preparing for the big leagues

While most businesses operate within a defined risk threshold due to resource limitations, those in charge of securing major sports events cannot afford such luxury. They must adopt a near zero risk tolerance because even a minor hiccup can spell catastrophe. The endeavor is like orchestrating a NASA space mission, where multiple layers of backup systems ensure resilient, uninterrupted operations.

Big event coordinators must worry about a full gamut of malicious characters, from a lone wolf hacker looking for their first big cyber strike, to nation-state actors involved in cyberespionage or politically motivated schemes, to hacktivists seeking the spotlight for their cause. The level of security orchestration required is unparalleled.

What corporate security pros can learn from their event peers

What insights can event security provide for corporate security teams? There are several key strategies worth considering. 

First of all, set adequate time for planning. Annual event teams start working on the next year’s event the next morning after the current event ends. Thorough preparation ensures smoother implementation. 

Second, adopt an “all in this together" mindset. Every part of the organization — along with the links of its supply chain — are connected to each other. Event security teams engage with partners, vendors, local and federal authorities, transportation providers like Uber, Lyft and contracted shuttle services, and any other entities associated with the event, directly or indirectly. By working more closely with the third parties involved in their organization’s activities, corporate security teams can improve overall cyber resilience. Find your allies and engage them.

Third, conduct regular tabletop simulations. These exercises model potential challenges and provide an effective forum for devising effective countermeasures. Such simulations are ideal opportunities for teams to push themselves to create effective approaches and work out any kinks. 

Williams Shakespeare said that “All the world’s a stage” and there isn’t any stage bigger than global sporting events such as the Super Bowl. Just as the athletes who participate in these games, event planners invest great preparation to ensure that these events play out safely. As corporate security pros enjoy Super Bowl Sunday and other big events, they can appreciate how those planners ensured security on game day!

KEYWORDS: cyberattack hacker security strategies Super Bowl Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ilia sotnikov 2023

Ilia Sotnikov is Security Strategist & Vice President of User Experience at Netwrix. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • stadium_enews

    Establishing a Winning Game Plan for Super (Bowl) Security

    See More
  • NYPD Installed 200 Security Cameras for Super Bowl Week

    See More
  • CBS Accidentally Airs Super Bowl Security's Wi-Fi Password

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
  • August 20, 2012

    Radiological Emergency Planning: Terrorism, Security, and Communication

    Participants will examine the latest principles and requirements to prepare for and respond to a radiological emergency as well as develop the skills necessary to effectively communicate with the media and public during crisis situations.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing