Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Leadership and ManagementArenas / Stadiums / Leagues / Entertainment

Unconventional Security: Managing Safety & Security for Conventions

Unconventional Security-July-2018
July 9, 2018

The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events? Security discussed how convention security differs from sporting event security, among other events, and what CSOs should know before moving forward with an event with Brad Mayne, President and Chief Executive Office of the International Association of Venue Managers (IAVM), an association representing public assembly venues around the world, including auditoriums, arenas, convention centers, exhibit halls, stadiums, performing arts studios, university complexes and amphitheaters.

 

SECURITY: What are some of the main risks and challenges of securing a convention or association event?

 Mayne: The main overall challenge of securing a convention or association event is the current threat environment of homegrown extremists throughout the world who are focused on anywhere the public gathers, coupled with the fact that public venues have been designed for public accessibility for the communities they serve. Another challenge with convention centers in particular is they host multiple events at the same time. Convention venues have large spaces, freight doors for access to event rooms, multiple public doors, public walkways through the venue and other unique physical layouts that demand a high level of attention.

 

SECURITY: What makes securing a convention or conference different from securing other large-scale events, such as sporting events or concerts?

Mayne: Convention and conference centers require open access by nature, while sports and entertainment venues have been designed to need a form of ticket or pass to enter the venue. This pre-entry process secures sports and concert venues at key locations outside the building, or at minimum, at the building’s entryways.

 

SECURITY: What proactive steps should security leaders for convention spaces take for each event, and how early should they start, in general?

Mayne: The first step in securing a building and the events it hosts is to implement a third-party risk assessment for the venue as well as for each specific event. The building risk assessment should be completed as part of the commissioning of the venue. The assessment for the event should be determined prior to the event with enough time to implement the plan during the move-in portion of the schedule. Based on the risk assessment, the venue manager and event manager need to collectively determine a security plan and implementation that is reasonable for the event.

Another part of the security plan needs to be the ability to react in times of trouble or tragedy. No matter how strong a venue’s security plan and implementation may be, there will still be a possibility of challenges or tragedy. This uncertainty requires the venue, show and local authorities be committed to responding to challenging situations just as much as they are committed to stopping the attempts from happening.

 

SECURITY: How does security technology play a role in mitigating convention security risks?

Mayne: Technology is ever-changing and making a great and positive difference in securing venues and events. Every venue employs different technologies based on their resources and specific needs in their community, but these intelligent electronics can be very effective and an integral part of the event security plan. Show organizers also have technologies available to them, and both the venue and the show must coordinate the technologies to be used for each event, so there is a clear plan on their use.

 

SECURITY: How can security leaders ensure that security personnel throughout a space are prepared for each new event? (i.e., training, awareness, drills and tabletops)

Mayne: Security leadership needs to ensure security personnel are vetted, trained and given resources to accomplish their responsibilities. It is essential security staff are knowledgeable of the venue’s security plans and resources, which need to include smart practices and protocols that are practical, scalable and efficient in mitigating risk. Tabletop exercises, in which challenging scenarios are discussed, are a great tool for staff to determine emergency plans and options for implementation. Individuals involved in these exercises become more aware of potential threats and how to address them quickly and correctly.

 

SECURITY: Do you have any overall best practices for convention security that you think CSOs should know about?

Mayne: The most important change on the horizon that CSOs should be aware of is the industry’s Exhibition Meetings Safety and Security Initiative (EMSSI), which is dedicated to creating smart practices and protocols for the meetings and exhibition industry. This effort is being led by IAVM, IAEE and ESCA in conjunction with the Department of Homeland Security’s Safety Act Office. The mutual relationship with DHS and the organization’s resources is a real plus for CSOs, because venues will use the industry document as a tool to apply for and achieve Safety Act Designation and eventually Certification.

More than 60 organizations are in support of EMSSI thus far, and that number is expected to grow. The Industry Security Council is completing the final review of the industry document, and it is anticipated to be available to convention centers through a secure portal in the later part of this year.

In addition to supporting EMSSI, continuous staff education and training is key. IAVM has several training programs, such as the Academy for Venue Safety and Security, that venues have been taking advantage of over the past year. Our curriculum was designed by experts in the field and equips venue professionals and staff with best practices, resources, and tools, so they are better prepared to face the evolving challenge of providing a safe venue for everyone.

 

SECURITY: Where can security leaders go to learn more about this topic?

Mayne: As we move forward with this initiative, go to www.IAVM.org/EMSSI, which will provide updates on the EMSSI program. The U.S. Department of Homeland Security is another strong resource, given its mandate to offer resources to protect public infrastructure.

KEYWORDS: convention security planning Emergency Preparedness event security security standards threat assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • control-enews

    3 Steps for Managing Scope Creep in Security Operations

    See More
  • arenas feat

    Managing Critical Risks and Timing in Sports Security

    See More
  • dataminr-connected tissue

    Predictions: Safety and Security Trends for 2020 and Beyond

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing