Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesPhysical SecurityArenas / Stadiums / Leagues / Entertainment

Defense is Your Best Offense: Understanding the Fundamentals of Risk-Based Security

By Chris McLauglin
executive
September 11, 2018

In football, the room for error is slim to none. The hours of film study, drills and situational awareness all play a major role in what separates the good from the great. For defense coordinators, this means ensuring the off-season is focused on building an aggressive defensive line that can work cautiously and is flexible enough to make real-time adjustments. To beat a cagey, clever foe during a game, the defensive line needs a strong backbone strategy to keep them prepared for any situation.

Successful strategists in the security arena face the same kind of tactical issues. Attackers are skillful, resourceful and motivated to succeed. Football coaches can’t deploy a “one-size-fits-all” strategy, and neither can security strategists. On a macro level this is called “Risk-Based Security” or RBS, which at its core defines a commitment to flexibility and adaptability to deal with ever-changing threats. RBS uses a “tailored” approach to security that adjusts over time based on changes in the environment and in the risk profile of different groups, such as employees, visitors and dignitaries. RBS is designed to mitigate risk, evoke a sense of safety and not present an undue burden on the users. Most commonly this strategy is used at airports in the form of “TSA Precheck.”

Risk-Based Security Gets in the Game

The traditional, one-size-fits-all approach to physical security is cumbersome. It typically involves security officers physically inspecting every person entering a facility, relying heavily on the limited capabilities of metal detectors. This approach is costly and slow, and often ineffective without additional capabilities to screen more aggressively. A risk-based approach recognizes that while there is no perfect security solution, those solutions that strategically balance security, access, usability and cost can provide the best long-term protection.

An effective RBS strategy puts equal emphasis on technology solutions and more people-focused factors like organizational, managerial and operational capabilities. It relies primarily on a short list of components, including gauging threats; understanding vulnerabilities; vetting users; identifying users; and attaching risk assessments. It also includes routing high-, low-and unknown-risk users through the appropriate security channels.

An RBS strategy is also reliant on an enterprise approach that not only uses excellent technology to perform physical screening but also ensures the personnel performing the screening are using the technology appropriately. When implementing a risk-based security strategy, security professionals need to focus on two priorities: First, they must establish a “known patron” program that includes a quick way to validate membership at the entry to the screening system of a facility. Second, they must tailor the screening process to account for the different risk levels of those entering the venue.

How RBS Can Combat Modern Threats

Attackers have shifted their focus from hard targets such as airplanes and government facilities to soft targets such as sporting venues and music arenas. This shift has created need for a new approach to venue security. It is no longer enough to just to screen visitors and guests as they enter the stadium. We need to expand the security perimeter beyond the walls of the building and focus on new strategies, such as RBS, for long-term protection against an evolving risk landscape.

The potential benefits of implementing a risk-based screening program are significant. It can make entering a venue easier while maintaining a level of safety, allowing faster throughput, and thereby mitigating the risk of long lines. This can create a better experience for known, repeat customers as well as improve overall brand perception of a venue. Overall security costs can potentially be decreased as the security staff is optimized. Further, while organizations want the safety that screening systems provide, they do not want to lose the culture, openness and sense of welcome that make their venues special. Implementing a risk-based security program allows an organization to tailor a program that fits their culture, so they do not have to sacrifice what they represent for safety.

There is no “silver bullet” or “cookie cutter” approach to security. What might work particularly well in office buildings – where it is possible to learn more about the regular user – will be different than in public venues. Like football coaches, successful security strategists make sure they’re prepared, and with risk-based security, they have the tools, plans and training intact to ensure they’re ready to defend.

KEYWORDS: active shooter security leaders security risk management security technology sports security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris McLaughlin, Vice President, Global Solutions, joined Evolv Technology in the fall of 2016 to lead work in the transportation sector. In this role, he leads engagement with airports, airlines, and rail organizations and assists in other sectors to develop concepts of operation and configurations that integrate into existing and emerging landscapes. Prior to joining Evolv, McLaughlin worked for the Transportation Security Administration first as a Federal Security Director in Colorado and then as the Assistant Administrator for Security Operations where he led a team of 56,000 employees across more than 450 airports nationwide and managed a budget of $4 billion. As a national policy maker, he worked closely with national industry associations, other federal agencies, and Congress, and was instrumental in shaping and advancing TSA’s current philosophy of risked based security. Chris also led field operations and security for the biometric security provider, CLEAR, as well running ground operations at major hubs and line stations for United Express and Frontier Airlines. Following in his father’s footsteps, he started his career as a self-employed blacksmith, providing top-end farrier services in the mountains of Colorado.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber laptop2

    The Human Strategy is the Best Cyber Defense to Combat COVID-19

    See More
  • zero trust-freepik1170x658v59703.png

    The fundamentals of implementing a zero trust security policy

    See More
  • Operational resiliency and assessing risk; how enterprise security leaders can mitigate risk amid COVID-19

    Understanding and acting on the risks the pandemic has brought to your business

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!