Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical Security

Securing Soft Targets and Crowded Places

How can enterprise security secure soft targets and crowded places without intruding on the entertainment aspect of events?

By Maria Henriquez
SEC0320-soft-feat-slide1_900px.jpg
SEC0320-soft-slide2_900px.jpg

“Ideally, both private and public sectors need to bring their resources, task forces and academia to share information to stay informed by creating a Special Event Working Group to develop guiding principles with a common mission to better serve soft targets.”

Photo courtesy of John Griffin, Jr.

SEC0320-soft-slide3_900px.jpg

“Knowing that security professionals are often the first responders, we develop security aptitude to recognize the early signs of an attempt to mitigate risk or loss of life,” says John Griffin, Jr. of AGB Investigative Services.

Photo courtesy of John Griffin, Jr.

SEC0320-soft-feat-slide1_900px.jpg
SEC0320-soft-slide2_900px.jpg
SEC0320-soft-slide3_900px.jpg
March 13, 2020

Mass casualty terror attacks, such as the Ariana Grande concert in Manchester, United Kingdom, in May 22, 2017, the October 1, 2017 Route 91 Harvest music festival on the Las Vegas Strip, Nev., and the Walmart shooting on August 3, 2019 in El Paso, Texas, have left civilians questioning whether attending an event in a crowded place is safe.

Six in 10 Americans are now more worried about themselves or a family member being the victim of a mass shooting than ever before, according to a 2019 Gallup survey, Americans’ Level of Worry Being a Victim of Mass Shooting. Gallup conducted the survey on August 15, 2019, less than two weeks after back-to-back shootings in a 13-hour period: nine people were killed in Dayton, Ohio, and 22 were killed in a Walmart store in El Paso, Texas.

A 2019 American Psychological Association (APA) report similarly found that 33 percent of U.S. adults say fear of being a victim of a mass shooting prevents them from going to certain places, such as a mall (50 percent), school or university (42 percent), movie theater (38 percent) and a public event (53 percent).

“Mass shootings are a public health issue, and we need to take a comprehensive public health approach to understand and devise lasting policy solutions,” says Arthur C. Evans Jr., PhD, APA’s Chief Executive Officer. “It is important that people and policymakers realize that this is not an insurmountable issue; it is something we have the power to change.”

 

Addressing Security Challenges

Enterprise security can play a key role in shifting the public’s perspective on public events, says John Griffin, Jr. of AGB Investigative Services in Chicago, Ill. The answer is by ensuring that a comprehensive security plan is in place and that the security professional continuously trains on new threats, he says.

Griffin is a certified forensics expert who co-founded AGB in 2001, and has been involved in high-level security protection (both physically and virtually), vulnerability assessments and investigations for 18 years. He has extensive local and national experience. He received his training from the Department of Defense, the Department of Homeland Security (DHS) and the U.S. Secret Service.

For example, similar to all cities throughout America, the city of Chicago hosts many neighborhood events that are free to the public, yet come with unpredictable crowd sizes, says Griffin. During the summer, especially, the city hosts events such as the Millennium Park Summer Music & Film series, where attendees can grab a seat in the pavilion or bring a picnic, enjoy outdoor movies and concerts at Chicago’s architectural gem – the Jay Pritzker Pavilion. Other free events where large crowds gather include the Annual Taste of Chicago, Chicago Summerdance, the Annual Chicago Air and Water Show and the World Music Festival.

“Security firms have served the cities like Chicago and its residents with many security services, from providing access control, bag checks, magnetometer scanning, plain clothes surveillance, to armed patrol, helping to ensure the safety of patrons who attend the events hosted by the city,” says Griffin.

“Many of these events have unprotected perimeters, and they require strategic planning on how to maintain a line of sight to recognize would-be bad actors,” he notes. A challenge in securing a crowded place is that security professionals are only able to control their sphere of influence, he says. “The security executive can only react to the scope of his or her purview, as they can only see 5,000 linear feet in each direction,” he adds. “Clients who are budget-conscious limit the security details’ ability to properly staff an event to include all the attributes that are recommended in order to ensure security is available in a variety of ways to provide the most comprehensive coverage.”

Budget constraints or not, to ensure the protection of a “soft target,” technology and strategic planning is required to gather information, quickly detect vulnerabilities, respond to risks and eliminate threats, thus providing a fun and safe environment to anyone attending a public event, he says.

Those attendees are a “soft target” – a person or thing that is relatively unprotected or vulnerable and can encompass electric grids, railroad tracks, water supply, gas supply, public transportation, banking, manufacturing or places of worship, says Griffin. “Soft targets and crowded places, such as sports venues, shopping venues, schools and transportation systems, are locations that are easily accessible to large numbers of people and that have limited security or protective measures in place making them vulnerable to attack,” he notes.

 

Solutions to Securing Soft Targets

Griffin says some aspects to consider when securing both soft targets and crowded places include:

  • Creating a Special Event Working Group.
  • Evaluating Special Event Readiness Levels (SERL).
  • Determining the Special Event Readiness Assessment Ratings (SEAR).
  • Developing an emergency preparedness plan.

Security professionals should consider insider threats and vulnerabilities, and ensure the comprehensive security plan is realistic, he notes. Griffin explains that a carefully considered, realistic and inclusive security plan takes into consideration SERL, which includes:

  • Size of the event (and resources available in the field office).
  • Threat - includes known threats to the event, current levels of domestic and global terrorist activities, and the realistic degree of danger that known terrorist groups may pose to the event.
  • Significance - some events have historical, political and/or symbolic significance that may heighten concerns about the event being a target.
  • Duration - events lasting for extended periods of time require more resources.
  • Location - certain locations may be more inviting for attacks; the geographic dispersion of an event is also a factor.
  • Attendance - who is attending (cultural, political and religious backgrounds).
  • Media coverage - events with national or international media coverage may provide an inviting stage with a large audience for attackers to make a “statement.”
  • Dignitaries - high-level heads of state and VIPs require more protection and resources because they often are targets for attacks.

Griffin utilizes a SEAR approach, which the DHS Office of Operations Coordination says is a risk-based methodology that considers threats, vulnerabilities and consequences for the event. The event may receive one of the following SEAR ratings:

  • Level 1 - Significant events with national and/or international importance that require extensive federal interagency support.
  • Level 2 - Significant events with national and/or international importance that may require some level of federal interagency support.
  • Level 3 - Events of national and/or international importance that require only limited federal support.
  • Level 4 - Events with limited national importance that are managed at the state and local levels.
  • Level 5 - Events that may be nationally recognized but generally have local or state importance.

A comprehensive security plan should also consider the use of various specialized security services to further provide safety and security, such as explosive detection canines and handlers, mounted units, bicycle units, crisis management units and other units, as well, says Griffin.

Griffin also follows an U.S. Department of Justice guideline, Planning and Managing Security for Major Special Events, that dictates that after an event, it’s necessary to conduct an assessment of:

  • The functions and activities that occurred during the event.
  • The type of security that was implemented.
  • What security actions were done correctly and worked.
  • What security actions were implemented incorrectly, the reasons why and the consequences.
  • Make final recommendations for what should be retained and changed for security at future events.

 

Public vs. Private Sector

One challenge that many security firms face is helping clients and potential clients understand the need to secure a soft target, Griffin says, as they may generalize security and defer to law enforcement for consultation and coverage. That’s not a solid solution, he notes, as “Law enforcement’s first priority is to municipal public safety, and if an event was to occur in the municipality, they would be coerced to redeploy to provide public safety.”

“When clients use experienced private security, the first priority of the event is security,” Griffin contends. “Using multiple looks, security can assimilate into crowds to look like the attendees, and listen and watch situations as they manifest during the festivities.” By looking like any other attendee, private security can blend in without distracting from the fun and entertainment around them, he adds.

However, Griffin recognizes the need for both public and private security to come together for the benefit of securing the soft target. “The soft target for both public and private is the same,” he adds. “The available resources to thwart the threat differ as the public sector has law enforcement, where the depths of coverage protection are far greater than the budgets of the private sector.”

He suggests many ways in which the public and private sector can work together to better secure soft targets and crowded places. When working together, information sharing is pertinent, Griffin says. “Ideally, these sectors need to bring their resources, task forces and academia to share information to stay informed by creating a Special Event Working Group to develop guiding principles with a common mission to better serve soft targets.”

Primarily, Griffin says that it is imperative for security professionals to continue to hone skills, both physical and technical. “Not only do you train on new threats, but you need to learn about technology to stay abreast of new threats.”

To ensure the safety of customers, staff and soft targets, as well as maintain overall business continuity against everyday threats, it’s of great value for security executives to “make sure they train, train and then train some more.”

KEYWORDS: access control active shooter event security public security soft target

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Feature-img

    Cyber-physical security in an interconnected world

    See More
  • CISA Bomb Prevention Training video

    CISA Office for Bombing Prevention provides counter-IED training

    See More
  • leadership

    Adding value to people and places

    See More
×
“Ideally, both private and public sectors need to bring their resources, task forces and academia to share information to stay informed by creating a Special Event Working Group to develop guiding principles with a common mission to better serve soft targets.” Photo courtesy of John Griffin, Jr.
“Knowing that security professionals are often the first responders, we develop security aptitude to recognize the early signs of an attempt to mitigate risk or loss of life,” says John Griffin, Jr. of AGB Investigative Services. Photo courtesy of John Griffin, Jr.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!