Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Assignment 6: Information Security and Event Security Activity 6: Event Security Upon completion of the Required Readings, consider the following scenario: Traxler Industries asks you to prepare security for an upcoming event hosted at its Chicago, Illinois, headquarters

Assignment 6: Information Security and Event Security Activity 6: Event Security Upon completion of the Required Readings, consider the following scenario: Traxler Industries asks you to prepare security for an upcoming event hosted at its Chicago, Illinois, headquarters

Law

Assignment 6: Information Security and Event Security

Activity 6: Event Security

Upon completion of the Required Readings, consider the following scenario: Traxler Industries asks you to prepare security for an upcoming event hosted at its Chicago, Illinois, headquarters.  Salman Rushdie, the author of Satanic Verses, has been selected as the keynote speaker for the event. This will be his first public event since the publication of his book, decried by many Muslims as heretical. Mr. Rushdie has been in hiding for the last decade due to the many death threats he has received. All corporate management and their families from all of Traxler’s locations in Saudi Arabia, Dubai, and Anchorage, Alaska, have been invited to the event, about 1,000 people. Mr. Rushdie intends to speak about religious tolerance and the need for “East to meet West.” 

Prepare a security plan that will meet the needs of this event. In the plan, include steps to address the following: 

(a)  location/facility,

(b) security operations,

(c)  physical security,

(d) information security,

(e)  staff and executive protection, and

(f)  contingency anticipation.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Event security

A security plan aims at reducing threats. The program has three main intentions based on risk evaluation: decreasing the level of threats people are undergoing, reducing exposures, and cultivating capabilities. The security program consists of daily procedures, measures, and protocols to help manage any religious threats in a specific area. This security plan concerns religious tolerance of the upcoming event, covering a region with a thousand people. The following are the steps addressed in the program. 

Location/facility

Facility security refers to the physical safety of the space where the activity will occur, including access control mechanisms, intruders' control, and maintenance of records. The security plan is documented to ensure that every person invited, executive, and team member feels safe and protected from religious threats (Desouza, 2007). There will be security standards set which are integral for the people to adhere to and have guidelines on what to do during the event. In assessing the risk levels, the concerned will ensure that the location is restricted to only the invited people. Emergency and standby tools are there to maintain essential services, and the competency and reliability of the staff are enhanced. The other most important thing is selecting an appropriate place that is not religiously biased. The place should be a place that people will feel safe in the event.

Physical security 

Physical security refers to safeguarding a specific place from threats, vandalism, or damages. It is required to ensure that the area selected for the event is suitable for the activity intended, has practical emergency preparation, reliable power materials, adequate climate mechanism, and reasonable protection from invaders (Desouza, 2007). It is recognized in the security process and, when adhered to, will end in the assortment of physical countermeasures depending on suitability. The chosen countermeasures should be admissible from the cost perspective. The security planning procedure will identify which resources are needed to protect people and the threats that could compromise those assets. 

Physical security needs building sites to be protected in a manner that reduces the threat of resource damage. The decision-makers must be apprehensive about building construction, emergency measures, and religious tolerance rules to achieve this. The only way to certify that security is enhanced is to demand that before any individual is given the right to enter the area, they must sign and return a valid contract. This basic security strategy is essential to permit exemptions (Desouza, 2007). Countermeasures come in diverse sizes, shapes, and levels of complexity. For instance, there is the need to create a secure environment where there is no arousal of unnecessary interests in the critical facilities. These could be images that attract attention to many in the event displaying sensitive information.

Security operations

The security operations center acts as a central point of the event. The people and processes continuously monitor and advance the security posture to prevent, analyze, detect, and respond to any incident. Prevention is usually more operational than reaction; Instead of reacting to risks as they occur, the security operation center monitors the networks around the area (Bal et al., 2013). By doing so, the employees can detect malicious actions and avert them before leading to any destruction. It is always an important area where analysts will catch any suspicious thing; they collect more information and investigate deeper.

During the investigation, the security operators will analyze the malicious actions to regulate the risks and the degree to which they entered the event. The analysts view the event's procedures from an attacker's perspective, looking for leading signs and areas of disclosure before they are subjugated. The analysts are expected to identify and triage various security occurrences by accepting how attacks reveal and successfully respond before they get to the point that can't be handled (Bal et al., 2013). They gather info about the threat that might have happened using specifics on attackers' performances and technologies to triage effectively. After investigation, the group will coordinate a reaction to remediate the problem. As soon as the incident is definite, the team will respond and terminate the harmful process to prevent them from causing more harm to the rest of the people.

Staff and executive protection

For companies, it is essential to ensure that the staff and executives are safe and secured from the risk first. Integral to offering that security is adequate corporate threat management and for people, specifically executives, experienced executive protection are essential. Mitigating potential risks can help the companies avoid severe and damaging outcomes (Bush, 2002). Executive and staff safety can comprise travel risks, workplace violence, and in this case, is the issue of religion. Best practices can be put in place to ensure necessary protection is done during the event planned. Since the staff might be from different countries, it is essential that the professionals concerned with security conduct advanced research of the place where the event will occur. 

One efficient way to better understand the area is to work with the locals, highly skilled and reliable security personnel to know and understand their religious beliefs. It helps them plan and have extra insights into the area and threats associated with it. After learning the extent that staff and executives will travel, it's essential to know the area's risk concerning religion (Bush, 2002). Whether its political unrest, criminal issues, or other problems, understanding potential risks will help the team plan for protection effectively and provide safety in any emergent dangers. Each risk will have an exceptional response based on the situation and potential threat. If a known threat targets a speaking engagement, it is the role of skilled protection personnel to assess the danger posed and increase the response force or add other mitigation steps to overcome the risk.

Contingency anticipation

It is a written risk management document that offers guidelines, recommendations, and consideration for the companies to recover from a risk. In this case, it is all about religious tolerance in the event planned among diverse countries. It offers the team, fire brigades, and workers the chance to pre-plan through the mock exercise that replicates disasters, explosions, or fires. The end outcome is a better-prepared team of workers ready to respond to any contingency. The document must have emergency response activities which consist of incidents, crises, or disasters and controlling the incident. In case conflicts erupt among people during the event, which can cause damage to the occurrence, the contingency plan is used as a guideline to recover to normal (Clark, 2010).

Basic assumptions are required to be developed to have ground guidelines. It is finest to use as a standard for planning numerous probable threats comparable to the time of the event, accessible resources, and removal of personnel that must be considered in forming response constraints for emergency actions. It is always important to list and prioritize risks that might happen in the event and have an emergency response to them. For instance, let's say a conflict occurs between people; the only way to overcome the issue better is to follow the guidelines about the religion and secure the people involved. It is also essential to keep reviewing the plan frequently due to operational, technological, and operational changes that might make it efficient.

 

OUTLINE

Topic: Event security

The paper covers the following:

  • A security plan aims at reducing threats. The program has three main intentions based on risk evaluation: decreasing the level of threats people are undergoing, reducing exposures, and cultivating capabilities. The security program consists of daily procedures, measures, and protocols to help manage any religious threats in a specific area.
  • This security plan concerns religious tolerance of the upcoming event, covering a region with a thousand people. The following are the steps addressed in the program. 

Location/facility

  • Facility security refers to the physical safety of the space where the activity will occur, including access control mechanisms, intruders' control, and maintenance of records. The security plan is documented to ensure that every person invited, executive, and team member feels safe and protected from religious threats (Desouza, 2007). 
  • There will be security standards set which are integral for the people to adhere to and have guidelines on what to do during the event. In assessing the risk levels, the concerned will ensure that the location is restricted to only the invited people.

Physical security 

  • Physical security refers to safeguarding a specific place from threats, vandalism, or damages. It is required to ensure that the area selected for the event is suitable for the activity intended, has practical emergency preparation, reliable power materials, adequate climate mechanism, and reasonable protection from invaders (Desouza, 2007).
  •  It is recognized in the security process and, when adhered to, will end in the assortment of physical countermeasures depending on suitability. The chosen countermeasures should be admissible from the cost perspective. The security planning procedure will identify which resources are needed to protect people and the threats that could compromise those assets. 

Security operations

  • The security operations center acts as a central point of the event. The people and processes continuously monitor and advance the security posture to prevent, analyze, detect, and respond to any incident. Prevention is usually more operational than reaction; Instead of reacting to risks as they occur, the security operation center monitors the networks around the area (Bal et al., 2013).
  • By doing so, the employees can detect malicious actions and avert them before leading to any destruction. It is always an important area where analysts will catch any suspicious thing; they collect more information and investigate deeper.

Staff and executive protection

  • For the companies, it is essential to ensure that the staff and executives are safe and secured from the risk first. Integral to offering that security is adequate corporate threat management and for people, specifically executives, experienced executive protection are essential. Mitigating potential risks can help the companies avoid severe and damaging outcomes (Bush, 2002).
  •  Executive and staff safety can comprise travel risks, workplace violence, and in this case, is the issue of religion. Best practices can be put in place to ensure necessary protection is done during the event planned. Since the staff might be from different countries, it is essential that the professionals concerned with security conduct advanced research of the place where the event will occur. 

Contingency anticipation

  • It's a written risk management document that offers guidelines, recommendations, and consideration for the companies to recover from a risk. In this case, it is all about religious tolerance in the event planned among diverse countries. It offers the team, fire brigades, and workers the chance to pre-plan through the mock exercise that replicates disasters, explosions, or fires.
  • The end outcome is a better-prepared team of workers ready to respond to any contingency. The document must have emergency response activities which consist of incidents, crises, or disasters and controlling the incident. In case conflicts erupt among people during the event, which can cause damage to the occurrence, the contingency plan is used as a guideline to recover to normal (Clark, 2010).

Related Questions