10 Tips for Offsite Meeting SecurityAdded 2nd Feb 2012
When an organization hosts an offsite event, whether it is a small meeting, or a massive industry conference, it also presents an opportunity for the security department.
"In these situations, security can really shine, or really stub its toes," said William Besse, Vice President of Consulting and Investigations with security firm Andrews International. "These offsite events aren't a time when security needs to be dozing. They need to be on their game."
Besse, who at one point in his career was the director of global corporate security for cosmetics giant Mary Kay, became well-versed in the challenges of hosting large off-site events. Mary Kay annually holds incentive meetings for members of its huge global sales force and those events often include hosting as many 50 to 60 thousand people in a major convention venue.
"Security can either build a reputation as a contributor or enabler of these events, or as a department that wants to make it look bad and is an obstacle to making it happen," he said.
In order to be one of those security departments seen as an enabler, Besse recommends several steps to take, before and during an offsite, to ensure the event goes off without a hitch.
Besse, along with physical-security consultant Dan Finger, offer these tips for keeping an off-site venue secure.
Get to know the venue, inside and out, well before the event.
If possible, Besse recommends security get involved in the process as early as choosing a venue.
"Have individual meetings with hotel management so you can get an understanding about their rules and regulations and what they can do to help you secure this event," he said. "Get to know customer service."
Once you've agreed on a site, before operations even begin, security needs to be well-versed on all exits, stairways and other access points. Knowing the building inside and out is crucial.
"Also you need to decide where to have your security center at the venue," said Besse. "Where will sec-ops be conducted out of? Will there be phones, copiers, computer access in there? Will you need to augment the venue's security with your own additional?"
Determine local emergency medical capabilities
The most likely unplanned event at an offsite meeting is a medical emergency, said Besse. Security should have a plan in place for handling this that includes a visit to the local hospital emergency room before the event.
Other considerations should include whether there will be attendees at the event with special medical needs and how should the onsite team be equipped to handle that, said Besse.
Know what proprietary information is at stake
In addition to the safety of your attendees, what else is at stake with this off-site? Is the organization going to present proprietary products or information that needs to be closely guarded? What are your plans for ensuring it STAYS guarded?
"Figure out what is being displayed and what happens if there is an evacuation," said Besse. "What do we do with proprietary information or products in that scenario? Also, if it's a highly-value consumer product on display, we might put up close-circuit TV surveillance on the product, on the doors, and bring in our own security systems."
Have a solid access-control strategy
Perhaps the most important aspect of ensuring proprietary and sensitive information stays contained within the event is to ensure that those who have access to it are the ones you want to have access to it, said Dan Finger.
"A lot of it will start at registration," he said. "Ask for ID. A lot of times at events I just give my name and I'm given a badge to enter. But if it is an event with proprietary information, have registration explain to folks there is proprietary information being discussed and we need to see some identification before we can let you in."
Make sure credentials are visible and clear
The next step is actually getting attendees to wear their credentials, said Finger, and to keep an eye out for those wearing the wrong badge, or no badge at all.
"There may be another event going on in the same venue and people from that event might wander over to yours," he noted. "It's important to have security keeping an eye on the badges people are wearing to make sure everyone is in the right place and an outside party doesn't gain access to information they aren't there to see or hear."
Figure out your signage
Many events will feature signs throughout the venue to direct attendees to the various meeting spots. But, in some instances, certain events may call for little or no signage.
"Depending on the event, I wouldn't even put up signs because it attracts attention," said Finger. "Sometimes, the less publicity, the better."
Scope out possible hiding spots for recording devices
Plants, under benches and window sills are all places where recording devices could be hidden, said Finger. If proprietary issues and recording are both concerns, security should have a plan to regularly sweep such areas to check for such things.
But also keep in mind many attendees will have recording devices right in their laps. "Are people listening going to be recording with an iPad or other device? What are people allowed to bring in to the meetings in the first place?" said Finger. These are all things that need to be considered so the demonstration of your next beta doesnt end up on YouTube tomorrow, he said.
Check in on venue staff
Staff vetting may be necessary if you are concerned about the potential for spying or political statement.
"You may want to check with the hotel on new hires in last few weeks," said Finger. "Any new hire could be coincidental, but there could also be a plant going on. Are you bringing someone in who could be the target of kidnapping attempt, or an assassination attempt? If you are, you want to know about local staff."
Decide on vehicle access
Depending on how politically charged the event may be, or how sensitive the topics are that are being discussed, the meeting could attract people looking to make a statement, said Finger. Although rare, a demonstration could include trying to drive a car into a building.
"Security may want to develop buffer zones, designated areas away from the buildings," said Finger. "One idea is to set up some temporary bollards that would discourage people from trying to do something. Large concrete planters can be a deterrent, but also be aesthetically pleasing."
Plan your parking arrangements
Parking is not always a significant issue, but if it is: "Do you have a plan?" asks Finger. If your venue is in an area with large parking areas, are you comfortable with attendees walking through them alone at night? If not, what will you do to ensure safety?
Some ideas include staffing extra lot attendants to ensure people get to their vehicles safely, or augmenting the existing lighting in the lots with additional lights that you provide.
Shortly after a jury in Texas awarded it US$532.9 million in damages in a patent dispute with Apple, patent company Smartflash has sued the iPhone maker again, this time to focus on newer Apple products.
An unknown number of John Lewis and Waitrose customers have been asked to pay a £1.53 postage charge by the Royal Mail after a franking machine failed to correctly stamp letters sent out as part the firm's latest credit card marketing campaign.
The ICO has handed online insurance firm Staysure.co.uk a stinging £175,000 fine after chaotic security practices allowed hackers to steal details of 100,000 credit card numbers from the firm's database, several thousand of which experienced fraud.
It's Friday night--time for you and your buddies to hammer out your plans for the evening. You know the drill: you start with a group text, then you launch Yelp to find a restaurant or bar nearby. Oh, there will be eight of you? Better make a reservation; switch to Open Table. Joe suggests you catch a movie first, so now you launch Fandango. And the app-switching cycle continues until your plan is finalized.
The U.S. government is mulling radical changes to the current music-licensing framework, a cobweb of anachronistic regulations. Perhaps a better analogy still would be a noose, because this inequitable licensing regime is in many ways strangling music itself. It's depriving musicians of the financial oxygen they need to sustain their craft.
The recommendation engine suggests things you might enjoy watching based on a set of like and dislikes.
Government-backed competition will offer firms the chance to work with Accenture, American Express, Experian and Lloyds Banking Group
The electronics industry may still be reliant on human workers to assemble products, but Apple supplier Foxconn Technology Group is hopeful that robots will take over more of the workload soon.
Some Apple products may be banned from sale in the U.S. if Ericsson gets its way after filing a barrage of patent lawsuits.
If you had told me last December that in the first part of 2015, a smartwatch would make headlines across the world, shatter sales records, and create a constant stream of refreshes, hashtags and bad puns, I would have naturally assumed you were talking about Apple Watch. For the past five months we've been anxiously awaiting the "early 2015" debut of Apple's first wearable, an entry so important it's basically put its Android Wear competitors on ice as buyers wait to see what Apple Watch can really do.
Toyota this week began production of its first hydrogen fuel cell vehicle (FCV), the Mirai, which will have a starting price of $57,500.
Andrew Kirker is a man who knows the datacentre market better than almost anyone. As regional general manager datacentres for Schneider Electric, one of the world's largest manufacturers of datacentre infrastructure, he has his finger firmly on the pulse.
Australian hearing implant company, Cochlear, is refining its digital roadmap with investments in enterprise content management (ECM) system across core lines of business.
Huddle, the UK startup that raised £32 million in venture capital funding last December, is looking to take on businesses such as Box and Dropbox.
Apple's iOS mobile platform gained user share in security-conscious businesses late in 2014, taking it away from Google's Android platform, thanks to the introduction of the iPhone 6 smartphone, according to a survey of its enterprise customers by mobile security vendor Good Technology.
A few years ago, Evernote picked up a small contact-manager app called Hello (which was then retitled Evernote Hello). One of the main ideas behind the app was to help those of us who had trouble remembering names (a category I definitely fall into). It let you take notes about people you met at, say, a conference, and pick up extra information, including photos, from LinkedIn. You could then use the info and/or the photos to jog your memory.
Other browsers have had it for years, but Chrome is finally adding a "Reader mode" that strips down an online article to its most essential parts--images and text--to make it easier to read. The new feature, dubbed Distill, is currently a work in progress but is still worth trying out for full-time Chrome users.
Netflix's flagship original series House of Cards is back for a third season, dropping into an escalating war over original content.
Advocates for open access to the Internet were popping champagne corks on Thursday after the Federal Communications Commission voted in favor of reclassifying broadband Internet as a public utility. In addition to regulating fixed broadband lines that go into your home, the FCC vote also extended public utility rules to mobile broadband for the first time.