SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Sports	
  and	
  Special	
  Event	
  
Security	
  Planning:	
  Best	
  
Prac7ces	
  
Richard	
  Morman,	
  CPP,	
  CSSP	
  
Deputy	
  Chief	
  of	
  Police	
  (re7red)	
  
August	
  18,	
  2015	
  	
  
2	
  
GOAL	
  
	
  
	
  
Examine	
  current	
  best	
  prac7ces	
  for	
  safely	
  and	
  
effec7vely	
  managing	
  large	
  on-­‐campus	
  events.	
  
	
  
3	
  
Objec7ves	
  	
  
•  Planning	
  	
  
•  Threats	
  and	
  Hazards	
  
•  Risk	
  	
  Management	
  
•  Event	
  Security	
  
•  Resources	
  	
  
	
  
	
   4	
  
Post	
  9-­‐11	
  
	
  
The	
  terrorism	
  incidents	
  on	
  9-­‐11-­‐2001	
  changed	
  the	
  
way	
  we	
  all	
  looked	
  at	
  security	
  planning	
  and	
  
management	
  forever.	
  
5	
  
Special	
  Event	
  
	
  
A	
  special	
  event	
  can	
  be	
  defined	
  as	
  any	
  event	
  where	
  
a	
  large	
  number	
  of	
  people	
  are	
  brought	
  together	
  to	
  
watch	
  or	
  par7cipate.	
  
	
  
6	
  
Special	
  Event	
  	
  
FEMA	
  course	
  IS-­‐15	
  Special	
  Events	
  Con4ngency	
  
Planning	
  defines	
  a	
  special	
  event	
  as:	
  	
  
“a	
  non-­‐rou7ne	
  ac7vity	
  within	
  a	
  community	
  that	
  
brings	
  together	
  a	
  large	
  number	
  of	
  people.	
  Emphasis	
  
is	
  not	
  placed	
  on	
  the	
  total	
  number	
  of	
  people	
  
a]ending	
  but	
  rather	
  the	
  impact	
  on	
  the	
  
community's	
  ability	
  to	
  respond	
  to	
  a	
  large-­‐scale	
  
emergency	
  or	
  disaster,	
  or	
  the	
  excep7onal	
  demands	
  
that	
  the	
  ac7vity	
  places	
  on	
  response	
  services.”	
  
7	
  
Event	
  vs.	
  Incident	
  	
  
	
  
Event:	
  A	
  scheduled	
  and	
  planned	
  ac7vity	
  	
  
	
  
Incident:	
  	
  Something	
  unplanned	
  that	
  is	
  either	
  
natural,	
  technological,	
  or	
  human-­‐caused	
  	
  and	
  	
  
warrants	
  ac7on	
  to	
  protect	
  life,	
  property,	
  
environment,	
  and	
  public	
  health	
  or	
  safety,	
  and	
  to	
  
minimize	
  disrup7ons	
  of	
  ac7vi7es.	
  
	
   8	
  
Planning	
  	
  
	
  
“If	
  you	
  fail	
  to	
  plan,	
  you	
  are	
  	
  	
  	
  
	
  	
  	
  planning	
  to	
  fail!”	
  	
  
―	
  Benjamin	
  Franklin	
  	
  
	
  
9	
  
Planning	
  	
  
	
  
	
  
Pre-­‐event	
  planning	
  is	
  intended	
  to	
  assist	
  you	
  in	
  
developing	
  a	
  Game	
  Day	
  or	
  Event	
  Opera7ons	
  Plan.	
  
This	
  plan	
  can	
  be	
  compared	
  to	
  an	
  Incident	
  Ac7on	
  
Plan	
  (IAP).	
  	
  
10	
  
Planning	
  	
  	
  
	
  
Regardless	
  of	
  the	
  type	
  of	
  event	
  iden7fy	
  the	
  stake	
  
holders:	
  
	
  Anyone	
  that	
  has	
  a	
  func7onal	
  stake	
  in	
  the	
  event	
  
	
  
Considera7on	
  should	
  be	
  given	
  to	
  surrounding	
  
communi7es	
  that	
  may	
  be	
  impacted	
  by	
  the	
  event.	
  	
  
	
  
	
  
11	
  
Planning	
  	
  	
  
	
  
At	
  the	
  start	
  of	
  the	
  process	
  the	
  lead	
  agency	
  needs	
  to	
  
be	
  iden7fied	
  
	
  
This	
  helps	
  avoid	
  confusion	
  and	
  consterna7on	
  	
  
	
  
	
  
12	
  
Planning	
  	
  
	
  
	
  
Na7onal	
  Incident	
  Management	
  System	
  /	
  Incident	
  
Command	
  System	
  can	
  be	
  u7lized	
  to	
  assist	
  in	
  the	
  
planning	
  process.	
  	
  
13	
  
Planning	
  	
  	
  
Unified	
  Command:	
  For	
  events	
  that	
  require	
  use	
  of	
  
mul7ple	
  agencies	
  	
  
Command	
  Post:	
  Loca7on	
  should	
  be	
  iden7fied.	
  
Should	
  not	
  be	
  located	
  in	
  the	
  venue.	
  
Emergency	
  Opera7ons	
  Center	
  (EOC)	
  should	
  be	
  
u7lized.	
  The	
  EOC	
  should	
  not	
  be	
  located	
  in	
  the	
  
venue.	
  
	
  
14	
  
Planning	
  	
  	
  
•  Plan	
  the	
  plan	
  
•  Staff	
  the	
  plan	
  	
  
•  Train	
  the	
  plan	
  	
  
•  Prac7ce	
  the	
  plan	
  	
  
•  Review	
  and	
  adjust	
  the	
  plan	
  	
  
15	
  
Threats	
  and	
  Hazards	
  	
  
	
  
FEMA	
  defines	
  All-­‐Hazards	
  as,	
  “Natural,	
  
technological,	
  or	
  human-­‐caused	
  incidents	
  that	
  
warrant	
  ac7on	
  to	
  protect	
  life,	
  property,	
  
environment,	
  and	
  public	
  health	
  or	
  safety,	
  and	
  to	
  
minimize	
  disrup7ons	
  of	
  ac7vi7es.”	
  
	
  
16	
  
Threats	
  and	
  Hazards	
  	
  
	
  
The	
  All-­‐Hazards	
  approach	
  should	
  look	
  at	
  your	
  
community’s	
  vulnerability	
  to	
  specific	
  hazards.	
  	
  
	
  
This	
  allows	
  planning	
  resources	
  to	
  be	
  dedicated	
  to	
  
those	
  risks	
  that	
  are	
  most	
  likely	
  to	
  affect	
  your	
  
community.	
  
17	
  
THIRA	
  	
  
Threat	
  and	
  Hazard	
  
Iden4fica4on	
  and	
  Risk	
  
Assessment	
  Guide,	
  	
  
Comprehensive	
  
Preparedness	
  Guide	
  (CPG)	
  
201	
  Second	
  edi7on	
  August	
  
2013.	
  
	
  
This	
  guide	
  commonly	
  
referred	
  to	
  as	
  THIRA	
  will	
  
provide	
  you	
  with	
  a	
  process	
  
that	
  will	
  help	
  you	
  iden7fy	
  
and	
  understand	
  risk.	
  The	
  
guide	
  outlines	
  a	
  four	
  step	
  
process	
  to	
  help	
  	
  you	
  develop	
  
a	
  threat	
  and	
  hazard	
  
assessment.	
  
18	
  
THIRA	
  process	
  
19	
  
Risk	
  	
  Management	
  	
  
	
  	
  
	
  
Risk=Threat	
  X	
  Vulnerability	
  X	
  Consequence	
  
	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  R=T	
  x	
  V	
  x	
  C	
  
20	
  
Risk	
  	
  Management	
  	
  
	
  
Risk	
  is	
  the	
  poten7al	
  for	
  an	
  unwanted	
  outcome	
  
resul7ng	
  from	
  an	
  incident,	
  event,	
  or	
  occurrence,	
  as	
  
determined	
  by	
  its	
  likelihood	
  and	
  the	
  associated	
  
consequences	
  
21	
  
Risk	
  	
  Management	
  	
  
	
  
A	
  threat	
  is	
  a	
  natural,	
  human,	
  technological	
  caused	
  
occurrence,	
  individual,	
  en7ty,	
  or	
  ac7on	
  that	
  has	
  or	
  
indicates	
  the	
  poten7al	
  to	
  harm	
  life,	
  informa7on,	
  
opera7ons,	
  the	
  environment	
  and/or	
  property.	
  	
  
22	
  
Risk	
  	
  Management	
  	
  
	
  
Vulnerability	
  is	
  defined	
  as	
  a	
  physical	
  feature	
  or	
  
opera7onal	
  a]ribute	
  that	
  renders	
  an	
  en7ty	
  open	
  to	
  
exploita7on	
  or	
  suscep7ble	
  to	
  a	
  given	
  hazard.	
  	
  
23	
  
Risk	
  	
  Management	
  	
  
	
  
Consequence	
  is	
  the	
  effect	
  of	
  an	
  event,	
  incident,	
  or	
  
occurrence	
  
24	
  
Risk	
  	
  Management	
  	
  
Threat	
  	
  
Vulnerability	
  
25	
  
Risk	
  Management	
  	
  
The	
  Department	
  of	
  Homeland	
  Security	
  (DHS)	
  
defines	
  four	
  risk	
  management	
  strategies:	
  
	
  
1.  Risk	
  avoidance	
  
2.  Risk	
  control	
  
3.  Risk	
  transfer	
  
4.  Risk	
  acceptance	
  	
  
26	
  
Event	
  Security	
  	
  
	
  
	
  
Take	
  a	
  holis7c	
  approach,	
  keeping	
  the	
  components	
  
of	
  personnel	
  security,	
  informaCon	
  security,	
  and	
  
physical	
  security	
  in	
  mind.	
  	
  
	
  
27	
  
Event	
  Security	
  	
  
Things	
  to	
  think	
  about:	
  	
  
•  What	
  are	
  you	
  protec7ng?	
  
•  Why	
  are	
  you	
  protec7ng	
  it?	
  	
  
•  How	
  will	
  you	
  	
  protect	
  it?	
  	
  
•  What	
  is	
  the	
  likelihood	
  that	
  something	
  will	
  
happen?	
  
•  What	
  is	
  the	
  plan	
  if	
  something	
  does	
  happen?	
  	
  
28	
  
Event	
  Security	
  	
  
Temporary	
  workforce	
  
All	
  personnel:	
  	
  
•  Screened	
  and	
  pre-­‐employment	
  background	
  checks	
  
completed	
  
•  Training	
  needs	
  assessment	
  /Training	
  plan	
  
•  Job	
  descrip7ons	
  for	
  each	
  posi7on	
  	
  
	
  	
  	
  	
  	
  (should	
  include	
  post	
  orders)	
  
	
  
29	
  
Event	
  Security	
  	
  
All	
  employees	
  working	
  the	
  event	
  should	
  receive	
  
situa7onal	
  awareness	
  training	
  to	
  enable	
  them	
  to	
  
spot	
  and	
  report	
  unusual	
  and	
  or	
  inappropriate	
  
behavior.	
  
	
  
The	
  training	
  should	
  stress	
  that	
  event	
  security	
  is	
  the	
  
responsibility	
  of	
  all	
  employees,	
  not	
  just	
  law	
  
enforcement	
  and	
  security	
  officers.	
  
30	
  
Event	
  Security	
  	
  
PosiCons	
  directly	
  involved	
  in	
  	
  event	
  security:	
  
•  Law	
  enforcement,	
  fire,	
  medical	
  and	
  private	
  and/
or	
  proprietary	
  security	
  
AddiConally:	
  	
  
•  Game	
  day	
  management,	
  event	
  opera7ons	
  
manager,	
  ushers,	
  and	
  7cket	
  takers	
  
•  All	
  need	
  to	
  be	
  included	
  in	
  the	
  security	
  plan	
  
31	
  
Event	
  Security	
  	
  
	
  
Employees	
  are	
  the	
  greatest	
  vulnerability	
  in	
  
informa7on	
  security.	
  	
  
	
  
An	
  educa7on,	
  training	
  and	
  awareness	
  program	
  
must	
  to	
  be	
  developed	
  to	
  insure	
  all	
  employees	
  
understand	
  informa7on	
  security.	
  	
  
32	
  
Event	
  Security	
  	
  
Access	
  Control	
  	
  
	
  
An	
  important	
  protec7ve	
  measure	
  u7lized	
  during	
  
sports	
  and	
  special	
  events.	
  It	
  is	
  important	
  to	
  control	
  
vehicles	
  and	
  individuals	
  outside	
  the	
  venue,	
  inside	
  
the	
  venue	
  	
  and	
  in	
  restricted	
  areas.	
  	
  
	
  
33	
  
Event	
  Security	
  Perimeters	
  	
  
Inner	
  	
  
Middle	
  	
  
Outer	
  	
  
34	
  
Event	
  Security	
  	
  
Outer	
  Perimeter:	
  
•  Is	
  a	
  secure	
  perimeter,	
  such	
  as	
  a	
  buffer	
  zone,	
  
established	
  around	
  the	
  venue	
  to	
  the	
  maximum	
  
extent	
  possible.	
  	
  
•  The	
  perimeter	
  is	
  set	
  up	
  to	
  deter	
  vehicle	
  traffic.	
  
The	
  distance	
  has	
  been	
  suggested	
  to	
  be	
  at	
  least	
  
100	
  feet	
  from	
  the	
  venue	
  out,	
  but	
  will	
  vary	
  from	
  
venue	
  to	
  venue.	
  	
  
	
  
35	
  
Event	
  Security	
  	
  
Middle	
  Perimeter:	
  
	
  
•  The	
  middle	
  perimeter	
  is	
  the	
  first	
  level	
  of	
  access	
  
control	
  for	
  staff	
  and	
  spectators	
  	
  and	
  their	
  
possessions.	
  	
  
•  To	
  gain	
  access	
  through	
  this	
  perimeter	
  individuals	
  
must	
  have	
  a	
  7cket	
  or	
  a	
  creden7al.	
  	
  
	
  
36	
  
Event	
  Security	
  	
  
Inner	
  Perimeter:	
  	
  
•  The	
  Inner	
  Perimeter	
  is	
  going	
  to	
  vary	
  depending	
  
on	
  the	
  venue	
  and	
  the	
  type	
  of	
  event.	
  For	
  sports	
  
events	
  the	
  inner	
  perimeter	
  will	
  include	
  restricted	
  
spaces	
  such	
  as	
  lockers	
  rooms	
  and	
  the	
  playing	
  
field.	
  For	
  concerts	
  the	
  inner	
  perimeter	
  would	
  
include	
  back	
  stage,	
  dressing	
  rooms,	
  and	
  the	
  
stage.	
  	
  
	
  
37	
  
Event	
  
Security	
  	
  
Gate	
  
Security	
  	
  
Counter	
  
Surveillance	
  	
  
Security	
  	
  
Ticket	
  Taker	
  	
  
Police	
  
Officer	
  	
  
CCTV	
  	
  
	
  
	
  
Defense	
  in	
  depth	
  is	
  
the	
  coordinated	
  use	
  
of	
  mul7ple	
  security	
  
countermeasures	
  to	
  
protect	
  an	
  asset.	
  
38	
  
Resources	
  	
  
The	
  Department	
  of	
  Homeland	
  Security,	
  Protec7ve	
  
Security	
  Advisor	
  (PSA)	
  Program.	
  Under	
  certain	
  
circumstances	
  Protec7ve	
  Security	
  Advisors	
  can	
  
assist	
  you	
  in	
  conduc7ng	
  assessments	
  and	
  security	
  
surveys.	
  They	
  can	
  also	
  assist	
  by	
  providing	
  access	
  to	
  
infrastructure	
  security	
  and	
  resilience	
  resources,	
  
training,	
  and	
  informa7on.	
  	
  
h]p://www.dhs.gov/protec7ve-­‐security-­‐advisors	
  	
  
39	
  
Resources	
  	
  
The	
  Na7onal	
  Center	
  for	
  Spectator	
  Sports	
  Safety	
  and	
  
Security	
  (NCS4)	
  	
  
Best	
  Prac7ces	
  Guides,	
  including	
  one	
  for	
  
Intercollegiate	
  Athle7cs	
  Safety	
  and	
  Security.	
  	
  
NCS4	
  also	
  offers	
  training	
  and	
  other	
  security	
  related	
  
services	
  for	
  professional	
  sports,	
  interscholas7c	
  
athle7cs,	
  intercollegiate	
  sports	
  and	
  even	
  
marathons.	
  Informa7on	
  can	
  be	
  accessed	
  at	
  	
  	
  
h]ps://www.ncs4.com/	
  
	
   40	
  
Resources	
  	
  
The	
  Texas	
  A&M	
  University	
  System,	
  Texas	
  
Engineering	
  Extension	
  Service	
  (TEEX),	
  Na7onal	
  
Emergency	
  Response	
  and	
  Rescue	
  Training	
  Center	
  
(NERRTC)	
  offers	
  extensive	
  training	
  courses	
  on	
  
planning	
  and	
  preparedness.	
  Informa7on	
  can	
  be	
  
found	
  at	
  
	
  h]ps://teex.org	
  
	
  
41	
  
Resources	
  	
  
Three	
  training	
  courses	
  pertaining	
  to	
  sports	
  and	
  special	
  
event	
  security	
  planning	
  and	
  management	
  are:	
  	
  	
  
•  Sport	
  Event	
  Risk	
  Management,	
  	
  
•  Sports	
  and	
  Special	
  Event	
  Evacua7on	
  Training	
  and	
  Exercise,	
  
and	
  	
  
•  Sports	
  and	
  Special	
  Events	
  Incident	
  Management.	
  	
  
Provided	
  through	
  a	
  partnership	
  between	
  NCS4	
  and	
  
TEEX	
  are	
  available	
  for	
  free.	
  Informa7on	
  about	
  these	
  
courses	
  can	
  be	
  accessed	
  at	
  
h]ps://www.ncs4.com/train/overview	
  
	
  
42	
  
Contact	
  Informa7on	
  	
  
	
  
Richard	
  Morman	
  	
  
	
  
RMorman100@gmail.com	
  	
  
	
  
43	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Special Events from Planning to Execution
Special Events from Planning to ExecutionSpecial Events from Planning to Execution
Special Events from Planning to ExecutionDeborah Spector
 
Ics plain & simple
Ics plain & simpleIcs plain & simple
Ics plain & simpleHerbert Cole
 
Emergency and Critical Incident training slides oct 09
Emergency and Critical Incident training slides oct 09Emergency and Critical Incident training slides oct 09
Emergency and Critical Incident training slides oct 09i4ppis
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Chapter 11
Chapter 11Chapter 11
Chapter 11jezratty
 
Safety Week Presentation
Safety Week PresentationSafety Week Presentation
Safety Week Presentationtheflta
 
BasicSafe | Famous Safety Quotes to Strengthen Your Safety Culture
BasicSafe | Famous Safety Quotes to Strengthen Your Safety CultureBasicSafe | Famous Safety Quotes to Strengthen Your Safety Culture
BasicSafe | Famous Safety Quotes to Strengthen Your Safety CultureBasicSafe
 
Emergency operations center basic training
Emergency operations center basic trainingEmergency operations center basic training
Emergency operations center basic trainingTim Howson
 
Emergency Response Training
Emergency Response TrainingEmergency Response Training
Emergency Response Trainingedebey
 
What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) CBIZ, Inc.
 
Induction process for new employee
Induction process for new employeeInduction process for new employee
Induction process for new employeeseamjami
 
Contingency action plan in disaster managment
Contingency action plan in disaster managmentContingency action plan in disaster managment
Contingency action plan in disaster managmentSamraiz Tejani
 
EINTROEVM - Contingency planning
EINTROEVM - Contingency planningEINTROEVM - Contingency planning
EINTROEVM - Contingency planningMervyn Maico Aldana
 
Accident Prevention .ppsx
Accident Prevention .ppsxAccident Prevention .ppsx
Accident Prevention .ppsxSoumar Dutta
 
Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Numaan Tole
 
lesson7-eventvenues-170724153552.pdf
lesson7-eventvenues-170724153552.pdflesson7-eventvenues-170724153552.pdf
lesson7-eventvenues-170724153552.pdflester641719
 

Was ist angesagt? (20)

Special Events from Planning to Execution
Special Events from Planning to ExecutionSpecial Events from Planning to Execution
Special Events from Planning to Execution
 
Ics plain & simple
Ics plain & simpleIcs plain & simple
Ics plain & simple
 
Emergency response planning
Emergency response planningEmergency response planning
Emergency response planning
 
Emergency and Critical Incident training slides oct 09
Emergency and Critical Incident training slides oct 09Emergency and Critical Incident training slides oct 09
Emergency and Critical Incident training slides oct 09
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Contingency Planning.pptx
Contingency Planning.pptxContingency Planning.pptx
Contingency Planning.pptx
 
working within the private security industry
working within the private security industryworking within the private security industry
working within the private security industry
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Safety Week Presentation
Safety Week PresentationSafety Week Presentation
Safety Week Presentation
 
BasicSafe | Famous Safety Quotes to Strengthen Your Safety Culture
BasicSafe | Famous Safety Quotes to Strengthen Your Safety CultureBasicSafe | Famous Safety Quotes to Strengthen Your Safety Culture
BasicSafe | Famous Safety Quotes to Strengthen Your Safety Culture
 
Emergency operations center basic training
Emergency operations center basic trainingEmergency operations center basic training
Emergency operations center basic training
 
Emergency Response Training
Emergency Response TrainingEmergency Response Training
Emergency Response Training
 
What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP) What’s & Why’s of Business Continuity Planning (BCP)
What’s & Why’s of Business Continuity Planning (BCP)
 
Induction process for new employee
Induction process for new employeeInduction process for new employee
Induction process for new employee
 
Contingency action plan in disaster managment
Contingency action plan in disaster managmentContingency action plan in disaster managment
Contingency action plan in disaster managment
 
EINTROEVM - Contingency planning
EINTROEVM - Contingency planningEINTROEVM - Contingency planning
EINTROEVM - Contingency planning
 
Class on ICS
Class on ICSClass on ICS
Class on ICS
 
Accident Prevention .ppsx
Accident Prevention .ppsxAccident Prevention .ppsx
Accident Prevention .ppsx
 
Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)
 
lesson7-eventvenues-170724153552.pdf
lesson7-eventvenues-170724153552.pdflesson7-eventvenues-170724153552.pdf
lesson7-eventvenues-170724153552.pdf
 

Ähnlich wie Sports and Special Event Security Planning: Best Practices

ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks ManagementTariq minhas
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paperFPC Risk
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysisSKS
 
Emergency Preparedness Guide for All
Emergency Preparedness Guide for AllEmergency Preparedness Guide for All
Emergency Preparedness Guide for AllJayadeva de Silva
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Practical_Guide_for_Disaster_Avoidance
Practical_Guide_for_Disaster_AvoidancePractical_Guide_for_Disaster_Avoidance
Practical_Guide_for_Disaster_AvoidanceJoe Soroka
 
NGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxNGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxLouison Malu-Malu
 
Disaster and Risk reduction Lesson 1
Disaster and Risk reduction  Lesson 1 Disaster and Risk reduction  Lesson 1
Disaster and Risk reduction Lesson 1 Jonel Aviñante
 

Ähnlich wie Sports and Special Event Security Planning: Best Practices (20)

ORM Operational Risks Management
ORM Operational Risks ManagementORM Operational Risks Management
ORM Operational Risks Management
 
Cmice risk
Cmice riskCmice risk
Cmice risk
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paper
 
Conducting an event
Conducting an eventConducting an event
Conducting an event
 
Near Miss Reporting
Near Miss ReportingNear Miss Reporting
Near Miss Reporting
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Risk control types Slides
Risk control types SlidesRisk control types Slides
Risk control types Slides
 
Emergency Preparedness Guide for All
Emergency Preparedness Guide for AllEmergency Preparedness Guide for All
Emergency Preparedness Guide for All
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Practical_Guide_for_Disaster_Avoidance
Practical_Guide_for_Disaster_AvoidancePractical_Guide_for_Disaster_Avoidance
Practical_Guide_for_Disaster_Avoidance
 
disaster drill
disaster drilldisaster drill
disaster drill
 
NGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxNGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptx
 
Disaster and Risk reduction Lesson 1
Disaster and Risk reduction  Lesson 1 Disaster and Risk reduction  Lesson 1
Disaster and Risk reduction Lesson 1
 
disaster management
disaster managementdisaster management
disaster management
 

Mehr von National Center for Campus Public Safety

Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...National Center for Campus Public Safety
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationNational Center for Campus Public Safety
 

Mehr von National Center for Campus Public Safety (20)

Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Get to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International StudentsGet to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International Students
 
Campus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&ACampus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&A
 
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
 
Reunification Planning: The Next Step
Reunification Planning: The Next StepReunification Planning: The Next Step
Reunification Planning: The Next Step
 
Unmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on CampusUnmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on Campus
 
The Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School AttacksThe Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School Attacks
 
Next Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment TeamsNext Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment Teams
 
Hazing Prevention: A Call to Action
Hazing Prevention: A Call to ActionHazing Prevention: A Call to Action
Hazing Prevention: A Call to Action
 
Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Legalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College CampusesLegalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College Campuses
 
Bystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of InterventionBystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of Intervention
 
Violence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged SituationsViolence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged Situations
 
Top 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IXTop 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IX
 
Ten Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental HealthTen Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental Health
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 

Kürzlich hochgeladen

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Kürzlich hochgeladen (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Sports and Special Event Security Planning: Best Practices

  • 1.
  • 2. Sports  and  Special  Event   Security  Planning:  Best   Prac7ces   Richard  Morman,  CPP,  CSSP   Deputy  Chief  of  Police  (re7red)   August  18,  2015     2  
  • 3. GOAL       Examine  current  best  prac7ces  for  safely  and   effec7vely  managing  large  on-­‐campus  events.     3  
  • 4. Objec7ves     •  Planning     •  Threats  and  Hazards   •  Risk    Management   •  Event  Security   •  Resources         4  
  • 5. Post  9-­‐11     The  terrorism  incidents  on  9-­‐11-­‐2001  changed  the   way  we  all  looked  at  security  planning  and   management  forever.   5  
  • 6. Special  Event     A  special  event  can  be  defined  as  any  event  where   a  large  number  of  people  are  brought  together  to   watch  or  par7cipate.     6  
  • 7. Special  Event     FEMA  course  IS-­‐15  Special  Events  Con4ngency   Planning  defines  a  special  event  as:     “a  non-­‐rou7ne  ac7vity  within  a  community  that   brings  together  a  large  number  of  people.  Emphasis   is  not  placed  on  the  total  number  of  people   a]ending  but  rather  the  impact  on  the   community's  ability  to  respond  to  a  large-­‐scale   emergency  or  disaster,  or  the  excep7onal  demands   that  the  ac7vity  places  on  response  services.”   7  
  • 8. Event  vs.  Incident       Event:  A  scheduled  and  planned  ac7vity       Incident:    Something  unplanned  that  is  either   natural,  technological,  or  human-­‐caused    and     warrants  ac7on  to  protect  life,  property,   environment,  and  public  health  or  safety,  and  to   minimize  disrup7ons  of  ac7vi7es.     8  
  • 9. Planning       “If  you  fail  to  plan,  you  are              planning  to  fail!”     ―  Benjamin  Franklin       9  
  • 10. Planning         Pre-­‐event  planning  is  intended  to  assist  you  in   developing  a  Game  Day  or  Event  Opera7ons  Plan.   This  plan  can  be  compared  to  an  Incident  Ac7on   Plan  (IAP).     10  
  • 11. Planning         Regardless  of  the  type  of  event  iden7fy  the  stake   holders:    Anyone  that  has  a  func7onal  stake  in  the  event     Considera7on  should  be  given  to  surrounding   communi7es  that  may  be  impacted  by  the  event.         11  
  • 12. Planning         At  the  start  of  the  process  the  lead  agency  needs  to   be  iden7fied     This  helps  avoid  confusion  and  consterna7on         12  
  • 13. Planning         Na7onal  Incident  Management  System  /  Incident   Command  System  can  be  u7lized  to  assist  in  the   planning  process.     13  
  • 14. Planning       Unified  Command:  For  events  that  require  use  of   mul7ple  agencies     Command  Post:  Loca7on  should  be  iden7fied.   Should  not  be  located  in  the  venue.   Emergency  Opera7ons  Center  (EOC)  should  be   u7lized.  The  EOC  should  not  be  located  in  the   venue.     14  
  • 15. Planning       •  Plan  the  plan   •  Staff  the  plan     •  Train  the  plan     •  Prac7ce  the  plan     •  Review  and  adjust  the  plan     15  
  • 16. Threats  and  Hazards       FEMA  defines  All-­‐Hazards  as,  “Natural,   technological,  or  human-­‐caused  incidents  that   warrant  ac7on  to  protect  life,  property,   environment,  and  public  health  or  safety,  and  to   minimize  disrup7ons  of  ac7vi7es.”     16  
  • 17. Threats  and  Hazards       The  All-­‐Hazards  approach  should  look  at  your   community’s  vulnerability  to  specific  hazards.       This  allows  planning  resources  to  be  dedicated  to   those  risks  that  are  most  likely  to  affect  your   community.   17  
  • 18. THIRA     Threat  and  Hazard   Iden4fica4on  and  Risk   Assessment  Guide,     Comprehensive   Preparedness  Guide  (CPG)   201  Second  edi7on  August   2013.     This  guide  commonly   referred  to  as  THIRA  will   provide  you  with  a  process   that  will  help  you  iden7fy   and  understand  risk.  The   guide  outlines  a  four  step   process  to  help    you  develop   a  threat  and  hazard   assessment.   18  
  • 20. Risk    Management           Risk=Threat  X  Vulnerability  X  Consequence                                                          R=T  x  V  x  C   20  
  • 21. Risk    Management       Risk  is  the  poten7al  for  an  unwanted  outcome   resul7ng  from  an  incident,  event,  or  occurrence,  as   determined  by  its  likelihood  and  the  associated   consequences   21  
  • 22. Risk    Management       A  threat  is  a  natural,  human,  technological  caused   occurrence,  individual,  en7ty,  or  ac7on  that  has  or   indicates  the  poten7al  to  harm  life,  informa7on,   opera7ons,  the  environment  and/or  property.     22  
  • 23. Risk    Management       Vulnerability  is  defined  as  a  physical  feature  or   opera7onal  a]ribute  that  renders  an  en7ty  open  to   exploita7on  or  suscep7ble  to  a  given  hazard.     23  
  • 24. Risk    Management       Consequence  is  the  effect  of  an  event,  incident,  or   occurrence   24  
  • 25. Risk    Management     Threat     Vulnerability   25  
  • 26. Risk  Management     The  Department  of  Homeland  Security  (DHS)   defines  four  risk  management  strategies:     1.  Risk  avoidance   2.  Risk  control   3.  Risk  transfer   4.  Risk  acceptance     26  
  • 27. Event  Security         Take  a  holis7c  approach,  keeping  the  components   of  personnel  security,  informaCon  security,  and   physical  security  in  mind.       27  
  • 28. Event  Security     Things  to  think  about:     •  What  are  you  protec7ng?   •  Why  are  you  protec7ng  it?     •  How  will  you    protect  it?     •  What  is  the  likelihood  that  something  will   happen?   •  What  is  the  plan  if  something  does  happen?     28  
  • 29. Event  Security     Temporary  workforce   All  personnel:     •  Screened  and  pre-­‐employment  background  checks   completed   •  Training  needs  assessment  /Training  plan   •  Job  descrip7ons  for  each  posi7on              (should  include  post  orders)     29  
  • 30. Event  Security     All  employees  working  the  event  should  receive   situa7onal  awareness  training  to  enable  them  to   spot  and  report  unusual  and  or  inappropriate   behavior.     The  training  should  stress  that  event  security  is  the   responsibility  of  all  employees,  not  just  law   enforcement  and  security  officers.   30  
  • 31. Event  Security     PosiCons  directly  involved  in    event  security:   •  Law  enforcement,  fire,  medical  and  private  and/ or  proprietary  security   AddiConally:     •  Game  day  management,  event  opera7ons   manager,  ushers,  and  7cket  takers   •  All  need  to  be  included  in  the  security  plan   31  
  • 32. Event  Security       Employees  are  the  greatest  vulnerability  in   informa7on  security.       An  educa7on,  training  and  awareness  program   must  to  be  developed  to  insure  all  employees   understand  informa7on  security.     32  
  • 33. Event  Security     Access  Control       An  important  protec7ve  measure  u7lized  during   sports  and  special  events.  It  is  important  to  control   vehicles  and  individuals  outside  the  venue,  inside   the  venue    and  in  restricted  areas.       33  
  • 34. Event  Security  Perimeters     Inner     Middle     Outer     34  
  • 35. Event  Security     Outer  Perimeter:   •  Is  a  secure  perimeter,  such  as  a  buffer  zone,   established  around  the  venue  to  the  maximum   extent  possible.     •  The  perimeter  is  set  up  to  deter  vehicle  traffic.   The  distance  has  been  suggested  to  be  at  least   100  feet  from  the  venue  out,  but  will  vary  from   venue  to  venue.       35  
  • 36. Event  Security     Middle  Perimeter:     •  The  middle  perimeter  is  the  first  level  of  access   control  for  staff  and  spectators    and  their   possessions.     •  To  gain  access  through  this  perimeter  individuals   must  have  a  7cket  or  a  creden7al.       36  
  • 37. Event  Security     Inner  Perimeter:     •  The  Inner  Perimeter  is  going  to  vary  depending   on  the  venue  and  the  type  of  event.  For  sports   events  the  inner  perimeter  will  include  restricted   spaces  such  as  lockers  rooms  and  the  playing   field.  For  concerts  the  inner  perimeter  would   include  back  stage,  dressing  rooms,  and  the   stage.       37  
  • 38. Event   Security     Gate   Security     Counter   Surveillance     Security     Ticket  Taker     Police   Officer     CCTV         Defense  in  depth  is   the  coordinated  use   of  mul7ple  security   countermeasures  to   protect  an  asset.   38  
  • 39. Resources     The  Department  of  Homeland  Security,  Protec7ve   Security  Advisor  (PSA)  Program.  Under  certain   circumstances  Protec7ve  Security  Advisors  can   assist  you  in  conduc7ng  assessments  and  security   surveys.  They  can  also  assist  by  providing  access  to   infrastructure  security  and  resilience  resources,   training,  and  informa7on.     h]p://www.dhs.gov/protec7ve-­‐security-­‐advisors     39  
  • 40. Resources     The  Na7onal  Center  for  Spectator  Sports  Safety  and   Security  (NCS4)     Best  Prac7ces  Guides,  including  one  for   Intercollegiate  Athle7cs  Safety  and  Security.     NCS4  also  offers  training  and  other  security  related   services  for  professional  sports,  interscholas7c   athle7cs,  intercollegiate  sports  and  even   marathons.  Informa7on  can  be  accessed  at       h]ps://www.ncs4.com/     40  
  • 41. Resources     The  Texas  A&M  University  System,  Texas   Engineering  Extension  Service  (TEEX),  Na7onal   Emergency  Response  and  Rescue  Training  Center   (NERRTC)  offers  extensive  training  courses  on   planning  and  preparedness.  Informa7on  can  be   found  at    h]ps://teex.org     41  
  • 42. Resources     Three  training  courses  pertaining  to  sports  and  special   event  security  planning  and  management  are:       •  Sport  Event  Risk  Management,     •  Sports  and  Special  Event  Evacua7on  Training  and  Exercise,   and     •  Sports  and  Special  Events  Incident  Management.     Provided  through  a  partnership  between  NCS4  and   TEEX  are  available  for  free.  Informa7on  about  these   courses  can  be  accessed  at   h]ps://www.ncs4.com/train/overview     42  
  • 43. Contact  Informa7on       Richard  Morman       RMorman100@gmail.com       43