Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php on line 209

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php on line 209

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/lib/MeprUtils.php on line 862

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/lib/MeprUtils.php on line 862

Warning: Cannot modify header information - headers already sent by (output started at /home/newhoslaw/pre.hospitalitylawyer.com/wp-content/plugins/memberpress/app/controllers/MeprApiCtrl.php:209) in /home/newhoslaw/pre.hospitalitylawyer.com/wp-includes/feed-rss2.php on line 8
Chris Hagon – HospitalityLawyer.com https://pre.hospitalitylawyer.com Worldwide Legal, Safety & Security Solutions Fri, 24 May 2019 18:25:22 +0000 en hourly 1 https://wordpress.org/?v=5.6.5 https://pre.hospitalitylawyer.com/wp-content/uploads/2019/01/Updated-Circle-small-e1404363291838.png Chris Hagon – HospitalityLawyer.com https://pre.hospitalitylawyer.com 32 32 Corporate Aviation Security: A Four-Pronged Approach to Improving Aviation Security https://pre.hospitalitylawyer.com/corporate-aviation-security-a-four-pronged-approach-to-improving-aviation-security/?utm_source=rss&utm_medium=rss&utm_campaign=corporate-aviation-security-a-four-pronged-approach-to-improving-aviation-security https://pre.hospitalitylawyer.com/corporate-aviation-security-a-four-pronged-approach-to-improving-aviation-security/#respond Tue, 29 Apr 2014 10:00:52 +0000 http://pre.hospitalitylawyer.com/?p=11358 In major countries like the United States or European Union, executives may move via corporate jet, and not just through major airports like New York’s Kennedy, Frankfurt Airport, or London’s Heathrow but also through minor airports. Here, the issue is that minor airports may lack the security infrastructure of their larger counterparts. This problem is compounded in smaller, developing countries.

Airport security can become a weak link in executive security. According to Chris Hagon, our CEO, “Although most large airports are reasonably secure, many smaller airports serving primarily corporate clients have less resources to devote to airport security.

Detect, deny, deter and defend are the four prongs of an effective security approach. Let’s drill down into each element.

A Four-Pronged Approach to Executive Protection and Corporate Aviation Security

The following is a simple and effective approach to increase the security of individuals on the ground at airports as well as in the skies.

  1. DETECT | As most international security services understand, the first step to defending against a threat is to identify it. Once a threat is detected, it can be studied and analyzed to uncover its capabilities and intentions. If the threat becomes severe enough, law enforcement can be called in to deal with the issue.
  2. DENY | One of the first steps to sound executive protection and corporate aviation security is to deny potential threats information they could used to carry out a harmful act. In regards to air travel, there are steps organizations can take to ensure that their travel plans and flight routes are not publicly available.
  3. DETER | Another vital step to increasing security at airports is to deter an attack in the first place. After all, many security professionals believe that unsophisticated attackers can be deterred by the simple presence of sturdy equipment, sound procedures, and competent personnel.
  4. DEFEND | Defensive procedures are the final component of IMG’s corporate aviation security and executive protection      strategy. Although efforts to detect, deny, and deter will neutralize most threats, organizations still need to be prepared to defend their personnel. This last component involves a thorough understanding of the fundamentals of physical security.

Taking Action on Aviation Security

If your organization is a heavy user of aviation for corporate travel, whether in the US, Europe or abroad, creating a security plan is a worthwhile investment. A four-pronged approach can help conceptualize the levels of preparedness, but only an expert analysis can give you the in-depth plan that will work on a daily basis.

]]>
https://pre.hospitalitylawyer.com/corporate-aviation-security-a-four-pronged-approach-to-improving-aviation-security/feed/ 0
Securing Your Next Big Meeting or Conference: 5 Tips on Event & Site Security https://pre.hospitalitylawyer.com/securing-your-next-big-meeting-or-conference-5-tips-on-event-site-security/?utm_source=rss&utm_medium=rss&utm_campaign=securing-your-next-big-meeting-or-conference-5-tips-on-event-site-security https://pre.hospitalitylawyer.com/securing-your-next-big-meeting-or-conference-5-tips-on-event-site-security/#respond Tue, 23 Jul 2013 19:25:38 +0000 http://pre.hospitalitylawyer.com/?p=8936 1428Executive Summary: Event Security and Site Protection

Conferences, meetings, and tradeshows can be a great way for organizations to showcase themselves to the public, discuss important issues, and boost employee morale. However, high profile events can present operational and reputational risks if they are not conducted effectively. Security issues, in particular, can hamper operations and raise challenges to event organizers. If not handled deftly, these issues could lead to incidents that prove both embarrassing and costly to the hosting company.

To ensure the seamless integration of security into an event’s operations, the security professionals at IMG believe that security personnel should be involved in event planning from Day 1. By including security personnel during the preliminary stages, event planners will ensure that security is incorporated into planning at every stage of the process. This will help avoid unforeseen complications and last minute alterations.

Event security planning can be an involved and complicated process, and some outsiders may underestimate the challenges involved. Additionally, some may question why security personnel need to be included in so many aspects of event planning from venue selection, to guest lists, to hotel booking. To provide more clarification on security’s role in event planning, IMG (http://www.theimg.com/) has released 5 tips on event security and site protection. This information should provide non-security personnel with an overview of event security planning.

5 Tips on Meeting Security and Site Protection from a Leading Executive Protection Firm

Event Security Tip #1: Venue Selection

One of the most important tenets of meeting and conference security is the involvement of security personnel from the start of the event planning process. This is especially true when it comes time for an organization to select a venue. Prior to site selection, security personnel need to conduct a threat assessment of the proposed site to identify potential threats, challenges, and risks. Involvement at the early stages also gives security personnel an opportunity to familiarize themselves with the site and identify any resources, such as floor space or rooms, that will need to be reserved for security purposes.

Event Security Tip #2: Proprietary Information Planning

Another core tenet of conference and meeting security is the identification of sensitive or proprietary information that will be disclosed during the course of the event. For example, some conferences are used to unveil new technology or discuss corporate strategy while some company meetings may involve sensitive issues such as layoffs and acquisitions. In each of these cases, organizations need to think hard about how they want this information disseminated and whom they want to disseminate this information to. Once this determination is made, security personnel can construct plans to protect this data. Additionally, they will be able to provide guidance on the transportation and storage of sensitive materials and designate secure meeting areas for sensitive discussions.

Event Security Tip #3: Access Controls

Another fundamental component of site protection is the development of access controls. At the site itself, security will control physical access by designating points of entry/exit and manning these points appropriately. However, security should also be involved in the formulation of the guest list and the selection of invitations and ID badges. This will allow security personnel to prevent unauthorized access and help identify any event “crashers.” It is also important to note that guests may have different levels of access based on their relationship to the hosting organization. For example, the Media may be given one level of access, company employees given another, while company executives may be given more wide-ranging access. Security will help ensure that guests are given the appropriate level of access and may compartmentalize the area according to access level.

Event Security Tip #4: Transportation, Logistics, and Emergency Planning

It is important to note that comprehensive conference security is not limited to the event site itself. Security personnel should be involved in coordinating transportation to and from the venue. They also may choose to conduct threat assessments on the hotels being used by attendees. Additionally, security may determine if VIPs require special vehicle access or foot escort. This is because VIPs are often at there most vulnerable when traveling to and from a well-publicized event. Finally, the security staff will develop contingency and emergency plans. This often involves identifying the police, fire, rescue, and medical resources in the area so that they may be quickly called upon in the event of an emergency.

Event Security Tip #5: After-Action Reviews

One of the most important, but often overlooked, components of conference security and site protection is the after action review. These reviews are held after the completion of a conference, meeting, or event and should be attended by all of the event organizers. One of the major benefits of these reviews is that they can be used to discuss challenges and target areas for future improvement. Furthermore, these reviews can also be used to assess the impact of possible security breaches. For example, during an after action review event organizers may report incidents such as suspicious behavior, the loss of sensitive material, or access to an unauthorized area. During the review, these issues can be fleshed out in detail as a group and follow on plans developed.

Originally published on Wednesday, 23 July 2014
1342 views at time of republishing

]]>
https://pre.hospitalitylawyer.com/securing-your-next-big-meeting-or-conference-5-tips-on-event-site-security/feed/ 0