Risk Identification and Preparedness for Special Events

Event Risk Identification

Public Outdoor and Indoor Event Risk Management Planning

A special event require extensive planning, and occurs outside the day-to-day normal operations of the event planner. In today’s world, special precautions need to be taken to prepare for the event of an explosive threat or event. Examples of events that need explosive risk identification and preparedness are: concerts, sporting events (either at a stadium on in a public area), political events, conferences, camps, fundraisers, graduations,

ARM Risk Mitigation will work with you to identify potential risks, create an action plan, and work with you to reduce or mitigate identified risks. We train and educate your event staff so that all people involved in the event are prepared in the case of an emergency.

A explosive threat can mean many things, including a suspicious person, package, or vehicle. There may be the intent of:

  • Causing harm to another person
  • Causing damage to equipment, infrastructure or event sites
  • Harming the future of the event

Our Process

ARM Risk Mitigation provides on-site consultations for more detailed information and insights into risk vulnerability. We assess staff skills and preparedness, and work with you to understand the makeup of your event attendees.

METT-T Based Risk Analysis

All operations, military / security / otherwise follows METT-T in some form or fashion whether we realize it or not.

Our risk assessment process brings to light the fact that these principles are there and can be exploited in our best interests. Knowing one’s enemy as well as yourself aids in the mitigation process.

We start with the probability of attack. Using open source intelligence gathering to figure out if there are any direct or indirect threat to our clients. We identify who those threats are, if any. Through research we identify our enemy’s METT-T (see below).

Impact. Through experience, training and lots of trial and error, we know that target drives device type and attack functionality. This allows us to make a sound determination on the impact to our clients if an explosive event occurs.

Comparing the Probability to our clients Impact gives us an overall starting risk factor.

At this point in the process we develop risk mitigation steps to lower the overall risk value to our clients. Knowing that Target drives device type, we can laser focus on the mitigation strategies that will best mitigate the threat; incurring the least amount of cost and effort to our clients.

The below applies to both our enemy as well as our clients. We must identify both sides of the house in order to find realistic mitigation strategies for our clients.

  • Mission: A simple question. What is our client’s mission? What is the enemy’s mission?
  • Enemy: Who is the enemy? What is their ideology? What is their history? What are their objectives?
  • Training: What level of training do they have? What are their Tactics, Techniques and Procedures?
  • Timings: What time frame does the operation have? Is the schedule fluid? Can it be changed? Historical times and dates in play?
  • Terrain: Where are we going? Open or closed spaces (drives device size and type)? Can the high ground be dominated? Identify Arrival and Exit areas.