Appropriate event security measures can help to ensure the safety and well-being of attendees, staff, and other participants.

Security requirements differ depending on the scale and type of event. It can be helpful to undertake a risk assessment to ascertain what is required to maintain a safe environment, whilst remaining aware of your attendees’ rights and privacy.

Security personnel are often the first point of contact attendees have at your event, therefore it is important to carefully select your security provider. Knowing your audience is also important in this regard, to ensure that appropriate personnel numbers, levels and types of surveillance, and defined protocols of physicality are put in place.


Preliminary Risk Assessment

Conduct a thorough risk assessment to identify potential security threats and vulnerabilities:

  • Consider factors such as event location, size of the event, activities involved, estimated attendance numbers and the type of attendees you are expecting.
  • Create an accurate site map and use it as a key reference document in your security risk assessment. Clearly mark all entry and exit points defining what they will be used for, and determine the required level of security oversight for each.
  • Divide your event site into zones with defined usage and access parameters. Consider the measures necessary to enforce the boundaries of these zones.
  • Ensure maximum capacities, crowd density, transit corridors, fire regulations and emergency evacuation procedures are considered.
  • Determine whether your event requires a surveillance camera system for live monitoring or recording.

Security Protocols

Establish a set of security protocols that align with the findings of your preliminary risk assessment:

  • Who is allowed to go where? Event accreditation such as wristbands or lanyards are great tools to group and identify participants with different levels of access – just ensure they are difficult to forge or replicate!
  • How many attendees are allowed in each zone of your site at once and how will you control this? Effective crowd management is important to ensure the safety of your attendees.
  • If alcohol is present at your event, ensure policies around intoxication and host responsibility are clearly communicated to all staff.
  • Clearly define the parameters of the use of physical force in dealing with unruly or violent attendees or agitators. Ensure event security staff know what kind of incidents require police notification or involvement.
  • Establish a ‘Flow of Care’ document to guide the process of managing any incidents requiring medical attention.
  • Hold a pre-event security briefing to ensure all parties understand the security measures and protocols in place.

Security Personnel

  • Determine the number of security personnel to hire based on the size and type of event, ensuring a proper ratio of security personnel to attendees.
  • Ensure your security personnel have a clear chain of command, with appropriate levels of experience and capability throughout the chain.
  • Police vetting of staff should be standard practise – for your security provider or if you are hiring individual security personnel yourself, to ensure they are suitable for the role.
  • Security personnel should be trained and proficient in crowd management, conflict resolution, emergency response and first aid.
  • Easily identifiable uniforms or attire are important as visibility is a key factor in effective crowd control and prevention of adverse incidents.


  • Radio is an efficient communication method in an event setting. In-ear monitors with attached lapel microphones are handy additions to regular radio handpieces.
  • Assign specific radio channels to appropriate groupings of staff, security, and emergency services to allow clear communications without unnecessary interruption.
  • Radio communications are easy to intercept, therefore any sensitive information should be relayed through a secure method.
  • Clearly defined roles and lines of communication help to streamline communications between event and venue staff, security, first aid responders and emergency services.
  • Test and monitor all relevant channels pre-event to ensure they operate without interference.


Surveillance camera systems are useful for both live monitoring of your event and recording any incidents that may require review.

  • Determine strategic locations for surveillance cameras throughout the event area considering both indoor and outdoor spaces. These could include entrances, exits, main thoroughfares, high-traffic areas, and points of interest.
  • Determine camera types based on the event's needs such as fixed cameras for consistent monitoring, pan-tilt-zoom (PTZ) cameras for flexible coverage, and specialised cameras for low-light or outdoor environments.
  • Trained personnel should monitor the camera feeds in real-time from a central control room or designated monitoring area to allow for immediate response to any suspicious or concerning activities.
  • Cameras should record footage for review and analysis. Implement a storage solution that can handle the event's duration and resolution requirements such as cloud storage or local servers.
  • Ensure surveillance cameras respect attendees' privacy rights. Clearly communicate the presence of cameras to attendees and avoid placing cameras in private areas such as restrooms or changing rooms.
  • Protect the surveillance system from cyber threats by implementing strong access controls, regular software updates, and encryption of camera feeds and stored data.

Emergency Response

  • Ensure your security staff have a clear line of communication with Police, Fire Service and Ambulance teams.
  • Clearly communicate your emergency response plan to all security staff to ensure they can guide event participants if it is enacted. Refer to our [Emergency Management] page for more details.

Event Security Plan

Develop an Event Security Plan which outlines the details and parameters of the overall security strategy in a clear and concise manner.

  • Ensure this document is distributed to security staff, venue staff, and key event staff so all parties are aware of the protocols in place.
  • Use this document as the basis for your pre-event briefing and post-event evaluation and be prepared to add to or change it as necessary to align with any developments.

Post-Event Evaluation

  • After the event, gather feedback from security personnel to assess the effectiveness of security measures and identify areas of improvement for future events.
  • Create and distribute a report from these findings to help with developing future security plans and ensure that any issues are understood and addressed by the relevant parties.

Cyber Security

  • If your event involves online ticketing or registration systems, ensure cyber security measures are in place to protect attendees' personal information.
  • Limit the collection of personal data to what is essential for event registration and management.
  • Communicate your event's privacy policy to attendees, detailing how their data will be used, stored, and protected.
  • Establish a clear policy for retaining attendee data and delete it once it's no longer needed.
  • Use reputable and secure payment gateways to process transactions securely.
  • Use encrypted communication channels for sensitive event-related discussions and information sharing.
  • Assess the cyber security practices of third-party vendors and partners who provide event-related services or software.
  • Train event staff and volunteers in cyber security best practices, including avoiding suspicious links, using strong passwords, and reporting potential security threats.
Useful Links:
Have you considered?
  • What level of security presence does your event require?
  • What are the key vulnerabilities of your event regarding security?
  • Are there any cyber security considerations regarding attendee data for your event?