Liferaft Blog | Resources for Corporate Security

Securing High Profile Events Amongst Evolving Threat Perspectives

Written by Liferaft | January 17, 2025

As security professionals, when we think of events like the World Economic Forum (WEF) in Davos, our minds immediately turn to the complex security challenges that come with protecting high-profile gatherings. While the WEF itself is not our focus, it serves as an excellent case study for the types of risks and threats that security professionals must prepare for when tasked with protecting any major event with influential attendees.

The Evolving Threat Perspectives


High-profile events face multifaceted threat perspectives that are constantly evolving, and the impact has not gone unnoticed. According to a study by Unisys Security Index, more than one in five Americans (21%) say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data.

It's one thing when trained analysts are concerned about the layers of risk, but entirely different when that concept trickles into the mainstream and influences public behavior and event attendance. It indicates the risk and evolving risk perspectives have never been more dire.

Some  of the key areas of concern around evolving high-profile event protection include:


State-Based Armed Conflict

The rise of geopolitical tensions has elevated the risk of targeted attacks or disruptions at international gatherings.

According to the 2025 Global Risks Report, state-based armed conflict was singled out as the most important of 33 risks for 2025 in the annual survey of more than 900 government, business and civil society leaders. This underscores the growing concern about the potential for violence and instability at high-profile events.


Misinformation and Disinformation

The spread of false information can pose significant security risks, potentially inciting unrest or hampering event operations. More commonly seen, disinformation can exacerbate existing social and political divisions among the public, leading to increased tensions, and potential confrontations. This public tone can add another layer of complexity when considering risks and threat awareness surrounding your event.


Cyber Threats

With the increasing reliance on technology for event management, cyber threats have become a critical concern.  Something as simple as vendor vulnerabilities could have a significant impact. These large-scale events rely on numerous vendors, and these partners may not have the same level of data protection measures in place. This can create weak points in the security infrastructure. The same could be said of social engineering attacks born out of a staff member sharing information via email or social media that unknowingly disclose vital information that hacktivists can utilize to gain access to systems and services that harm event operations or worse.

Extreme Weather Events

Climate change has made weather-related disruptions more frequent and severe, necessitating robust contingency planning for events and the need for GIS technology and weather data in command centers for awareness.

 


Key Security Considerations

A few years ago, a physical security team, partnered with threat analysts, was tasked with the handling of a high-profile speaking event in Washington, D.C.. Through meticulous pre-event planning, intelligence gathering, and rigorous screening procedures, the security team was prepared when a group of 10 protesters attempted to disrupt the proceedings. Their swift response included closing access to registration, preventing unauthorized entry, and effectively de-escalating the situation, allowing the event to continue without interruption.

β€œAn incident is just the tip of the iceberg, a sign of a much larger problem below the surface.” – Don Brown

If it were not for the threat monitoring and investigative work done by the analysts leading up to the event, the outcome could have been catastrophic and, at the very least, disruptive, with both financial and human implications. The above case study makes it clear that when 
preparing for high-stakes events, security professionals should focus on:

Comprehensive Risk Assessment: Conduct a thorough analysis of potential threats specific to the event, including geopolitical factors, attendee profiles, and local conditions.

Advanced Surveillance and Monitoring: Implement cutting-edge technology for real-time threat detection and response.

Access Control and Credentialing: Utilize sophisticated systems for identity verification and access management to prevent unauthorized entry.

Cybersecurity Measures: Protect against data breaches, cyber espionage, and potential disruptions to critical event infrastructure.

Emergency Preparedness: Develop detailed response protocols for various scenarios, including medical emergencies and evacuation procedures.

Crowd Management: Employ strategies to control large gatherings and mitigate risks associated with public spaces.

 

Securing High-Profile Events in Summary


While events like the World Economic Forum present unique security challenges, the principles and strategies employed to protect them can be applied to a wide range of high-profile gatherings.

As the perspectives of event security continue to evolve, presenting increasingly complex challenges for security professionals in areas such as state-based conflicts and cyber threats to extreme weather events and disinformation campaigns, the multifaceted nature of these risks demands an integrated approach to security management. As demonstrated by real-world cases like the Washington D.C. speaking event, success lies in thorough preparation, early detection, and swift response capabilities.

Key Principles to Remember:

  1. Implement comprehensive risk assessments that consider both physical and digital threats
  2. Utilize advanced surveillance and real-time monitoring systems
  3. Establish robust access control and credentialing procedures
  4. Deploy multi-layered cybersecurity measures
  5. Maintain detailed emergency response protocols
  6. Develop effective crowd management strategies
  7. Foster coordination between security teams and stakeholders
  8. Integrate weather monitoring and GIS technology
  9. Conduct thorough vendor security assessments
  10. Prioritize early threat detection and intelligence gathering

The success of high-profile event security relies not just on addressing individual threats but on creating an integrated security framework that anticipates and responds to evolving risks while maintaining operational efficiency. As security professionals, our ability to adapt and respond to these challenges will continue to define the future of event protection.