Back to blog index

Cyber Security & the Events Industry (Part III)

cyber security interview

Keeping your events safe with cyber security

The risk of a cyber-attack is an eminent concern that troubles all event planners while delivering events. Understanding the risk is the first important step towards deploying the right protection measures on your event and attendees’ data. Due to the automation of an increasing number of planning and management processes, we are witnessing that a growing volume of event data is being shared and moving to ‘the cloud’ making cyber security a primary focus.

The level of response should be adapted both to the actual and future risks. Consequently, the role of event planners expands further to evaluating how exposed their clients and partners are, as well as aligning the right solution against possible risks.

Often, avoiding a cyber crisis comes down to properly controlling a potential cyber incident before, during, and after it unfolds. Based on the level of risk, there is a 3-step response to keep you alert of cyber security issues.

Teaching the basic principles of computer security is the first step. Your guests and attendees should be made aware of the risks revolving around their data and event planners ought to make sure they suggest simple, straightforward actions to preserve data integrity. Of course, the ground rules about passwords are important to bear in mind, but there are also other areas to consider, especially related to travel risks, such as logging into a network in foreign countries, etc.

The second step concerns the protection of the data itself. It is necessary to create a computer shield that will withstand potential attacks and ensure that the computers and other connected devices are protected by technical solutions, such as antivirus software, encrypted data, and secure connections.

Last but not least, the third step is to ensure that the environment where the devices are located is safe. From the non-disclosure of premises used in advance, to locating and blocking spying equipment, micro-spy, mini-cameras, or other listening systems and information capture, the solutions vary depending on the level of risk. All these measures ensure that the information communicated within the event space won’t be captured and that devices such as mobile phones, tablets or computers cannot be scanned remotely.

For over 25 years, MCI has been crafting tailored solutions and services to help companies in this high-growth, high-risk industry, tackle its fast changing priorities. Get in touch with us here.

Co-authored by Laurence Julliard, ICT Business Director, MCI Group, and Emmanuel Andre, Heath, Safety and Security expert, MCI Group.

File Download


Suggest a blog Topic


To suggest a topic, please complete this short form.

MCI Group collects your personal data to process your request and respond to you. For more information: Privacy Statement

Get the MCI Live Monthly

Get the MCI Live Monthly

To sign up for our monthly newsletter, please complete this short form.

MCI Group collects your personal data to process your request and respond to you. For more information: Privacy Statement

Send a message


To email the author, please complete this short form.