Assess your meeting and event vulnerability.
The meeting or event design must begin with a vulnerability assessment to determine the potential risk for that event, followed by a sourcing process for a safe location, hotel, venues and activities with the purposeful engagement of vetted suppliers, hired security, input from local law enforcement, and access to medical support. This preparation must be systematic, procedural, and documented, and involve a communication strategy that includes social media channels.
On a scale of 1-5 (1=lowest risk, 5= highest risk), rate how vulnerable you think your event is based on each category.