Get Smart about Cybersecurity
Best practices to safeguard against bad actors.

Best practices to safeguard against bad actors.
By Amanda N. Wegner
With digital threats looming larger than ever, cybersecurity is becoming a fundamental requirement for meeting planners to protect their events, attendees and clients.
“Meeting and event cybersecurity is critical in order to protect sensitive information, ensure the continuity and credibility of events and maintain organizational trust,” says Steve Totzke, vice president of Information Technology for the Wisconsin Center District. “Whether it’s a corporate board meeting or a global conference, these events often involve the exchange of confidential data and intellectual property that, if compromised, could lead to financial loss, legal liability or reputational damage. As events become more digital and interconnected, cybersecurity is a key component of a successful event.”
“Event cybersecurity is no longer negotiable,” adds Andrew Hoyos, owner of Hoyos Consulting and Hoyos Events, which has been providing networking support for events for about 20 years. Cybersecurity is complex and changing rapidly. To help meeting and event planners navigate this moving target, here are some ways to fortify events against cyber threats.
Cybersecurity begins with defining IT and networking needs. The next step is to check with venues to determine how these needs fit the venue’s resources or whether outside help is required.
To develop those requirements, consider the event’s needs, such as on-site registration, sales, audiovisual, live streaming and more. Is there an app for attendees to use? An educational component? Outline all the ways speakers, exhibitors, attendees, front-of-house staff and back-of-house staff might interact with the Internet, apps and connected devices, as well as what interconnections are needed.
Totzke adds cybersecurity is primarily the event planner’s responsibility at most venues.
“Depending on the type of IT service purchased by a planner, we provide some basic inbound connection blocking and filtering. However, our IT terms and conditions specifically state that we do not provide security of any kind on IT services, and it is up to the event to ensure proper cybersecurity measures are in place,” he says. “This is common practice for most event venues.”
Gone are the days of just throwing up open Wi-Fi for everyone to use. Hoyos recommends a purpose-built network designed and optimized to support the unique requirements of a particular situation or application.
In an events setting, Hoyos explains a purpose-built network is designed to address different event networking needs and the specifics of each required need or use. For instance, a purpose-built network would have segregated Wi-Fi just for point of sale or registration, where PCI compliance is critical to protect financial transactions and information. A separate, segregated Wi-Fi network for lighting and A/V might also exist.
“For some events, it might be enough to offer attendees Wi-Fi so they can get on the Internet,” says Hoyos. “But once you start adding other ancillary things, a purpose-built network adds extra layers of security for everyone involved.”
User isolation is essential at large events to ensure privacy and security.
“When you’re at a big event, and you’ve got 1,000 or 20,000 people on the Wi-Fi network, you don’t want your phone to be able to see the phone or laptop of the person sitting next to you,” says Hoyos. “Obviously, there are some security concerns there.”
User isolation locks down the network so devices can only access the Internet, preventing corrupted devices and malware from causing issues.
Planners and their clients have a critical role to play in cybersecurity. To that end, Totzke provides these key cybersecurity tips:
When planners get smart about cybersecurity, they can mitigate risk and deliver safe, seamless experiences that inspire confidence and uphold reputations.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |