• Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 6.000.000
1 product in the cart.
Developing Business Case for Security Projects
Developing Business Ca...
1 x Rp 6.000.000
×
View shopping cartProceed to checkout
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles
“Developing Business Case for Security Projects” has been added to your cart. View cart
Security Management at Events (Online)

Security Management at Events (Online)

Rp 2.000.000

Concerts, exhibitions and conferences are among several events in Singapore that require a competent team of security officers to ensure that the security operations at the event runs smoothly and successfully. Besides managing the security operations at the events, the security supervisor must also liaise with other stakeholders of the event. Security supervisors will need to know key function areas of security operations at events. They will need to be able to identify and mitigate security and safety risks at events. They will need to be equipped with strategies to manage security operations at events. Security supervisors must also be able to manage security and safety incidents at the event.

Category: Security Management/Operations.
1
Share
  • Description
  • Reviews (0)

Security Management at Events (Online) 

Concerts, exhibitions and conferences are among several events in Singapore that require a competent team of security officers to ensure that the security operations at the event runs smoothly and successfully.

Besides managing the security operations at the events, the security supervisor must also liaise with other stakeholders of the event. Security supervisors will need to know key function areas of security operations at events. They will need to be able to identify and mitigate security and safety risks at events. They will need to be equipped with strategies to manage security operations at events. Security supervisors must also be able to manage security and safety incidents at the event.

Are you equipped to manage security operations at events?
Who Should Attend
Security supervisors working at events
Learning Objectives
• Phases of security planning for events
• Key function areas of event security
• Security risk management
• Security management during the event
• Handling security and safety incidents
• Post event activities

Contact:
Anton Sim +62813-8332-6388 (Phone/WA)
antonsim@heilandsolutions.com

Reviews

There are no reviews yet.

Be the first to review “Security Management at Events (Online)” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

Add to cart View Details

Security Operations at Events (Online)

Security Management/Operations
1
Rp 2.000.000
Add to cart View Details

Security Risk Assessment

Security Management/Operations
2
Rp 9.000.000
Add to cart View Details

Threats Vulnerabilities Risk Assessment (TVRA)

Security Management/Operations
2
Rp 9.000.000
Add to cart View Details

Developing Business Case for Security Projects

Security Management/Operations
2
Rp 6.000.000

Articles

  • Konsep IAAA dalam Keamanan Fisik
  • Pentingnya Penerapan CPTED dalam Pembangunan Fasilitas
  • Pendekatan Komprehensif dalam Pengendalian Massa pada Acara Sepak Bola: Menghadirkan Keamanan dan Keselamatan yang Optimal
  • Ilusi Kompetensi dalam Bidang Keamanan: Mengenal, Menghadapi, dan Mencegahnya
  • Menjamin Keamanan Kampus: Pentingnya Security Risk Assessment (Physical dan Cyber) di Lingkungan Kampus dan Perumahan Kampus

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com