The user is asked to conduct a brief checklist of core security aspects of the event organised. At the end of this step, the user will be aware of grey areas that require closer inspection before deploying one or more security options.
Step 1
Brief Checklist of Core Security Aspects
Step 2
Advanced Assessment of Grey Areas
The user assesses the grey zones identified in more detail to identify risks and vulnerabilities raised by using a security option within a scenario.
Step 3
Risks Mitigation Measures Required
The user maps out risk mitigation measures for the risks identified at Step 2.