5 Steps to Help Secure Your City before a Large-Scale Event

Large-scale events present a unique set of risks and logistical complexities, which require detailed operational planning, coordination between multiple stakeholders with differing interests, and continuous situational awareness.

Given the high-visibility and level of public interaction of large-scale events, they are often viewed as attractive targets for cyber, physical, and information operation threats. This threat environment requires public safety officials and event organizers to stay aware of emerging threat trends, proactively engage in information sharing, establish crisis communications protocols, and implement robust physical security standards to safeguard large-scale events.

These preparatory steps are necessary given what's at stake. For instance, at the time of publication, cities across the United States, Canada, and Mexico are preparing to host millions of fans, players, and spectators for FIFA World Cup 2026. The United States alone is expecting 5-7 million international visitors. The scale of the tournament is unprecedented, prompting one of the largest commitments of safety resources ever made for a single event. As of this writing, over $1 billion in U.S. federal funding has been designated towards securing the tournament, including a grant program to support local security efforts and additional funding for counter-unmanned aircraft system needs.

Based on current intelligence, engagements with law enforcement and homeland security officials, and insight from related municipalities and FIFA World Cup 2026 Host Cities, the Center for Internet Security® (CIS®) recommends the following five mitigation measures as part of a comprehensive approach to secure your city ahead of hosting a large-scale event.

1. Ensure Multi-layered Security Planning at Venues

security challenges iconDue to their large, concentrated crowds and high-visibility, large-scale events face distinct security challenges. These challenges require venue-specific planning, redundancies in the event of disruptions, and preparation for threat actor use of emerging technologies.

  • Conduct a venue-specific risk assessment using the Cybersecurity and Infrastructure Security Agency’s (CISA's) Security Planning Workbook addressing physical perimeters, crowd flow, and cyber-enabled systems (e.g., ticketing, scoreboards, broadcast infrastructure).
  • Apply CISA's Venue Guide for Security Enhancements to assess and plan for dependency disruptions (e.g., power loss, network outages).
  • Ensure all security personnel are trained on layered security protocols prior to the event.
  • Establish a counter‑unmanned aircraft systems (UAS) capability to protect against drones used to conduct physical or cyber attacks or cause disruption. Learn more about the evolving UAS risks to large-scale events.

2. Strengthen Processes for Identifying and Reporting Suspicious Activity

safety officials iconTo keep attendees safe and limit disruptions, we recommend event organizers, public safety officials, and other stakeholders prioritize their efforts to identify and report suspicious activity.

3. Establish an Integrated Cybersecurity Posture

strong cybersecurity iconA strong cybersecurity posture is integral to creating a safe, enjoyable experience for attendees, fans, entertainers, athletes, and all participants of a major event. Strong cybersecurity means a safer event and fewer disruptions. Event organizers and public safety officials should implement the steps below to mitigate against cyber attacks and other cyber risk.

4. Detect and Counter Information Operations

event security iconProtecting against and responding to information operations are necessary components of any comprehensive large-scale event security posture. Information operations conducted by foreign state and non-state threat actors can incite, inform, or facilitate illegal activity, all of which have the potential to harm the security posture of a large-scale event. These efforts have become even more pressing with the widespread adoption of content that's generated and manipulated by artificial intelligence (AI).

5. Establish Unified Command, Communications, and Public Messaging

actionable communications iconClear, timely, and actionable communications are fundamental to executing a safe and secure large-scale event. It allows event organizations and public safety officials to communicate effectively with one another and the public, creating trust with attendees and minimizing the impact of potential security breaches.

  • Develop and rehearse pre-scripted response protocols for active assailant/shooter, vehicle ramming, IED, and bomb threat scenarios, leveraging guidance from CISA. Conduct regular joint exercises across law enforcement, emergency management, venue security, and emergency medical services.
  • Implement verification protocols to rapidly assess swatting calls and hoax threats, minimizing diversion of resources from legitimate incidents.
  • Establish designated, authenticated communication channels (e.g., social media, mobile alerts, venue public address systems) that are pre-identified to the public as a trusted source during emergencies.

Receive Support Securing Your City's Large-Scale Event

Large-scale events require specialized planning and dedicated resources to support a safe, engaging, and welcoming experience for attendees, entertainers, athletes, and the public.

To execute a safe and secure large-scale event with minimal disruption, multiple stakeholders must work together to defend against the most pressing threats and mitigate ongoing cyber, physical, and information operation risks. Drawing on our cyber and multidimensional threat planning expertise, coupled with engagements with law enforcement, public safety officials, and large-scale event planners, these five steps provide a safety roadmap for securing your event.

Review our whitepapers, Transportation Infrastructure Sabotage as a World Cup 2026 Risk Multiplier and Unmanned Aircraft Systems (UAS): Evolving Risks to Large-Scale Public Gatherings, for additional threat information and risk planning recommendations.

For more information on our special events support, please reach out.

As of June 23, 2025, the MS-ISAC has introduced a fee-based membership. Any potential reference to no-cost MS-ISAC services no longer applies.