{"id":4557,"date":"2024-01-09T17:50:34","date_gmt":"2024-01-09T10:50:34","guid":{"rendered":"https:\/\/nawakara.com\/en\/?p=4557"},"modified":"2024-05-14T13:22:07","modified_gmt":"2024-05-14T06:22:07","slug":"general-manager-of-p1-force-r-agung-wibowo-event-security-strategy-and-risk-mitigation","status":"publish","type":"post","link":"https:\/\/nawakara.com\/en\/general-manager-of-p1-force-r-agung-wibowo-event-security-strategy-and-risk-mitigation\/","title":{"rendered":"General Manager of P1 Force, R. Agung Wibowo: Event Security Strategy and Risk Mitigation"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Optimal <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security is one of the most important aspects to ensure the success of an <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">, and avoid material losses, while maintaining the good name of the organizer, by creating a safe and comfortable space for all parties involved during the <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security, the long experience of P1 Force&#8217;s General Manager, Mr Rakhmad Agung Wibowo, or Pak Bowo, is unquestionable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having more than 20 years of experience, Pak Bowo joined Nawakara in 1999, he was then assigned to <\/span><a href=\"https:\/\/www.instagram.com\/p1force.security\/\"><span style=\"font-weight: 400;\">P1 Force<\/span><\/a><span style=\"font-weight: 400;\"> since its inception in 2000. P1 Force itself is part of the Nawakara Group which was established with a focus on <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security &#038; <\/span><i><span style=\"font-weight: 400;\">close protection <\/span><\/i><span style=\"font-weight: 400;\">services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s take a look at the intricacies of <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security through the summary of our interview with Pak Bowo below.<\/span><\/p>\n<p><b>Q: What Security Risks and Threats are Found in an <\/b><b><i>Event<\/i><\/b><b>?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Beforehand, keep in mind that the word &#8220;<\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">&#8221; here is used as an umbrella term to refer to various events such as conferences, music concerts, sports tournaments, and so on. As such, the risks and threats found also vary depending on the type of <\/span><i><span style=\"font-weight: 400;\">event in <\/span><\/i><span style=\"font-weight: 400;\">question.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But in general, security risks that can be found in an <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">can be in the form of material losses due to pickpocketing, commotion due to the actions of irresponsible elements, to the most extreme, loss of life.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While security threats mainly come from people, from the actions they can take and the dangerous items they may carry. In addition, security threats can also come from natural disasters, such as earthquakes.<\/span><\/p>\n<p><b>Q: In which areas are these security risks and threats likely to occur?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerable areas are areas that are crowded by visitors or <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">participants, namely areas that become entrances and\/or exits as well as areas that become the center of activity of the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">itself.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Especially in the entrance and\/or exit areas, there is a high potential for security breaches such as pickpocketing, sexual harassment, and commotion that can arise due to things like irregular queues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same can also happen in the area that is the center of activity of the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">itself. At its most extreme, the risk of loss of life due to disasters such as earthquakes and fires also increases. Especially if the <\/span><i><span style=\"font-weight: 400;\">event is <\/span><\/i><span style=\"font-weight: 400;\">held in a closed <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">such as a building or stadium.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, optimal security is needed to make these vulnerable areas safe and comfortable so as to ensure the success of the <\/span><i><span style=\"font-weight: 400;\">event being <\/span><\/i><span style=\"font-weight: 400;\">held.\u00a0<\/span><\/p>\n<p><b>Q: So, how does P1 Force implement <\/b><b><i>event <\/i><\/b><b>security optimally?<\/b><\/p>\n<p><b><i>Framework Plan-Prevent-Protect<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">To implement optimal security, we certainly use the <\/span><i><span style=\"font-weight: 400;\">plan-prevent-protect <\/span><\/i><span style=\"font-weight: 400;\">framework.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the planning stage, good communication is essential with the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">organizer. Information such as the concept of the <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">, the estimated number of visitors, as well as the leaders of the third parties contributing to the security of the <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">, need to be provided.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A security assessment of the <\/span><i><span style=\"font-weight: 400;\">venue is <\/span><\/i><span style=\"font-weight: 400;\">also conducted. Such as the points used as entrances and\/or exits, the security technology that the <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">already has, and the capacity of the <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">that will be used.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also included in the planning stage is determining the location of the <\/span><i><span style=\"font-weight: 400;\">command center<\/span><\/i><span style=\"font-weight: 400;\">, creating a visitor movement flow scheme, and so on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For each piece of information obtained, we will study it in detail. For example, we measure the number of visitors or spectators per square meter of space available at the <\/span><i><span style=\"font-weight: 400;\">event venue <\/span><\/i><span style=\"font-weight: 400;\">and the type of <\/span><i><span style=\"font-weight: 400;\">event being <\/span><\/i><span style=\"font-weight: 400;\">held. This calculation is done to get a safe number of visitors or spectators in relation to the capacity of the <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">used. So as to avoid the occurrence of security disturbances such as <\/span><i><span style=\"font-weight: 400;\">overcrowding<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through the learned information, <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security measures to mitigate risks can then be taken. These measures include <\/span><i><span style=\"font-weight: 400;\">drills for <\/span><\/i><span style=\"font-weight: 400;\">personnel on duty in the field, especially for dealing with emergencies, setting up barricades, and installing security equipment as needed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The final step, of course, is to carry out the security itself. Security is carried out by all personnel on duty professionally in accordance with established standards.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although security is our main task, we also realize that comfort is a factor that cannot be ignored, especially in an <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">. For this reason, we also take various measures to keep the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">comfortable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, we place our personnel with communication skills at points that have high interaction intensity with visitors, or <\/span><i><span style=\"font-weight: 400;\">body checking <\/span><\/i><span style=\"font-weight: 400;\">at the entrance is done effectively and efficiently so that visitors do not have to jostle and potentially cause commotion.<\/span><\/p>\n<p><b><i>Manned <\/i><\/b><b>&#038; <\/b><b><i>Machine\/Technology <\/i><\/b><b>Integration<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Speaking of <\/span><i><span style=\"font-weight: 400;\">body checking<\/span><\/i><span style=\"font-weight: 400;\">, the security activity is a good example of the importance of integration between humans and machines\/technology for optimal <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order for <\/span><i><span style=\"font-weight: 400;\">body checking to be <\/span><\/i><span style=\"font-weight: 400;\">carried out effectively and efficiently, it requires the use of machines\/technology such as <\/span><i><span style=\"font-weight: 400;\">handheld metal detectors<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">walk-through metal detectors, <\/span><\/i><span style=\"font-weight: 400;\">or even <\/span><i><span style=\"font-weight: 400;\">x-ray machines<\/span><\/i><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, the addition of other machines\/technologies can also be suggested according to the results of the security assessment and the machines\/technologies already available at the <\/span><i><span style=\"font-weight: 400;\">event venue<\/span><\/i><span style=\"font-weight: 400;\">. For example, the installation of temporary portable CCTV.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These machines or technologies still require humans to function to maintain security. For this reason, our personnel have also been trained to be able to operate these machines or technology. So as to create an optimal security unity between humans and machines or technology and streamline responses in the event of a security disturbance.<\/span><\/p>\n<p><b>Coordination with third parties\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If a security breach persists, coordination with third parties such as the police, fire department, or health officials, will be carried out if deemed necessary.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Coordination with third parties is deemed necessary when the field <\/span><i><span style=\"font-weight: 400;\">supervisor <\/span><\/i><span style=\"font-weight: 400;\">or <\/span><i><span style=\"font-weight: 400;\">commander <\/span><\/i><span style=\"font-weight: 400;\">considers that the situation causing the security disturbance cannot be handled by the personnel in the field.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through the <\/span><i><span style=\"font-weight: 400;\">supervisor <\/span><\/i><span style=\"font-weight: 400;\">or field <\/span><i><span style=\"font-weight: 400;\">commander<\/span><\/i><span style=\"font-weight: 400;\">, the situation will be reported to the <\/span><i><span style=\"font-weight: 400;\">command center<\/span><\/i><span style=\"font-weight: 400;\">. At the <\/span><i><span style=\"font-weight: 400;\">command centre<\/span><\/i><span style=\"font-weight: 400;\">, the report will be analysed by top leadership to determine which third parties need to be coordinated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With an optimised security system and a clear chain of command, this coordination is only done in a matter of minutes. So that security disturbances can be dealt with as quickly as possible.<\/span><\/p>\n<p><b>Q: Can you tell us about a security event that P1 Force has done?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Of course, there are actually a lot of them. But most recently, we were tasked with securing the 2023 FIBA Basketball World Cup and the 2023 FIFA U-17 World Cup. Two international sporting <\/span><i><span style=\"font-weight: 400;\">events <\/span><\/i><span style=\"font-weight: 400;\">that are organized relatively close together.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the 2023 FIFA U-17 World Cup, the task of securing one of the <\/span><i><span style=\"font-weight: 400;\">venues <\/span><\/i><span style=\"font-weight: 400;\">used is the Manahan Stadium in Solo City. Unlike the other <\/span><i><span style=\"font-weight: 400;\">venues<\/span><\/i><span style=\"font-weight: 400;\">, Manahan Stadium is used as a <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">from the group stage to the final or from the beginning of the tournament to completion. The <\/span><i><span style=\"font-weight: 400;\">venue <\/span><\/i><span style=\"font-weight: 400;\">used for the 2023 FIBA Basketball World Cup is the Indonesia Arena in Jakarta.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As it is an international <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">, the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security that is carried out also follows international standards according to the provisions given by FIBA (for the Basketball World Cup) and FIFA (for the U-17 World Cup).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All the stages described above are carried out in detail. Starting from the preparation of plans, and simulations when facing all possible security disturbances, testing the security machines\/technologies used, and so on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What&#8217;s more, in addition to <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security services, our <\/span><a href=\"https:\/\/nawakara.com\/id\/mengenal-jasa-security-event-security-close-protection\/\"><i><span style=\"font-weight: 400;\">close protection<\/span><\/i><\/a><span style=\"font-weight: 400;\"> services are also used for athletes, coaches and staff participating in the tournament. We provide 24-hour security, from their arrival to Indonesia to their return to the airport to return to their respective countries.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, all activities of the <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">participants can be carried out safely and comfortably. So that they can maintain their focus on competing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through collaboration with various parties, careful planning and training, as well as the implementation of optimal <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security, both international <\/span><i><span style=\"font-weight: 400;\">events <\/span><\/i><span style=\"font-weight: 400;\">can be held successfully.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With more than 20 years of experience securing various types of <\/span><i><span style=\"font-weight: 400;\">events<\/span><\/i><span style=\"font-weight: 400;\">, P1 Force and Nawakara use a <\/span><i><span style=\"font-weight: 400;\">tailor-made <\/span><\/i><span style=\"font-weight: 400;\">approach. The <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security system can be optimized to suit the needs of each <\/span><i><span style=\"font-weight: 400;\">event<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security system includes well-trained personnel as well as good integration between man and machine\/technology. Thus ensuring the safety and comfort of your event from start to finish.<\/span><\/p>\n<p><a href=\"https:\/\/nawakara.com\/id\/contact-us\/\"><span style=\"font-weight: 400;\">Contact us<\/span><\/a><span style=\"font-weight: 400;\"> for further <\/span><i><span style=\"font-weight: 400;\">event <\/span><\/i><span style=\"font-weight: 400;\">security information.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Optimal event security is one of the most important aspects to ensure the success of an event, and avoid material losses, while maintaining the good name of the organizer, by creating a safe and comfortable space for all parties involved during the event. When it comes to event security, the long experience of P1 Force&#8217;s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4558,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-4557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/4557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/comments?post=4557"}],"version-history":[{"count":3,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/4557\/revisions"}],"predecessor-version":[{"id":6475,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/4557\/revisions\/6475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media\/4558"}],"wp:attachment":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media?parent=4557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/categories?post=4557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/tags?post=4557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}