Kroll’s method of event security begins with a comprehensive threat evaluation, examining both the macro and micro threat environments affiliated with the event, including its host(s), the venue/ecosystem, recognized or expected attendees, sponsors, historical events and political agendas. Our intention is to provide the host or coordinating comm