You are on page 1of 3

Jolt Entertainment Management

Risk Management at J.E.M.

Before working within event management, where many risks must be considered,
an employee must understand the process of risk identification, analysis,
evaluation, treatment, motoring, and/or mitigation. J.E.M. will require all
employees to understand the steps and model for risk management.

Beginning Steps for Risk Management


1. Identify
2. Analysis
3. Evaluate
4. Treat the Risk
5. Monitor and review
6. Repeat
Jolt Entertainment Management

Risk Management Model

Identify

• Recogize the prominent risk. Gather all possible


data from the source of the risk. What details
can you obtain about this hazard?

Monitor and review Analyze


• At this point, the risk should be eliminated.
Monitor the surrounding area to find any other • Understand the surrounding environment of the
possible risks. Then, review the process of risk risk. Where is the risk occurring? What and/or
management. What parts of your plan worked who can this risk affect?
well? What parts could be restructured or
improved? What is the possibility of the risk
reoccurring?

Treat Evaluate
• Take your established plan into action. Gather all • Evaluate the best possible approach to a
possible resources needed, consider prioritized solution using the information you have
actions, and act in a calm and efficient manner. gathered. Consider previous risks you may have
It is important to create an action plan with eliminated and use past infomation to create a
alternatives, in the case of any sudden changes structured plan. What steps can you take as an
or difficulties. employee to mitigate this risk?

The Risk Management Model displays a simple and easy-to-follow graphic of identifying and
managing risks. All processes must be followed in order to fully understand the information
regarding the risk, the areas and personnel involved, how the action plan was created and
facilitated, and which areas of concern should still be monitored. The model is circular, meaning
it can be repeated if necessary. In managing and operating large-scale arenas and venues, risk
management should be prioritized, as many challenges can appear in as little as one event. J.E.M.
cares about the safety of its employees and patrons, and the first step to supporting these
standards is an understanding of the risk management policy above. An example of the risk
management procedure in one of our facilities can be seen on the following page.
Jolt Entertainment Management

Risk Management Example

Identify
A bomb threat has been made at one of our facilities.

Analysis
The arena has 15,000 patrons currently seated, the threat has been made over the phone at a
ticketing window, security is located at all gates, and 215 staff members are present. Depending
on the details of the alleged bomb, the structure of the facility could possibly be at risk. The
employee handling the phone call has written down the caller’s details, including phone number,
location, name, and motive.

Evaluate
Police authorities should immediately be contacted. Security needs to be informed of the threat
and placed near every exit gate. Employees should enter the concourse and help to facilitate the
flow of traffic in a safe and efficient manner to the parking lot. Security then will search the
arena for any patrons and proceed to exit the building with all staff. Once this procedure is done,
the employee with written information will speak with police as agents conduct a bomb sweep.

Treat the Risk


The action plan is established. 911 is immediately called and all employees begin to assist with
the flow of traffic. Police and authorities will manage the remaining risk.

Monitor and Review


Once the building has been searched in its entirety, employees speak with the local officials to
document their observations. After finding out that there is no bomb within the facility,
indicating a false threat, we allow re-entry into the building and proceed with the event. For
forthcoming events, security will be heavily staffed, and authorities will be on watch.
Management should analyze the information received and look for possible areas of weak
security, such as security blind spots or areas of high traffic.

You might also like