AGCG Genuine
Consulting Group

Cybersecurity • IT Governance

Cybersecurity & the events industry: when “the show must go on” goes digital

By AGCG Genuine Consulting Group
Article prepared by Arnaud GODET, Managing Partner – AGCG Genuine Consulting Group

Behind the apparently seamless experience of trade fairs, concerts, congresses and major events lies a dense, fragmented and highly interdependent digital infrastructure. As supply chains, technical providers, IT, OT and IoT increasingly converge, cybersecurity becomes a central continuity issue: because in the events industry, whatever happens, “the show must go on”.

AGCG notes & insights

Topic:  Cybersecurity, events industry, resilience, supply chain
Type of analysis:  Strategic & operational insight
Firm:  AGCG Genuine Consulting Group

⏱ Estimated reading time: ~10–12 minutes
Target audience: event-industry executives, venue management, CISOs, CIOs, executive committees

Why cybersecurity has become a core issue for the events industry

Concerts, trade fairs, conferences, exhibitions, sporting competitions: behind what the public experiences as smooth and immersive lies a complex digital infrastructure. Temporary networks, control rooms, audiovisual systems, IoT, ticketing, cloud platforms and multiple providers now form a technical chain that has very little in common with yesterday’s events model.

In this new environment, cybersecurity is no longer a peripheral topic. It becomes a pillar of continuity and credibility in a sector where one truth remains:  “the show must go on”. The core question is not whether everything can be perfectly controlled, but whether, when something does go wrong, the event can continue under acceptable conditions.

1. An events model profoundly reconfigured

1.1. Hybrid has become the norm

Modern events typically combine:

  • physical presence,
  • live streaming and replay,
  • digital interactions,
  • services delivered through cloud platforms.

What used to be the exception — a “phygital” experience — has now become part of the baseline expectation of exhibitors, visitors and sponsors.

1.2. A surge in the volume of data handled

Organisers now handle large and growing volumes of data:

  • registration and attendee profile data,
  • transactional data (ticketing, cashless payments, catering),
  • footfall and visitor journey analytics,
  • platform data from online sessions, interactions and replays.

This information has become a strategic asset — and an attractive target for attackers.

1.3. Massive automation of technical systems

Automated access control, cashless systems, software-driven lighting and scenography, flow sensors, interconnected displays, streaming platforms: systems that were once analogue or isolated are now fully digital and tightly interconnected.

1.4. Faster operations under heavy constraints

Production cycles are accelerating: shorter build times, cost pressure, teams operating at full stretch, and reuse of equipment across different venues. ENISA’s analyses highlight how these highly constrained environments mechanically increase cyber risk through configuration errors, “pragmatic” workarounds and lack of effective oversight [1].

2. A sector now highly exposed to cyber risk

2.1. Major events as natural targets

Major international events attract a wide spectrum of threats: cybercrime, sabotage, reputational attacks, economic espionage. The Tokyo Olympic Games, for example, registered hundreds of millions of attempted attacks on their systems, according to Japanese authorities [6]. For attackers, these environments combine visibility, financial stakes and technical complexity.

Lessons learned from large international events such as the Olympic Games are particularly useful to understand the risks associated with temporary, highly interconnected infrastructures [1] (Why we reference Tokyo 2020 rather than Paris 2024 is explained in the methodological note).

2.2. Technical complexity that is widely underestimated

Temporary networks, control rooms, AV systems, IoT, ticketing, streaming solutions: behind simple front-end interfaces lie complex architectures, sometimes assembled in just a few days. The display outages occasionally visible in airports or convention centres — for instance thin clients stuck on a PXE boot screen — reveal the presence of single points of failure, invisible to the public but critical for continuity of service.

2.3. A highly fragmented supply chain

Events rely on a constellation of providers: AV companies, network integrators, specialised freelancers, ticketing operators, cashless and IoT vendors, small technical agencies. Studies by Allianz and NIST indicate that more than half of significant incidents involve weaknesses in the supplier chain [2], [3].

In this sector, the effect is amplified by the presence of numerous very small technical players, who are highly skilled in their operational domain but rarely structured to manage cybersecurity at large-account standards.

2.4. Incidents that are visible in real time

An incident during an event is not an “internal IT problem”. It is seen, heard, recorded and shared. Whether it takes the form of erratic displays, unavailable payment terminals or disrupted video streams, the impact on the perception of visitors, on partner confidence and on the organiser’s brand is immediate.

3. A structural vulnerability – not just a temporary issue

3.1. Extreme technological heterogeneity

Each project combines legacy components, modern cloud solutions, proprietary equipment, open standards and systems designed for video, sound, lighting, scenography and management. This diversity makes it difficult to define a coherent security model and to implement consistent hardening policies across the board.

3.2. Heavy reliance on very small subcontractors

A large part of the technical backbone of an event depends on very small actors: lighting specialists, freelance video operators, local control-room teams, regional network providers, and so on. They often excel operationally, but do not always have the time, resources or governance structures required to embed advanced cybersecurity practices.

3.3. Temporary environments that are hard to industrialise

Networks that are built quickly, operated for a few days and then dismantled leave little room for traditional approaches to hardening, security testing or rigorous segmentation. The temptation is strong to aim for the minimum viable set-up that “works”, rather than for robust security.

3.4. Direct impact on visitors and participants

A succession of micro-incidents — disrupted payments, inconsistent signage, conflicting messages, poorly guided flows — immediately degrades visitor experience and, by extension, overall trust in the event, the venue and the organiser.

4. A sector caught between industrialisation and fragility

4.1. Standardising without freezing the model

Industry players are trying to industrialise their practices: reusing proven technical building blocks, mutualising infrastructures, standardising parts of the production chain. Yet each event retains unique characteristics (venue, flows, scenography, audience, partners), which makes every set-up resemble a kind of permanent prototype.

4.2. Expected fluidity vs. invisible constraints

From the visitor’s point of view, the ideal experience is simple: fast, obvious and frictionless. From the standpoint of technical and cyber teams, it requires a stack of controls, segmentation, redundancy and safeguards. The tension between perceived fluidity and underlying technical constraints will be at the heart of strategic trade-offs in the years ahead.

4.3. Real fragmentation, perceived central responsibility

Operationally, an event depends on dozens of different technical actors. For the public, sponsors and regulators, however, responsibility appears to rest with a small number of organisers. Cybersecurity throws this gap into sharp relief: a highly centralised public accountability sitting on top of a deeply fragmented operational system, which complicates overall risk management.

5. Resilience as the central issue: cybersecurity in support of “the show must go on”

5.1. From theoretical protection to real continuity

In the events industry, the central question is not: “Can we prevent every incident?” but rather “If something breaks, how do we keep going?”. Cybersecurity must therefore focus first and foremost on resilience: the ability to absorb a shock, adapt and return to a stable mode of operation.

5.2. Playbooks to avoid improvisation under pressure

When an incident occurs during live operations, business teams make very quick decisions, sometimes spontaneously bypassing security controls to restore service. Rather than leaving these choices to improvisation, it is possible to design reflex playbooks that describe:

  • possible partial workarounds in degraded mode (manual fallbacks, simplified controls),
  • the risks associated with these workarounds (fraud, inconsistencies, increased exposure),
  • conditions for activation and return to normal operation.

The aim is not to undermine security, but to enable organisers to take informed and accountable decisions within minutes in an emergency situation.

5.3. Positioning cyber as a business enabler

In this model, cybersecurity moves away from being “the function that says no” and positions itself as a business partner. It helps identify critical scenarios, design controlled degraded modes, make the risks attached to each option explicit, and support front-line teams in preparing and adopting reflex playbooks.

The cyber function thus becomes a true business enabler: it aligns its priorities with those of the business (continuity, safety of participants, event reputation) rather than remaining purely self-centred on technical objectives.

5.4. From “zero risk” to explicit trade-offs

“Zero risk” has never been realistic, especially in an environment as fluid as the events industry. What cybersecurity can bring, however, is a structured view of trade-offs:

  • what is non-negotiable (safety, integrity of certain systems, protection of critical assets),
  • what can be temporarily relaxed,
  • what is a matter of comfort rather than security.

Seen through this lens, cybersecurity does not stand in opposition to “the show must go on”: it actually contributes to making it possible with full awareness, enabling organisers to choose rather than simply endure.

Conclusion: a digital industry owning its dependencies

The events industry has become a digital industry: interdependent, sensitive, exposed and deeply reliant on its technical chain and providers.

In this context, cybersecurity is neither a brake nor a luxury. It is a lens through which to understand real dependencies, anticipate possible failures, prepare acceptable degraded modes and support organisers in making fast but informed decisions.

More than ever, cybersecurity contributes to what remains the sector’s founding requirement:  “the show must go on”. Not through wishful thinking, but through explicit choices, prepared scenarios and teams that are equipped and supported.

Methodological note: why references to Tokyo 2020 rather than Paris 2024?

The Paris 2024 Olympic Games have been the subject of internal assessments by French authorities, but at the time of writing, few detailed public documents are available in open sources.

By contrast, Japanese authorities have published several comprehensive public reports on Tokyo 2020, documenting:

  • the volume of attacks observed,
  • the typologies of these attacks,
  • the impacts recorded,
  • the key lessons learned.

Tokyo 2020 therefore provides a more exploitable reference point for this note, based on accessible and verifiable open-source material.

References & sources

  1. ENISA – European Union Agency for Cybersecurity.
    ENISA Threat Landscape 2023 & 2024.
    View on ENISA’s website
  2. Allianz Global Corporate & Specialty.
    Allianz Risk Barometer 2024 – Global Business Risks.
    Access the Allianz Risk Barometer report
  3. NIST – National Institute of Standards and Technology.
    NIST SP 800-161r1 – Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.
    Browse NIST SP 800 publications
  4. NIST – National Institute of Standards and Technology.
    NIST SP 800-82 – Guide to Industrial Control Systems (ICS) Security.
    View the ICS Security guide
  5. Cloudflare Radar.
    DDoS Threat Reports & analyses of attacks targeting online services and ticketing.
    See Cloudflare Radar reports
  6. NISC – National Center of Incident Readiness and Strategy for Cybersecurity (Japan).
    Public reports on cyberattacks during the Tokyo 2020 Olympic Games.
    Visit the NISC website
  7. IOC – International Olympic Committee.
    Documentation on technology, cybersecurity and the organisation of major sporting events.
    Visit the IOC website