Drag
LEARN
MORE

Credentialing, 20 Years Later: Why Major Events Are Still Stuck in the Badge Era

Lucy Burrows
Lucy Burrows
Accreditation Badges Credentialing

Nearly twenty years have passed since Planning and Managing Security for Major Special Events framed credentialing as a core component of access control. At the time, the guidance was practical, grounded, and appropriate for its era. Credentials were physical artifacts—badges designed to help officers quickly determine who belonged where, and for what purpose. 

What is striking today is not that the guidance was limited—it was written for 2007—but that, in many corners of the major event world, credentialing has not fundamentally evolved since. 

Despite dramatic changes in threat environments, operational complexity, and technology, credentialing at many large events still looks remarkably familiar: laminated badges, color codes, numbers, lanyards, and ad hoc rules enforced under pressure. The tools may look slightly more polished, but the underlying model remains largely unchanged. 

This paper argues that credentialing has become one of the most quietly under-innovated elements of major event security—and that this stagnation now carries real risk. 

The Original Model: Functional, but Frozen in Time 

In the mid 2000s, credentialing was defined narrowly and sensibly. A credential was not a ticket; it was proof of identity and authorization. It signaled perimeter access (outer, middle, inner), functional role, and sometimes permission to carry equipment or weapons. Anti-counterfeiting features like holograms were considered advanced. Color coding and numbering were the norm. 

Even then, the guidelines acknowledged constraints: 

  • Credentialing was expensive 
  • Background checks added friction 
  • Budget pressure often forced compromises 

There was a forward-looking note—biometrics and barcodes were mentioned as future possibilities—but credentialing itself was still treated as a support function, not a strategic capability. 

In fairness, that made sense. Events were smaller. Workforces were more stable. Threat models were simpler. And security systems were not expected to integrate or adapt in real time. 

That world no longer exists. 

The Uncomfortable Reality: How Little Has Actually Changed 

Fast forward two decades, and credentialing at many major events still relies on the same assumptions: 

  • Identity is static 
  • Authorization rarely changes once issued 
  • Visual inspection is “good enough” 
  • Enforcement depends on individual judgment 

To be clear, not all events operate this way. There are pockets of innovation, especially at the highest-profile or federally supported events. But across much of the industry—festivals, sporting events, conventions, large civic gatherings—the dominant model remains badge-centric and manual. 

The problem is not that badges exist. The problem is that badges are often asked to carry far more responsibility than they were ever designed for. 

Why the Badge Model Is Breaking Down 

  1. Events Are More Complex Than Credentials

Modern events involve thousands of temporary workers, volunteers, contractors, vendors, media representatives, and partners—many cycling in and out over days or weeks. Roles change. Access needs shift. Static credentials cannot keep up. 

  1. Insider Risk Is No Longer Theoretical

Most access violations do not begin at the gate. They begin with legitimate credentials used incorrectly, shared casually, or repurposed after authorization should have expired. Traditional credentialing offers little visibility into this risk. 

  1. Human Judgment Is Overloaded

Color codes and numbers assume calm conditions, good lighting, and time to think. In reality, officers and security staff make rapid decisions in crowds, noise, and stress. Credentialing systems that rely primarily on visual interpretation amplify error. 

  1. Fragmentation Is the Norm

Credentials are often venue-specific, day-specific, or sponsor-specific. Information about who is credentialed—and why—is rarely centralized, updated, or visible to command in real time. 

The Deeper Issue: Credentialing Was Never Reimagined 

What has truly stalled is not technology adoption, but mindset. 

Credentialing is still widely viewed as: 

  • A logistics task 
  • A printing exercise 
  • A problem to solve late in planning 

Rarely is it treated as: 

  • A dynamic risk control 
  • A real-time operational signal 
  • A system of trust that can expand or contract 

As a result, innovation has been incremental rather than transformational. 

What Modern Credentialing Could Be 

The future of credentialing is not about abandoning badges—it is about decoupling identity from plastic. 

A modern credentialing model would be: 

  • Dynamic – Access changes based on time, role, location, or threat level 
  • Integrated – Connected to command centers, access control points, and incident management 
  • Risk-Based – Stronger verification where risk is highest, lighter where it is not 
  • Auditable – Creating visibility into who accessed what, when, and why 

In this model, credentialing becomes an operational sensor, not just a gatekeeper. 

Why This Space Has Been Slow to Change 

Major events sit at the intersection of public safety, private operators, politics, and public expectation. That creates friction: 

  • Short planning cycles discourage system change 
  • Temporary workforces resist training burden 
  • Privacy and civil liberties concerns slow adoption 
  • No single owner feels responsible for modernization 

The result is a reliance on familiar tools—even when everyone knows they are imperfect.  

A Necessary Shift: From Access Passes to Trust Systems 

Credentialing does not need to be more aggressive. It needs to be more precise. 

When done well, modern credentialing: 

  • Reduces the need for broad, heavy-handed security measures 
  • Lowers cognitive load on frontline staff 
  • Improves interagency coordination 
  • Strengthens public confidence without increasing friction 

This is not about technology for its own sake. It is about aligning security controls with the realities of modern events. 

Credentialing, 20 Years Later – and Still Waiting for Its Moment 

One of the most revealing aspects of credentialing’s stagnation is that even when federal guidance did  attempt to modernize, it largely stopped short. 

In 2018—more than a decade after the original COPS Office guidelines—the Bureau of Justice Assistance released Managing Large-Scale Security Events: A Planning Primer. On paper, this appeared to be the long-awaited evolution: lessons learned from recent national conventions, refined planning structures, and a refreshed operational checklist. 

But when it comes to credentialing, the Primer tells a familiar story. 

Credentialing is still framed as a planning task: defining credential types, setting access levels, conducting background checks, producing badges, and briefing officers on how to visually inspect them. It is more integrated into the planning process than in 2007, but it is not fundamentally reimagined. There is no meaningful discussion of real-time access control integration, no conception of credentials as living identities, and no acknowledgment that authorization might need to change dynamically as conditions change. 

In effect, the 2018 Primer modernized where credentialing sits in the binder – but not what credentialing actually is. 

This matters because it confirms a deeper truth: credentialing did not fail to evolve due to a lack of technology. It stalled because doctrine never demanded more from it. 

Still in the Badge Era 

Across much of the major events landscape today, credentialing still looks and feels the same: 

  • Badges, colors, numbers, and lanyards 
  • Static access permissions are issued days or weeks in advance 
  • Visual inspection under crowded, high-stress conditions 
  • Heavy reliance on individual judgment at the point of enforcement 

Again, this is not universal. Some high-profile events, particularly National Special Security Events, employ more rigorous identity controls. But for the vast majority of large sporting events, festivals, conventions, and civic gatherings, credentialing remains stubbornly analog in a digital world. 

The uncomfortable reality is this: credentialing is one of the last core security functions still operating as if real-time data were optional. 

Why This Is No Longer Good Enough 

The gap between how events operate and how credentials are managed has become impossible to ignore. 

Events are now fluid, multi-venue, multi-day systems. Workforces are temporary, layered, and constantly changing. Threats are hybrid—physical, cyber, insider, opportunistic. And yet credentials are still expected to be static artifacts that somehow keep up. 

This mismatch creates risk: 

  • Credentials outlive their purpose 
  • Access is broader than necessary because precision is hard 
  • Revocation is slow, manual, or socially awkward 
  • Command has little visibility into how access is actually being used 

No amount of holograms or color variations fixes this. 

The Missed Opportunity 

What both the 2007 guidelines and the 2018 Primer illustrate—unintentionally—is how credentialing has been treated as a support function rather than a strategic one. 

Communications evolved. Intelligence evolved. Command and control evolved. Credentialing did not. 

As a result, we continue to compensate with more fencing, more officers, more screening, and more friction—rather than more insight. 

Reframing the Future: Credentialing as a Trust System 

The next evolution of credentialing is not about eliminating badges. It is about redefining what they represent. 

Modern credentialing should function as a trust system: 

  • Dynamic: Access adjusts based on role, time, and conditions 
  • Integrated: Connected to access control, operations, and incident management 
  • Risk-aware: Stronger controls where consequences are higher 
  • Auditable: Clear visibility into who accessed what, when, and why 

In this model, credentials stop being static permissions and start becoming operational signals.  

Closing Thought 

Twenty years ago, credentialing was correctly identified as essential. What is harder to explain is why, twenty years later, it is still largely practiced the same way—even in our most recent federal guidance. 

The persistence of badge-based thinking is not a failure of imagination by frontline professionals. It is a failure of the field to demand more from one of its most powerful levers. 

Badges, colors, and numbers still have a place. But they cannot remain the foundation. 

If the future of major event security is about precision rather than presence, then credentialing must finally step out of the dark ages and into the role it has quietly been waiting for all along. 

Want the latest news straight to your inbox?