John McClurg, Sr. Vice President and CISO at BlackBerry, previously held executive roles at Dell and Honeywell International.\u003c/h3>"},"cl":"text pzoNgyEFxM8","type":"text"},{"key":"ecHTlAl2eHy","cl":"section","type":"section","children":["emY9r2ZFZrE"]},{"key":"ezRx3xuj8hd","cl":"section","type":"section"},{"key":"eQvV3_J--g6","content":{"text":"\u003cp >april 2022\u003c/p>"},"cl":"text","type":"text"},{"key":"eEGBx9OvA3U","content":{"menu":"cBYCbks09X"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"exMdEwDT3lz","content":{"menu":"fSPzLGr8R5"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"eD5zABd2Im_","cl":"section","type":"section","children":["eQvV3_J--g6","eEGBx9OvA3U","exMdEwDT3lz"]},{"key":"eOyxh4KwNmW","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"e0Ki9fEf4jf","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"evtGZUqKogk","content":{"link":{"href":"https://www.securitymagazine.com/","target":true,"mode":2}},"cl":"external-link","type":"external-link"},{"key":"emqS2u4hm1z","content":{"src":"MP-cejsYH"},"cl":"image","type":"image","actions":["eOyxh4KwNmW","e0Ki9fEf4jf","evtGZUqKogk"]},{"key":"egmoPOtAV89","content":{"text":"\u003cp >\u003ca href=\"https://www.securitymagazine.com/\" target=\"_blank\" rel=\"noopener external\">securitymagazine.com\u003c/a>\u003c/p>\u003cp >\u003cbr>\u003c/p>\u003cp >\u003cbr>\u003c/p>"},"cl":"text","type":"text"},{"key":"eHiEncRNoYh","cl":"section","type":"section","children":["emqS2u4hm1z","egmoPOtAV89"]},{"key":"pfseF5YtT2-","children":["eqe8WBihVfN","eWJKIACgAC_","er1oNBh-pGc","eP06PVkwNBX","eXlDsgXaUbr","ewNT9vpMZjS","eJp6KjuAB2c","eRUdfWlnAqv","ecHTlAl2eHy","ezRx3xuj8hd","eD5zABd2Im_","eHiEncRNoYh"]},{"key":"eMwXF9dx0lO","content":{"prevText":" Previous","nextText":"Next ","menu":"ZrlWNJlcNk"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"eD3xzRNBFt7","content":{"prevText":" Previous","nextText":"Next ","menu":"ZrlWNJlcNk"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"ezBYUsf4Qm0","content":{"pageMenu":"ZrlWNJlcNk"},"cl":"w1br1l0lsu-u06","type":"w1br1l0lsu-u06","icons":{"menu":[448,512,"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"]}},{"key":"elZuqflEGaS","cl":"rectangle","type":"rectangle"},{"key":"egZ1Snjzeq5","content":{"src":"K1ATuPru5E"},"cl":"image","type":"image"},{"key":"eGGXGu5QAwG","cl":"frame","type":"frame","children":["elZuqflEGaS","egZ1Snjzeq5"]},{"key":"eET-By2fIMv","content":{"link":{"mode":0,"page":"p_z9bq2togs"}},"cl":"external-link","type":"external-link"},{"key":"eRu7UIi2cEC","cl":"frame","type":"frame","children":["eGGXGu5QAwG"],"actions":["eET-By2fIMv"]},{"key":"fixed","children":["eMwXF9dx0lO","eD3xzRNBFt7","ezBYUsf4Qm0","eRu7UIi2cEC"],"visibility":{"eMwXF9dx0lO":{"pOcd2ynanLN":true},"eD3xzRNBFt7":{"pS_dsH3rqYj":true,"p9icjeZY7sj":true,"pbxAANzu64Y":true,"po4_bF-7HY4":true,"p6BuHCo98mQ":true,"p1mKvyvhNwr":true,"ptw6zPewDEt":true,"pN7ZIjANFwo":true,"p7kcbz71PS8":true,"pEgswr3OKTa":true,"pOUO-hZnuJM":true,"pcHzuNJYa41":true,"pRTrXPy98OV":true,"pP55UZD1AKn":true,"peUo0kov8Vy":true,"pxWrXQbpPDR":true,"pfseF5YtT2-":true,"pdcWFPKdXZE":true,"pxpOyEIstNY":true,"pG8MWAykFAZ":true,"p4Xp9x5Hdxh":true,"pq7D3f5RYQT":true,"pMpqkSJNWV4":true,"pAHFCZKSad-":true,"pDiVrdUnABS":true,"pQmTgpmWNR2":true,"pNGvpS1wJwI":true,"pobWsLgGDGc":true,"p-dA0FzdrkH":true,"paF5SD9doIP":true,"plTCL4Ic3LV":true,"pL1l-nP1gFm":true,"pQ6GuzZehYG":true},"eRu7UIi2cEC":{"p9icjeZY7sj":true,"pS_dsH3rqYj":true,"pxWrXQbpPDR":true,"pNGvpS1wJwI":true,"pAHFCZKSad-":true,"pG8MWAykFAZ":true,"pMpqkSJNWV4":true,"po4_bF-7HY4":true,"pQ6GuzZehYG":true,"pRTrXPy98OV":true,"pDiVrdUnABS":true,"p6BuHCo98mQ":true,"pL1l-nP1gFm":true,"paF5SD9doIP":true},"ezBYUsf4Qm0":{"pG8MWAykFAZ":true,"pL1l-nP1gFm":true,"pQ6GuzZehYG":true,"pRTrXPy98OV":true,"pDiVrdUnABS":true,"pxWrXQbpPDR":true,"paF5SD9doIP":true,"p6BuHCo98mQ":true,"pAHFCZKSad-":true,"pMpqkSJNWV4":true,"p9icjeZY7sj":true,"pS_dsH3rqYj":true,"pNGvpS1wJwI":true,"po4_bF-7HY4":true}}}],"pages":[{"key":"p-dA0FzdrkH","title":"Leadership & Management Column","desc":"Let’s talk metaverse — how are we going to anticipate the effects of the virtual world on the physical world, and in what ways are we not prepared?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg","path":"leadership--management-column"},{"key":"p1mKvyvhNwr","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds"},{"key":"p4Xp9x5Hdxh","title":"Education & Training Column","desc":"The risk of radicalization for private & public organizations is real & security leaders can mitigate some risk by evaluating processes & procedures.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LdEF7Aztox.jpg","path":"education--training-column"},{"key":"p6BuHCo98mQ","title":"AD-House Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sKkDBAkWBR.jpg","path":"ad-house-bookstore"},{"key":"p7kcbz71PS8","title":"De-escalation Strategies Feature","desc":"A key component of a comprehensive targeted workplace violence prevention plan is de-escalation and crisis management training. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2MddpCWGs5.jpg","path":"de-escalation-strategies-feature"},{"key":"p9icjeZY7sj","title":"AD-DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aS2gxV4cuu.jpg","path":"ad-dks"},{"key":"pAHFCZKSad-","title":"AD-House Refer A Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3SXQQ07PNN.png","path":"ad-house-refer-a-friend"},{"key":"pDiVrdUnABS","title":"AD-House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8PFVF-U-kT.png","path":"ad-house-most-influential"},{"key":"pEgswr3OKTa","title":"Recovered Content","cover":"https://cdn.vev.design/cover/SH-T5USlCM/pEgswr3OKTa/gd4d6_1200.jpg","path":"recovered-content"},{"key":"pG8MWAykFAZ","title":"AD-House SBS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Reh1Edo0wD.png","path":"ad-house-sbs"},{"key":"pIpzmGlTiKH","title":"eMagazine Help Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uNg-kDZ1n7.jpg","path":"emagazine-help-guide"},{"key":"pL1l-nP1gFm","title":"AD-House SEC 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2p5J_Muo2C.png","path":"ad-house-sec-500"},{"key":"pMpqkSJNWV4","title":"AD-House Brivo InfoCenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gXYInHHCoU.png","path":"ad-house-brivo-infocenter"},{"key":"pN7ZIjANFwo","title":"8 Tips Physical Security Feature","desc":"Implementing a physical security plan to protect your organization’s information systems requires strategic planning and assessment. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Hhe0r8Lmd6.jpg","path":"8-tips-physical-security-feature"},{"key":"pNGvpS1wJwI","title":"AD-House SEC Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QI8W1jM9aw.jpg","path":"ad-house-sec-renewal"},{"key":"pOUO-hZnuJM","title":"Product Spotlight","desc":"From security policy building to automated cybersecurity defense, Security magazine spotlights solutions from the 2022 RSA Conference.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GKIXf5-nbK.jpg","path":"product-spotlight"},{"key":"pOcd2ynanLN","title":"Security April 2022","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"","index":true},{"key":"pP55UZD1AKn","title":"Leader to Leader Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SSldkSKU9f.jpg","path":"leader-to-leader-column"},{"key":"pQ6GuzZehYG","title":"AD-Mission 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5kXB8RwVXP.jpg","path":"ad-mission-500"},{"key":"pQmTgpmWNR2","title":"Ad Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dosdsvdeB6.jpg","path":"ad-index"},{"key":"pRTrXPy98OV","title":"AD-Speco","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/n5dNBNCStI.png","path":"ad-speco"},{"key":"pS_dsH3rqYj","title":"AD-Axis","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TFRXNKwQCv.jpg","path":"ad-axis"},{"key":"paF5SD9doIP","title":"AD-House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_sFeskacJ.png","path":"ad-house-bnp-engage"},{"key":"pbxAANzu64Y","title":"Global News Department","desc":"Security magazine spotlights the latest evolutions in cybersecurity, from cyber workforce development to implementing zero trust.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vCQLucUSSG.jpg","path":"global-news-department"},{"key":"pcHzuNJYa41","title":"Higher Education Strategies Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WIQlDKrWwr.jpg","path":"higher-education-strategies-feature"},{"key":"pdcWFPKdXZE","title":"Career Intelligence Column","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QcMI41h6r6.jpg","path":"career-intelligence-column"},{"key":"peUo0kov8Vy","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds-control-command-ad"},{"key":"pfseF5YtT2-","title":"Cyber Tactics Column","desc":"Take a look at the BlackBerry 2022 Threat Report, which aims to allow security leaders to perform a thoughtful analysis shaping their security environment.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg","path":"cyber-tactics-column"},{"key":"plTCL4Ic3LV","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UrEP4Qamcz.png","path":"online-contents"},{"key":"po4_bF-7HY4","title":"AD-House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rjjn8dZ081.png","path":"ad-house-security-benchmark"},{"key":"pobWsLgGDGc","title":"Special Report Feature","desc":"A virtual GSOC can increase reach, productivity and operational efficiencies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"special-report-feature"},{"key":"pq7D3f5RYQT","title":"Security Talk Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kYkJSKm4ek.jpg","path":"security-talk-column"},{"key":"ptw6zPewDEt","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2UoAiSL8k4.jpg","path":"staff-listing"},{"key":"pxWrXQbpPDR","title":"AD-House eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZDlGE2wlJW.jpg","path":"ad-house-enewsletter"},{"key":"pxpOyEIstNY","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bDBwBZCxUm.jpg","path":"table-of-contents"}],"shapes":{},"images":{"K1ATuPru5E":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/K1ATuPru5E.svg","srcset":[]},"MP-cejsYH":{"meta":{"description":"Logo, Font, Text"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/500.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",2100]]},"MbGgybCd5K":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MbGgybCd5K.svg","srcset":[]},"eCv8uPcqMD":{"meta":{"width":400,"height":400,"description":"Forehead, Cheek, Eyebrow, Sleeve, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",400]]},"nUb_a-kw8b":{"meta":{"width":3000,"photographer":"Laurence Dutton / E+ via Getty Images","description":"Personal computer, Output device, Netbook, Peripheral","height":2001},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg",2560]]},"vNWK15VOrT":{"meta":{"photographer":"","width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1br1l0lsu-u06":"pgxSSDpDPRe","rectangle":"basic","image":"basic","frame":"basic","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1cal72054-hh4":"pL-YXwgdPSb8","section":"basic","text":"basic","circle":"basic","w75y8u1c":"basic"},"menus":{"9WJ0p8Leab":{"children":[{"link":{"mode":0},"title":"DOWNLOAD ISSUE","key":"Lpne3xBspf"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"target":true,"href":"https://www.securitymagazine.com/emagazine","mode":2}},{"title":"HELP","link":{"mode":0},"key":"AIoU2R3TUb"}],"title":"Main menu","key":"9WJ0p8Leab"},"VKOOSIUEfw":{"title":"Cyber MENU","children":[{"title":"Profile #1","children":[{"key":"tcqML0DoXh","title":"Profile #6","link":{"mode":0}}],"key":"VQJnkJ6EyX","link":{"mode":0}},{"title":"Profile #2","key":"b1sOrWTWb8","link":{"mode":0}},{"link":{"mode":0},"title":"Profile #3","children":[{"title":"Profile #4","key":"2ztDiDh787","link":{"mode":0}}],"key":"8X9x83O40O"},{"children":[],"link":{"mode":0},"key":"NKQCi5jV9M","title":"Profile #5"}],"key":"VKOOSIUEfw"},"ZrlWNJlcNk":{"title":"Hamburger MENU","children":[{"title":"Security April 2022","key":"RaZEop8-Dr","link":{"page":"pOcd2ynanLN","mode":0}},{"key":"N-86NZaX-1","link":{"mode":0,"page":"p9icjeZY7sj"},"title":"AD-DKS"},{"key":"9YYosMA-ER","link":{"mode":0,"page":"pxpOyEIstNY"},"title":"Table of Contents"},{"title":"AD-Speco","key":"VjjltqYOxw","link":{"page":"pRTrXPy98OV","mode":0}},{"key":"pAyiJ8aI8_","title":"Online Contents","link":{"page":"plTCL4Ic3LV","mode":0}},{"title":"Security Talk Column","key":"zhBVDxThlD","link":{"mode":0,"page":"pq7D3f5RYQT"}},{"title":"AD-Security Benchmark","key":"WNlo-7hCSq","link":{"page":"po4_bF-7HY4","mode":0}},{"title":"Global News Department","link":{"mode":0,"page":"pbxAANzu64Y"},"key":"ODzLCpxDQC"},{"link":{"page":"pobWsLgGDGc","mode":0},"key":"kYmuYlFnWp","title":"Special Report Feature"},{"link":{"page":"p7kcbz71PS8","mode":0},"title":"De-escalation Strategies Feature","key":"TRqNvC6Nl6"},{"title":"AD-Most Influential","link":{"page":"pDiVrdUnABS","mode":0},"key":"l0M3qErriv"},{"title":"Higher Education Strategies Feature","key":"b6GNyhEc5U","link":{"page":"pcHzuNJYa41","mode":0}},{"title":"AD-Security 500","link":{"mode":0,"page":"pL1l-nP1gFm"},"key":"57Re7VZrx5"},{"title":"8 Tips Physical Security Feature","link":{"mode":0,"page":"pN7ZIjANFwo"},"key":"fr4lOeyhb6"},{"key":"xr_IUX_boU","title":"AD-Refer A Friend","link":{"mode":0,"page":"pAHFCZKSad-"}},{"key":"FnlhwwMu2I","title":"Leader to Leader Column","link":{"mode":0,"page":"pP55UZD1AKn"}},{"key":"iT3v3SbOW3","title":"AD-Mission 500","link":{"page":"pQ6GuzZehYG","mode":0}},{"title":"Career Intelligence Column","link":{"page":"pdcWFPKdXZE","mode":0},"key":"-1QvFrzLA5"},{"title":"AD-SBS","key":"Vs_Q_Wlu6K","link":{"page":"pG8MWAykFAZ","mode":0}},{"key":"SPxPOkbEFm","link":{"mode":0,"page":"pMpqkSJNWV4"},"title":"AD-Brivo InfoCenter"},{"key":"z8ilWfsfyY","link":{"page":"p-dA0FzdrkH","mode":0},"title":"Leadership & Management Column"},{"title":"AD-SEC Renewal","key":"vzaJC66b7b","link":{"page":"pNGvpS1wJwI","mode":0}},{"key":"-DxNSNhPcY","link":{"page":"pfseF5YtT2-","mode":0},"title":"Cyber Tactics Column"},{"link":{"page":"pxWrXQbpPDR","mode":0},"title":"AD-eNewsletter","key":"G8-so6FjCc"},{"link":{"page":"p4Xp9x5Hdxh","mode":0},"key":"wunowOVFP4","title":"Education & Training Column"},{"link":{"page":"p6BuHCo98mQ","mode":0},"title":"AD-Bookstore","key":"OKaDPRC9Rz"},{"link":{"page":"pOUO-hZnuJM","mode":0},"title":"Product Spotlight","key":"HkwdEqB4H0"},{"title":"AD-BNP Engage","key":"xqMlZEVzuS","link":{"page":"paF5SD9doIP","mode":0}},{"key":"RDK6Ol_Mri","link":{"page":"p1mKvyvhNwr","mode":0},"title":"Classifieds"},{"title":"Ad Index","link":{"mode":0,"page":"pQmTgpmWNR2"},"key":"5X3eaCNk8E"},{"link":{"mode":0,"page":"pS_dsH3rqYj"},"title":"AD-Axis","key":"nHsqXCAjKh"},{"key":"Srsue0-O6v","link":{"mode":0,"page":"ptw6zPewDEt"},"title":"Staff Listing"}],"key":"ZrlWNJlcNk"},"cBYCbks09X":{"title":"Side menu","children":[],"key":"cBYCbks09X"},"fSPzLGr8R5":{"children":[{"link":{"href":"https://www.dropbox.com/s/ccidomw3jnudybe/SEC_April-2022_Full-Issue.pdf?dl=1","mode":2,"target":true},"children":[],"key":"Lpne3xBspf","title":"DOWNLOAD ISSUE"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"mode":2,"target":true,"href":"https://www.securitymagazine.com/emagazine"}},{"key":"AIoU2R3TUb","link":{"mode":0,"page":"pIpzmGlTiKH"},"title":"HELP"}],"title":"dummy","key":"fSPzLGr8R5"},"k2khWr7AGS":{"children":[{"title":"CONTENTS","link":{"mode":0,"page":"pxpOyEIstNY"},"key":"nstkKxEhBy","children":[]},{"children":[{"key":"K51wrkyIzR","link":{"page":"pobWsLgGDGc","mode":0},"title":"Special Report Feature"},{"title":"De-escalation Strategies","key":"PqhffTLIMR","link":{"mode":0,"page":"p7kcbz71PS8"}},{"link":{"page":"pcHzuNJYa41","mode":0},"key":"QrTBPv5xbR","title":"Higher Education Strategies"},{"link":{"page":"pN7ZIjANFwo","mode":0},"key":"cr21ubKEjp","title":"8 Tips for Physical Security"},{"title":"Product Spotlight","link":{"mode":0,"page":"pOUO-hZnuJM"},"key":"Hl1H4DidFc"}],"title":"FEATURES","key":"XqwLVZhe1R","link":{"mode":2}},{"children":[{"title":"Security Talk","link":{"page":"pq7D3f5RYQT","mode":0},"key":"GgZ-j8M6QK"},{"title":"Leader to Leader","key":"eOyIqoQ9jp","link":{"page":"pP55UZD1AKn","mode":0}},{"key":"qrnhSNIXuY","title":"Career Intelligence","link":{"mode":0,"page":"pdcWFPKdXZE"}},{"link":{"page":"p-dA0FzdrkH","mode":0},"title":"Leadership & Management","key":"ckI48V_8EP"},{"key":"qrY2W-kirS","link":{"page":"pfseF5YtT2-","mode":0},"title":"Cyber Tactics"},{"key":"cDiBzDVtYH","link":{"page":"p4Xp9x5Hdxh","mode":0},"title":"Education & Training"}],"key":"YA8VpnNiHa","title":"COLUMNS","link":{"mode":2}},{"link":{"mode":2},"children":[{"key":"TFis1X6OWv","title":"Global News & Analysis","link":{"mode":0,"page":"pbxAANzu64Y"}},{"title":"Online Contents","link":{"mode":0,"page":"plTCL4Ic3LV"},"key":"OJfaz1aMe0"},{"link":{"mode":0,"page":"p1mKvyvhNwr"},"key":"aJLVrzsMUw","title":"Classified Advertising"},{"title":"Advertising Index","link":{"mode":0,"page":"pQmTgpmWNR2"},"key":"V2jmK__mcr"},{"key":"HX1ar5_Bu-","link":{"mode":0,"page":"ptw6zPewDEt"},"title":"Staff Listing"}],"key":"QCL0eNn2SZ","title":"DEPARTMENTS"}],"title":"Main menu GOLD","key":"k2khWr7AGS"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","canvasSize":[1440,900],"columnWidth":[1024,1024]},{"mode":"tablet","columnWidth":[600,600],"canvasSize":[768,1024]},{"columnWidth":[320,320],"mode":"mobile","canvasSize":[375,667]}]}}