Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem>Columnist image courtesy of Gips\u003c/em>\u003c/h3>"},"cl":"text pzoNgyEFxM8","type":"text"},{"key":"ewBecsSKZkW","cl":"section","type":"section","children":["e_aZ2K4Lc6w"]},{"key":"eedxRaKGDC2","cl":"section","type":"section"},{"key":"edjLkZO-_oZ","content":{"text":"\u003cp >april 2022\u003c/p>"},"cl":"text","type":"text"},{"key":"eeh8tZUC7Ex","content":{"menu":"cBYCbks09X"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"e1hzki_uQyM","content":{"menu":"fSPzLGr8R5"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"eC2AxgGRmvB","cl":"section","type":"section","children":["edjLkZO-_oZ","eeh8tZUC7Ex","e1hzki_uQyM"]},{"key":"eNzVJUIAiZa","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"e3-UMcbE2y0","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"edR_tz3p6J5","content":{"link":{"mode":2,"target":true,"href":"https://www.securitymagazine.com/"}},"cl":"external-link","type":"external-link"},{"key":"e-1V-XGv45O","content":{"src":"MP-cejsYH"},"cl":"image","type":"image","actions":["eNzVJUIAiZa","e3-UMcbE2y0","edR_tz3p6J5"]},{"key":"ecuRYskVh1y","content":{"text":"\u003cp >\u003ca href=\"https://www.securitymagazine.com/\" target=\"_blank\" rel=\"noopener external\">securitymagazine.com\u003c/a>\u003c/p>\u003cp >\u003cbr>\u003c/p>\u003cp >\u003cbr>\u003c/p>"},"cl":"text","type":"text"},{"key":"eyHiQXeWImc","cl":"section","type":"section","children":["e-1V-XGv45O","ecuRYskVh1y"]},{"key":"p-dA0FzdrkH","children":["evIWTNWLQd9","eRQuZFrs7bP","e8emGvE8C0E","esXaEhUbdBT","e2XKyD7Oq7-","ePPT-SliSL8","eeL1mCOqlCp","ele8e74YT5K","ewBecsSKZkW","eedxRaKGDC2","eC2AxgGRmvB","eyHiQXeWImc"]},{"key":"eMwXF9dx0lO","content":{"prevText":" Previous","menu":"ZrlWNJlcNk","nextText":"Next "},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"eD3xzRNBFt7","content":{"prevText":" Previous","nextText":"Next ","menu":"ZrlWNJlcNk"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"ezBYUsf4Qm0","content":{"pageMenu":"ZrlWNJlcNk"},"cl":"w1br1l0lsu-u06","type":"w1br1l0lsu-u06","icons":{"menu":[448,512,"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"]}},{"key":"elZuqflEGaS","cl":"rectangle","type":"rectangle"},{"key":"egZ1Snjzeq5","content":{"src":"K1ATuPru5E"},"cl":"image","type":"image"},{"key":"eGGXGu5QAwG","cl":"frame","type":"frame","children":["elZuqflEGaS","egZ1Snjzeq5"]},{"key":"eET-By2fIMv","content":{"link":{"mode":0,"page":"p_z9bq2togs"}},"cl":"external-link","type":"external-link"},{"key":"eRu7UIi2cEC","cl":"frame","type":"frame","children":["eGGXGu5QAwG"],"actions":["eET-By2fIMv"]},{"key":"fixed","children":["eMwXF9dx0lO","eD3xzRNBFt7","ezBYUsf4Qm0","eRu7UIi2cEC"],"visibility":{"eRu7UIi2cEC":{"pRTrXPy98OV":true,"pxWrXQbpPDR":true,"pL1l-nP1gFm":true,"pAHFCZKSad-":true,"pDiVrdUnABS":true,"pMpqkSJNWV4":true,"p9icjeZY7sj":true,"po4_bF-7HY4":true,"p6BuHCo98mQ":true,"pNGvpS1wJwI":true,"pG8MWAykFAZ":true,"pS_dsH3rqYj":true,"pQ6GuzZehYG":true,"paF5SD9doIP":true},"eMwXF9dx0lO":{"pOcd2ynanLN":true},"ezBYUsf4Qm0":{"p9icjeZY7sj":true,"pG8MWAykFAZ":true,"pDiVrdUnABS":true,"p6BuHCo98mQ":true,"pS_dsH3rqYj":true,"pQ6GuzZehYG":true,"pxWrXQbpPDR":true,"pNGvpS1wJwI":true,"paF5SD9doIP":true,"pMpqkSJNWV4":true,"pRTrXPy98OV":true,"pL1l-nP1gFm":true,"pAHFCZKSad-":true,"po4_bF-7HY4":true},"eD3xzRNBFt7":{"pP55UZD1AKn":true,"pL1l-nP1gFm":true,"pfseF5YtT2-":true,"pMpqkSJNWV4":true,"p-dA0FzdrkH":true,"p1mKvyvhNwr":true,"pq7D3f5RYQT":true,"pS_dsH3rqYj":true,"pAHFCZKSad-":true,"pNGvpS1wJwI":true,"p9icjeZY7sj":true,"pbxAANzu64Y":true,"ptw6zPewDEt":true,"pQmTgpmWNR2":true,"po4_bF-7HY4":true,"pG8MWAykFAZ":true,"p7kcbz71PS8":true,"peUo0kov8Vy":true,"pQ6GuzZehYG":true,"pEgswr3OKTa":true,"pxWrXQbpPDR":true,"pobWsLgGDGc":true,"pOUO-hZnuJM":true,"pRTrXPy98OV":true,"p6BuHCo98mQ":true,"pdcWFPKdXZE":true,"pcHzuNJYa41":true,"pN7ZIjANFwo":true,"paF5SD9doIP":true,"plTCL4Ic3LV":true,"pxpOyEIstNY":true,"p4Xp9x5Hdxh":true,"pDiVrdUnABS":true}}}],"pages":[{"key":"p-dA0FzdrkH","title":"Leadership & Management Column","desc":"Let’s talk metaverse — how are we going to anticipate the effects of the virtual world on the physical world, and in what ways are we not prepared?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg","path":"leadership--management-column"},{"key":"p1mKvyvhNwr","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds"},{"key":"p4Xp9x5Hdxh","title":"Education & Training Column","desc":"The risk of radicalization for private & public organizations is real & security leaders can mitigate some risk by evaluating processes & procedures.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LdEF7Aztox.jpg","path":"education--training-column"},{"key":"p6BuHCo98mQ","title":"AD-House Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sKkDBAkWBR.jpg","path":"ad-house-bookstore"},{"key":"p7kcbz71PS8","title":"De-escalation Strategies Feature","desc":"A key component of a comprehensive targeted workplace violence prevention plan is de-escalation and crisis management training. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2MddpCWGs5.jpg","path":"de-escalation-strategies-feature"},{"key":"p9icjeZY7sj","title":"AD-DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aS2gxV4cuu.jpg","path":"ad-dks"},{"key":"pAHFCZKSad-","title":"AD-House Refer A Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3SXQQ07PNN.png","path":"ad-house-refer-a-friend"},{"key":"pDiVrdUnABS","title":"AD-House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8PFVF-U-kT.png","path":"ad-house-most-influential"},{"key":"pEgswr3OKTa","title":"Recovered Content","cover":"https://cdn.vev.design/cover/SH-T5USlCM/pEgswr3OKTa/gd4d6_1200.jpg","path":"recovered-content"},{"key":"pG8MWAykFAZ","title":"AD-House SBS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Reh1Edo0wD.png","path":"ad-house-sbs"},{"key":"pIpzmGlTiKH","title":"eMagazine Help Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uNg-kDZ1n7.jpg","path":"emagazine-help-guide"},{"key":"pL1l-nP1gFm","title":"AD-House SEC 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2p5J_Muo2C.png","path":"ad-house-sec-500"},{"key":"pMpqkSJNWV4","title":"AD-House Brivo InfoCenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gXYInHHCoU.png","path":"ad-house-brivo-infocenter"},{"key":"pN7ZIjANFwo","title":"8 Tips Physical Security Feature","desc":"Implementing a physical security plan to protect your organization’s information systems requires strategic planning and assessment. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Hhe0r8Lmd6.jpg","path":"8-tips-physical-security-feature"},{"key":"pNGvpS1wJwI","title":"AD-House SEC Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QI8W1jM9aw.jpg","path":"ad-house-sec-renewal"},{"key":"pOUO-hZnuJM","title":"Product Spotlight","desc":"From security policy building to automated cybersecurity defense, Security magazine spotlights solutions from the 2022 RSA Conference.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GKIXf5-nbK.jpg","path":"product-spotlight"},{"key":"pOcd2ynanLN","title":"Security April 2022","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"","index":true},{"key":"pP55UZD1AKn","title":"Leader to Leader Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SSldkSKU9f.jpg","path":"leader-to-leader-column"},{"key":"pQ6GuzZehYG","title":"AD-Mission 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5kXB8RwVXP.jpg","path":"ad-mission-500"},{"key":"pQmTgpmWNR2","title":"Ad Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dosdsvdeB6.jpg","path":"ad-index"},{"key":"pRTrXPy98OV","title":"AD-Speco","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/n5dNBNCStI.png","path":"ad-speco"},{"key":"pS_dsH3rqYj","title":"AD-Axis","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TFRXNKwQCv.jpg","path":"ad-axis"},{"key":"paF5SD9doIP","title":"AD-House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_sFeskacJ.png","path":"ad-house-bnp-engage"},{"key":"pbxAANzu64Y","title":"Global News Department","desc":"Security magazine spotlights the latest evolutions in cybersecurity, from cyber workforce development to implementing zero trust.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vCQLucUSSG.jpg","path":"global-news-department"},{"key":"pcHzuNJYa41","title":"Higher Education Strategies Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WIQlDKrWwr.jpg","path":"higher-education-strategies-feature"},{"key":"pdcWFPKdXZE","title":"Career Intelligence Column","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QcMI41h6r6.jpg","path":"career-intelligence-column"},{"key":"peUo0kov8Vy","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds-control-command-ad"},{"key":"pfseF5YtT2-","title":"Cyber Tactics Column","desc":"Take a look at the BlackBerry 2022 Threat Report, which aims to allow security leaders to perform a thoughtful analysis shaping their security environment.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg","path":"cyber-tactics-column"},{"key":"plTCL4Ic3LV","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UrEP4Qamcz.png","path":"online-contents"},{"key":"po4_bF-7HY4","title":"AD-House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rjjn8dZ081.png","path":"ad-house-security-benchmark"},{"key":"pobWsLgGDGc","title":"Special Report Feature","desc":"A virtual GSOC can increase reach, productivity and operational efficiencies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"special-report-feature"},{"key":"pq7D3f5RYQT","title":"Security Talk Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kYkJSKm4ek.jpg","path":"security-talk-column"},{"key":"ptw6zPewDEt","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2UoAiSL8k4.jpg","path":"staff-listing"},{"key":"pxWrXQbpPDR","title":"AD-House eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZDlGE2wlJW.jpg","path":"ad-house-enewsletter"},{"key":"pxpOyEIstNY","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bDBwBZCxUm.jpg","path":"table-of-contents"}],"shapes":{},"images":{"K1ATuPru5E":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/K1ATuPru5E.svg","srcset":[]},"MP-cejsYH":{"meta":{"description":"Logo, Font, Text"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/500.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",2100]]},"NlVlR3oFdz":{"meta":{"width":2800,"description":"Visual effect lighting, Music artist, Performing arts, Blue, Entertainment, Purple, Organism, Gesture, Finger","height":1868,"photographer":"Thinkhubstudio / iStock / Getty Images Plus via Getty Images"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg",2560]]},"UgpKWyBpn6":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UgpKWyBpn6.svg","srcset":[]},"mDryoM81MQ":{"meta":{"height":400,"width":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"photographer":"","description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1br1l0lsu-u06":"pgxSSDpDPRe","rectangle":"basic","image":"basic","frame":"basic","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1cal72054-hh4":"pL-YXwgdPSb8","section":"basic","text":"basic","circle":"basic","w75y8u1c":"basic"},"menus":{"9WJ0p8Leab":{"children":[{"title":"DOWNLOAD ISSUE","link":{"mode":0},"key":"Lpne3xBspf"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"href":"https://www.securitymagazine.com/emagazine","mode":2,"target":true}},{"title":"HELP","link":{"mode":0},"key":"AIoU2R3TUb"}],"title":"Main menu","key":"9WJ0p8Leab"},"VKOOSIUEfw":{"title":"Cyber MENU","children":[{"link":{"mode":0},"key":"VQJnkJ6EyX","title":"Profile #1","children":[{"key":"tcqML0DoXh","link":{"mode":0},"title":"Profile #6"}]},{"title":"Profile #2","link":{"mode":0},"key":"b1sOrWTWb8"},{"key":"8X9x83O40O","children":[{"title":"Profile #4","key":"2ztDiDh787","link":{"mode":0}}],"link":{"mode":0},"title":"Profile #3"},{"key":"NKQCi5jV9M","link":{"mode":0},"children":[],"title":"Profile #5"}],"key":"VKOOSIUEfw"},"ZrlWNJlcNk":{"title":"Hamburger MENU","children":[{"title":"Security April 2022","key":"RaZEop8-Dr","link":{"page":"pOcd2ynanLN","mode":0}},{"link":{"page":"p9icjeZY7sj","mode":0},"title":"AD-DKS","key":"N-86NZaX-1"},{"key":"9YYosMA-ER","title":"Table of Contents","link":{"page":"pxpOyEIstNY","mode":0}},{"key":"VjjltqYOxw","link":{"mode":0,"page":"pRTrXPy98OV"},"title":"AD-Speco"},{"link":{"mode":0,"page":"plTCL4Ic3LV"},"title":"Online Contents","key":"pAyiJ8aI8_"},{"key":"zhBVDxThlD","title":"Security Talk Column","link":{"mode":0,"page":"pq7D3f5RYQT"}},{"key":"WNlo-7hCSq","link":{"mode":0,"page":"po4_bF-7HY4"},"title":"AD-Security Benchmark"},{"title":"Global News Department","key":"ODzLCpxDQC","link":{"mode":0,"page":"pbxAANzu64Y"}},{"key":"kYmuYlFnWp","link":{"mode":0,"page":"pobWsLgGDGc"},"title":"Special Report Feature"},{"title":"De-escalation Strategies Feature","key":"TRqNvC6Nl6","link":{"page":"p7kcbz71PS8","mode":0}},{"link":{"mode":0,"page":"pDiVrdUnABS"},"key":"l0M3qErriv","title":"AD-Most Influential"},{"key":"b6GNyhEc5U","title":"Higher Education Strategies Feature","link":{"mode":0,"page":"pcHzuNJYa41"}},{"title":"AD-Security 500","key":"57Re7VZrx5","link":{"page":"pL1l-nP1gFm","mode":0}},{"key":"fr4lOeyhb6","link":{"mode":0,"page":"pN7ZIjANFwo"},"title":"8 Tips Physical Security Feature"},{"link":{"mode":0,"page":"pAHFCZKSad-"},"title":"AD-Refer A Friend","key":"xr_IUX_boU"},{"title":"Leader to Leader Column","key":"FnlhwwMu2I","link":{"mode":0,"page":"pP55UZD1AKn"}},{"title":"AD-Mission 500","key":"iT3v3SbOW3","link":{"page":"pQ6GuzZehYG","mode":0}},{"title":"Career Intelligence Column","link":{"page":"pdcWFPKdXZE","mode":0},"key":"-1QvFrzLA5"},{"key":"Vs_Q_Wlu6K","title":"AD-SBS","link":{"page":"pG8MWAykFAZ","mode":0}},{"title":"AD-Brivo InfoCenter","link":{"mode":0,"page":"pMpqkSJNWV4"},"key":"SPxPOkbEFm"},{"link":{"page":"p-dA0FzdrkH","mode":0},"title":"Leadership & Management Column","key":"z8ilWfsfyY"},{"key":"vzaJC66b7b","title":"AD-SEC Renewal","link":{"mode":0,"page":"pNGvpS1wJwI"}},{"title":"Cyber Tactics Column","key":"-DxNSNhPcY","link":{"page":"pfseF5YtT2-","mode":0}},{"key":"G8-so6FjCc","title":"AD-eNewsletter","link":{"mode":0,"page":"pxWrXQbpPDR"}},{"title":"Education & Training Column","link":{"mode":0,"page":"p4Xp9x5Hdxh"},"key":"wunowOVFP4"},{"key":"OKaDPRC9Rz","title":"AD-Bookstore","link":{"page":"p6BuHCo98mQ","mode":0}},{"key":"HkwdEqB4H0","link":{"page":"pOUO-hZnuJM","mode":0},"title":"Product Spotlight"},{"title":"AD-BNP Engage","key":"xqMlZEVzuS","link":{"mode":0,"page":"paF5SD9doIP"}},{"link":{"mode":0,"page":"p1mKvyvhNwr"},"key":"RDK6Ol_Mri","title":"Classifieds"},{"title":"Ad Index","link":{"page":"pQmTgpmWNR2","mode":0},"key":"5X3eaCNk8E"},{"title":"AD-Axis","key":"nHsqXCAjKh","link":{"page":"pS_dsH3rqYj","mode":0}},{"title":"Staff Listing","link":{"page":"ptw6zPewDEt","mode":0},"key":"Srsue0-O6v"}],"key":"ZrlWNJlcNk"},"cBYCbks09X":{"title":"Side menu","children":[],"key":"cBYCbks09X"},"fSPzLGr8R5":{"children":[{"children":[],"key":"Lpne3xBspf","title":"DOWNLOAD ISSUE","link":{"href":"https://www.dropbox.com/s/ccidomw3jnudybe/SEC_April-2022_Full-Issue.pdf?dl=1","mode":2,"target":true}},{"key":"FpibzECdPl","link":{"target":true,"mode":2,"href":"https://www.securitymagazine.com/emagazine"},"title":"BACK ISSUES"},{"key":"AIoU2R3TUb","title":"HELP","link":{"mode":0,"page":"pIpzmGlTiKH"}}],"title":"dummy","key":"fSPzLGr8R5"},"k2khWr7AGS":{"children":[{"link":{"mode":0,"page":"pxpOyEIstNY"},"children":[],"title":"CONTENTS","key":"nstkKxEhBy"},{"link":{"mode":2},"key":"XqwLVZhe1R","title":"FEATURES","children":[{"link":{"mode":0,"page":"pobWsLgGDGc"},"title":"Special Report Feature","key":"K51wrkyIzR"},{"key":"PqhffTLIMR","link":{"page":"p7kcbz71PS8","mode":0},"title":"De-escalation Strategies"},{"title":"Higher Education Strategies","key":"QrTBPv5xbR","link":{"mode":0,"page":"pcHzuNJYa41"}},{"title":"8 Tips for Physical Security","key":"cr21ubKEjp","link":{"mode":0,"page":"pN7ZIjANFwo"}},{"link":{"mode":0,"page":"pOUO-hZnuJM"},"title":"Product Spotlight","key":"Hl1H4DidFc"}]},{"title":"COLUMNS","children":[{"link":{"page":"pq7D3f5RYQT","mode":0},"key":"GgZ-j8M6QK","title":"Security Talk"},{"key":"eOyIqoQ9jp","title":"Leader to Leader","link":{"mode":0,"page":"pP55UZD1AKn"}},{"title":"Career Intelligence","link":{"mode":0,"page":"pdcWFPKdXZE"},"key":"qrnhSNIXuY"},{"key":"ckI48V_8EP","title":"Leadership & Management","link":{"mode":0,"page":"p-dA0FzdrkH"}},{"key":"qrY2W-kirS","title":"Cyber Tactics","link":{"mode":0,"page":"pfseF5YtT2-"}},{"key":"cDiBzDVtYH","link":{"mode":0,"page":"p4Xp9x5Hdxh"},"title":"Education & Training"}],"link":{"mode":2},"key":"YA8VpnNiHa"},{"key":"QCL0eNn2SZ","children":[{"link":{"page":"pbxAANzu64Y","mode":0},"key":"TFis1X6OWv","title":"Global News & Analysis"},{"key":"OJfaz1aMe0","link":{"mode":0,"page":"plTCL4Ic3LV"},"title":"Online Contents"},{"key":"aJLVrzsMUw","title":"Classified Advertising","link":{"page":"p1mKvyvhNwr","mode":0}},{"link":{"mode":0,"page":"pQmTgpmWNR2"},"title":"Advertising Index","key":"V2jmK__mcr"},{"key":"HX1ar5_Bu-","link":{"page":"ptw6zPewDEt","mode":0},"title":"Staff Listing"}],"title":"DEPARTMENTS","link":{"mode":2}}],"title":"Main menu GOLD","key":"k2khWr7AGS"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"canvasSize":[1440,900],"columnWidth":[1024,1024],"mode":"desktop"},{"columnWidth":[600,600],"mode":"tablet","canvasSize":[768,1024]},{"canvasSize":[375,667],"columnWidth":[320,320],"mode":"mobile"}]}}