\u003c/p>"},"cl":"text pW2KkHRgsz","type":"text"},{"key":"exEJtj9amc-","cl":"section","type":"section","children":["een0q5-KY25"]},{"key":"eDhkVMCAC07","content":{"text":"\u003cp >\u003cstrong >By Adam Stone,\u003c/strong> Contributing Writer\u003c/p>"},"cl":"text pW2KkHRgsz","type":"text"},{"key":"etmaRgFa4yr","content":{"text":"\u003ch2 >By preparing security operations centers for remote connectivity, security leaders can increase reach, productivity and efficiency.\u003c/h2>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"eQ2-sfUbh-u","content":{"text":"\u003ch1 >How to Bring a Virtual GSOC to Life\u003c/h1>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"ep6mcfA9-OU","cl":"section","type":"section","children":["eDhkVMCAC07","etmaRgFa4yr","eQ2-sfUbh-u"]},{"key":"e_c1EgWbh-i","content":{"src":{"key":"AJJ_30iOfJ","src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg"}},"cl":"image","type":"image"},{"key":"eTZe1Bs78p7","content":{"text":"\u003cp >monsitj / iStock / Getty Images Plus / via Getty Images\u003c/p>"},"cl":"text pHfe1CCeee8","type":"text"},{"key":"en_StUs9OYZ","content":{"src":{"key":"tyZBAReCn7","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg","ratio":0.7512904739558892}},"cl":"image","type":"image"},{"key":"e44AUYGbFqZ","content":{"text":"\u003cp >Brett Wentworth, Senior Director of Global Security, Lumen Technologies. \u003cem >Image courtesy of Wentworth\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eqp4J_ljTHC","cl":"section","type":"section","children":["e_c1EgWbh-i","eTZe1Bs78p7","en_StUs9OYZ","e44AUYGbFqZ"]},{"key":"eJWJS8pHnaj","content":{"text":"\u003cp >At the beginning of the COVID-19 pandemic, Brett Wentworth learned the value of enabling remote access for security operations. As Senior Director of Global Security for Lumen Technologies, Wentworth oversees 170 employees at eight global security operations centers, supporting 4,000 managed security customers. “We transitioned to full remote at the start of the pandemic in March of 2020, and we haven’t really looked back since,” he says.\u003c/p>\u003cp >“When you think about a global security operations center [GSOC], normally you think about a room with people looking at screens and swivel-chairing to help each other with issues. Now we have had people all working from home for the better part of two years, and I’m happy to say that that transition was seamless,” Wentworth adds.\u003c/p>\u003cp >Like Wentworth, many security professionals and teams have learned that, given the nature of a GSOC’s work, virtual access not only has benefits — it also makes sense. Traditionally, the GSOC is thought of as a physical space, but recent events have helped security professionals to see the value in remote security teams. With the right tools and some thoughtful planning, it’s possible to deploy a “virtual” GSOC, delivering security effectively from anywhere at any time.\u003c/p>\u003cp >“In 2019, we opened the doors to the GSOC as a completely physical team,” says Robert Gummer, the National Football League (NFL)’s Director of Intelligence Operations. “Then, in March 2020, everyone was sent home,” he says.\u003c/p>\u003cp >Fortunately, before the pandemic, Gummer had already designed the GSOC and security operations to function remotely. Even as the situation on the ground became more perilous, the team was able to deliver. “In May and June 2020, when all the civil unrest broke out across the United States, we had our entire team supporting that effort from home,” Gummer says. “They were giving situational awareness to our clubs and our stadium partners across the country, all from their homes.”\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"e5bPvKCtYcb","cl":"section","type":"section","children":["eJWJS8pHnaj"]},{"key":"ePnUuZk-w6G","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg","key":"e_nF32OOm4","ratio":0.7037037037037037}},"cl":"image","type":"image"},{"key":"egQ8a8xbDu3","content":{"src":{"ratio":0.7027663331371395,"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg","key":"jsfF5zOB2N"}},"cl":"image","type":"image"},{"key":"ej3yVRanxdV","content":{"src":{"key":"nibU0HeoyL","ratio":1.0033444816053512,"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nibU0HeoyL.png"}},"cl":"image","type":"image"},{"key":"eLa3rdAMB0l","content":{"src":{"ratio":1.1952191235059761,"key":"bQEzKncVue","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bQEzKncVue.jpg"}},"cl":"image","type":"image"},{"key":"eoKWqlYAegz","content":{"text":"\u003cp >Brett Wentworth, Senior Director of Global Security, Lumen Technologies. \u003cem >Image courtesy of Wentworth\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eo1YPYKkFFb","content":{"text":"\u003cp >Dennis Hackney, Head of Industrial Cybersecurity Services, ABS Group. \u003cem >Image courtesy of Hackney\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eArLXHS_x8g","content":{"text":"\u003cp >John Dummett, Senior Project Manager, Guidepost Solutions. \u003cem >Image courtesy of Dummett\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"e8MMgjLm9Lz","content":{"text":"\u003cp >Robert Gummer, Director of Intelligence Operations, NFL. \u003cem >Image courtesy of Gummer\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"e1j5i_ZhRC0","cl":"section","type":"section","children":["ePnUuZk-w6G","egQ8a8xbDu3","ej3yVRanxdV","eLa3rdAMB0l","eoKWqlYAegz","eo1YPYKkFFb","eArLXHS_x8g","e8MMgjLm9Lz"]},{"key":"eWvGg4olc-1","content":{"text":"\u003cp >advertisement\u003c/p>"},"cl":"text","type":"text"},{"key":"e73P_MEbsUM","cl":"section","type":"section","children":["eWvGg4olc-1"]},{"key":"e8y2N9J4d1G","content":{"ioDetailID":"508188","advertiserName":"Everywhere","adSize":"1/2 Horizontal","adCreative":{"key":"hlwspwUbQe","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg"},"linkUrl":"https://everywherecomms.com"},"cl":"wTnDfofkley","type":"wTnDfofkley"},{"key":"et-N5rd-9Jw","content":{"text":"\u003cp >advertisement\u003c/p>"},"cl":"text","type":"text"},{"key":"e0Uj4HGFRru","cl":"section","type":"section","children":["et-N5rd-9Jw"]},{"key":"e1GWt_HtqGu","content":{"text":"\u003ch4 >Why Remote?\u003c/h4>\u003cp >Gummer says that the idea behind remote access for security operations is continuity regardless of circumstances. \u003c/p>\u003cp >“Bottom line, you don’t know when your facility could be shut down. If you cannot operate outside of that facility, then you are non-mission capable; you can’t support the mission or bring value,” Gummer says. “For us, that means the entire team requires some level of remote access to operate in the same capacity as they would in the physical space.”\u003c/p>\u003cp >Remote access makes his team more responsive. “An issue can happen at any time. You get a call late at night, and you need to be able to respond in real time. You can’t do that if you’re transiting 30 minutes to an hour into an office environment,” he says. “You have to be able to access your tools and capabilities from wherever you’re operating.”\u003c/p>\u003ch4 >Tools and Strategies\u003c/h4>\u003cp >So, how can organizations ensure that their GSOC is equipped to handle remote operations? Experts say it takes a combination of technology investments and thoughtful strategic planning — and communication is key to making it all work, particularly as analysts need to share and discuss information constantly.\u003c/p>\u003cp >Analysts, operators and other stakeholders need ready access not just to each other, but also to the data feeds that are the heart of the GSOC value proposition. Therefore, in planning for a virtual GSOC, security leaders need to think about how security staff and others will access that information.\u003c/p>\u003cp >Wentworth, for example, enables direct access to all the GSOC’s operational elements for those working remotely. “We connect to our tools via two-factor authentication and remote access VPN. From there, we are able to fire up all of the standard tools that somebody would have within the SOC environment, tools such as a security information and event management [SIEM] system to look at alarms for any security events,” he says.\u003c/p>\u003cp >“People can also access the ticketing system, which is very important for any operational team that’s customer-supporting,” Gummer says. “The ability to VPN into the network and have virtual access to all those tools has really helped us.”\u003c/p>\u003cp >In terms of strategy, developing a virtual GSOC requires some added consideration beyond what goes into building a physical operation.\u003c/p>\u003cp >“Building a SOC with remote work in mind has to start with a cost and benefits analysis,” says John Dummett, Senior Project Manager at security consultancy Guidepost Solutions. Security leaders should ask themselves if there is a benefit to having remote employees. If the answer is yes, “then there is a decided business case for remote or mobile capability, and the practical considerations should be reviewed,” he says.\u003c/p>\u003cp >Once security organizations have made a business case for remote operations, “the baseline consideration becomes, ‘How can we duplicate the platform centralization monitoring capabilities and communications capabilities seen in a traditional SOC into a virtual environment, and how can we manage a remote staff enacting those functions?’” Dummett says.\u003c/p>\u003cp >To connect those dots, organizations must then drill down further by considering the platforms already in use for intelligence and security operations. It’s important to understand what resources will be needed to support remote access to any platform, as this will offer insight into how to organize virtual access cost effectively.\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"ejO0F62d45h","cl":"section","type":"section","children":["e1GWt_HtqGu"]},{"key":"eAxxdl3ybUo","content":{"cont":{"mobile":{"params":{"trigger":"Load","updated":1638456539214,"LoadAnimation":{"easing":"easeOutQuart","duration":1.5,"opacity":[0,1],"translateY":["150px","0"],"delay":0,"preset":"slide"}}},"desktop":{"params":{"LoadAnimation":{"delay":0,"translateY":["150px","0"],"easing":"easeOutQuart","preset":"slide","opacity":[0,1],"duration":1.5},"updated":1638456539214,"trigger":"Load"}},"tablet":{"params":{"LoadAnimation":{"duration":1.5,"delay":0,"preset":"slide","translateY":["150px","0"],"easing":"easeOutQuart","opacity":[0,1]},"updated":1638456539214,"trigger":"Load"}}}},"cl":"w75y8u1c","type":"w75y8u1c"},{"key":"ejDE5sGJZlN","content":{"text":"\u003ch2 >When planning for virtual operations, security leaders need to think about how people will access all the information that is at the heart of the GSOC value proposition.\u003c/h2>"},"cl":"text pu24NM9FEqw","type":"text","actions":["eAxxdl3ybUo"]},{"key":"ek6gaJAVAPA","cl":"section","type":"section","children":["ejDE5sGJZlN"]},{"key":"eK8YKzXH6HV","content":{"text":"\u003cp >“For example, live viewing of many video surveillance streams is both computing-hardware intensive and bandwidth intensive,” Dummett says. “Enabling these functions to operate optimally requires hardware that is capable of decoding high-resolution streams effectively and quickly, as well as distributing those in a low bandwidth manner.”\u003c/p>\u003cp >By comparison, monitoring functions that are primarily alarm-related are not as resource-intensive and require less technology to support virtualization, according to Dummett. \u003c/p>\u003cp >Aside from ensuring operational platforms can be accessed remotely, security leaders need to think about the actual tools that bring remote connectivity to life.\u003c/p>\u003cp >“Perhaps the most important is a robust KVM — keyboard, video and mouse — over IP solution to transport all GSOC control, video and audio content across a wide area network securely, reliably and with limited latency,” Dummett says.\u003c/p>\u003cp >At cybersecurity consultancy ABS Group, the Head of Industrial Cybersecurity Services Development Dennis Hackney points to other key hardware needs, such as laptops, mobile devices, virtual private network (VPN) routers, monitors, printers and other technologies necessary for analysts and security staff to perform their core functions.\u003c/p>\u003cp >For security reasons, he says, all equipment should be company-owned. “I do not recommend employing a bring your own device policy. All remote working devices should be company provided and controlled,” he says.\u003c/p>\u003cp >And then, with all of the data coming into a SOC, data storage and management is a prime consideration for any organization considering remote accessibility. At the NFL, for example, Gummer leverages the robust computer and storage capabilities of the cloud to ensure data is readily available. “Our video analytics and camera systems are up in AWS [Amazon’s cloud service],” he says. \u003c/p>\u003cp >Of course, in any GSOC, remote or on-premise, consolidated viewing of data is critical for efficiency and intelligence — particularly if GSOC operators view and act on data from remote locations. In Gummer’s case, this means that team members can use their individual logins, protected by two-factor authentication, to connect to a range of GSOC capabilities in an easy-to-access format. To that end, Gummer has implemented a “virtual command center” solution that allows team members to collate the data they receive. \u003c/p>\u003cp >“It’s a dashboard that reports all our data holdings, subsequently increasing the value of each platform,” he says. “That means that when an incident happens, not only is it populated in our incident management system, but you can also see it on the map. All of our alerts, even our emergency notification system — we have one place to see where everything’s transpiring.”\u003c/p>\u003ch4 >Staying Connected\u003c/h4>\u003cp >Some security professionals hesitate about the operational impact of transferring a GSOC to a remote environment. Security monitoring is a team sport, and for those used to being in physical proximity, the idea of working from disparate sites may be worrisome.\u003c/p>\u003cp >Security leaders who have made the transition say that a thoughtful approach to communications can help alleviate those concerns. “Without good communication, things fall apart,” Wentworth says. “We have been using Microsoft Teams to help facilitate this large, geographically diverse set of people working in different states, on different continents. You need something that incorporates a group chat feature, instant messaging, phone integration, document sharing, all of those things combined into one platform.”\u003c/p>\u003cp >Wentworth says that the operations team checks in frequently via team meetings, instant messages and one-on-one audio or video calls. These are all critical tools in a remote environment to validate that the front lines are consistent in their approach, he says. \u003c/p>\u003cp >In addition to communications tools, scheduling is also a critical component of a remote GSOC scenario. Wentworth overlaps shift handoffs to ensure people are coordinating with one another. “Right now, we’re running six 10-hour shifts to maintain 24/7 coverage, which allows for two hours of overlap between the shifts. That gives you the time you need to say: This was the major event that happened, we need you to carry it forward. That happens three times a day, every day,” he says.\u003c/p>\u003cp >Gummer says that just as important as emphasizing communication among staff is emphasizing communication and collaboration between the GSOC and its third-party vendors.\u003c/p>\u003cp >“We meet almost weekly with most of our vendors, talking through requirements, talking with them about our expectations and issues that we’re identifying,” Gummer says. “Having partners who are open to collaboration with others is critical.”\u003c/p>\u003cp >And, when all is said and done, an emphasis on training, leveraging mentorships and side-by-side work opportunities (even virtual) are important to ensure those working from outside the physical GSOC are prepared to fulfill their roles. In other words, a heavy focus on the human element is the ultimate key to success.\u003c/p>\u003cp >“The biggest thing underneath it all is to have trust in your staff and have good communication strategies,” Gummer says. “If you don’t have those two things in place, everything else falls apart. That’s true when they’re in a physical space, and it’s true in the virtual space as well.”\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"eYes-oZbnf2","cl":"section","type":"section","children":["eK8YKzXH6HV"]},{"key":"eU8MIDkg7nb","cl":"section","type":"section"},{"key":"e1M50hP1BRZ","content":{"text":"\u003cp >april 2022\u003c/p>"},"cl":"text","type":"text"},{"key":"e6Pl6dd9kyl","content":{"menu":"cBYCbks09X"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"edlbb7LN7I9","content":{"menu":"fSPzLGr8R5"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"e4d11-bU5tO","cl":"section","type":"section","children":["e1M50hP1BRZ","e6Pl6dd9kyl","edlbb7LN7I9"]},{"key":"esUkxLIGUu-","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"eH2asCiwvSC","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"emu-z9ndMai","content":{"link":{"href":"https://www.securitymagazine.com/","target":true,"mode":2}},"cl":"external-link","type":"external-link"},{"key":"eBbpe6F_Z7H","content":{"src":"MP-cejsYH"},"cl":"image","type":"image","actions":["esUkxLIGUu-","eH2asCiwvSC","emu-z9ndMai"]},{"key":"euzoTKsqwNE","content":{"text":"\u003cp >\u003ca href=\"https://www.securitymagazine.com/\" target=\"_blank\" rel=\"noopener external\">securitymagazine.com\u003c/a>\u003c/p>\u003cp >\u003cbr>\u003c/p>\u003cp >\u003cbr>\u003c/p>"},"cl":"text","type":"text"},{"key":"eF0DTVBYyyM","cl":"section","type":"section","children":["eBbpe6F_Z7H","euzoTKsqwNE"]},{"key":"pobWsLgGDGc","children":["eNENGuDWuLw","eTWV0Z-C_qp","exEJtj9amc-","ep6mcfA9-OU","eqp4J_ljTHC","e5bPvKCtYcb","e1j5i_ZhRC0","e73P_MEbsUM","e8y2N9J4d1G","e0Uj4HGFRru","ejO0F62d45h","ek6gaJAVAPA","eYes-oZbnf2","eU8MIDkg7nb","e4d11-bU5tO","eF0DTVBYyyM"]},{"key":"eMwXF9dx0lO","content":{"prevText":" Previous","nextText":"Next ","menu":"ZrlWNJlcNk"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"eD3xzRNBFt7","content":{"prevText":" Previous","nextText":"Next ","menu":"ZrlWNJlcNk"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"ezBYUsf4Qm0","content":{"pageMenu":"ZrlWNJlcNk"},"cl":"w1br1l0lsu-u06","type":"w1br1l0lsu-u06","icons":{"menu":[448,512,"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"]}},{"key":"elZuqflEGaS","cl":"rectangle","type":"rectangle"},{"key":"egZ1Snjzeq5","content":{"src":"K1ATuPru5E"},"cl":"image","type":"image"},{"key":"eGGXGu5QAwG","cl":"frame","type":"frame","children":["elZuqflEGaS","egZ1Snjzeq5"]},{"key":"eET-By2fIMv","content":{"link":{"mode":0,"page":"p_z9bq2togs"}},"cl":"external-link","type":"external-link"},{"key":"eRu7UIi2cEC","cl":"frame","type":"frame","children":["eGGXGu5QAwG"],"actions":["eET-By2fIMv"]},{"key":"fixed","children":["eMwXF9dx0lO","eD3xzRNBFt7","ezBYUsf4Qm0","eRu7UIi2cEC"],"visibility":{"eMwXF9dx0lO":{"pOcd2ynanLN":true},"eD3xzRNBFt7":{"pS_dsH3rqYj":true,"p9icjeZY7sj":true,"pbxAANzu64Y":true,"po4_bF-7HY4":true,"p6BuHCo98mQ":true,"p1mKvyvhNwr":true,"ptw6zPewDEt":true,"pN7ZIjANFwo":true,"p7kcbz71PS8":true,"pEgswr3OKTa":true,"pOUO-hZnuJM":true,"pcHzuNJYa41":true,"pRTrXPy98OV":true,"pP55UZD1AKn":true,"peUo0kov8Vy":true,"pxWrXQbpPDR":true,"pfseF5YtT2-":true,"pdcWFPKdXZE":true,"pxpOyEIstNY":true,"pG8MWAykFAZ":true,"p4Xp9x5Hdxh":true,"pq7D3f5RYQT":true,"pMpqkSJNWV4":true,"pAHFCZKSad-":true,"pDiVrdUnABS":true,"pQmTgpmWNR2":true,"pNGvpS1wJwI":true,"pobWsLgGDGc":true,"p-dA0FzdrkH":true,"paF5SD9doIP":true,"plTCL4Ic3LV":true,"pL1l-nP1gFm":true,"pQ6GuzZehYG":true},"eRu7UIi2cEC":{"p9icjeZY7sj":true,"pS_dsH3rqYj":true,"pxWrXQbpPDR":true,"pNGvpS1wJwI":true,"pAHFCZKSad-":true,"pG8MWAykFAZ":true,"pMpqkSJNWV4":true,"po4_bF-7HY4":true,"pQ6GuzZehYG":true,"pRTrXPy98OV":true,"pDiVrdUnABS":true,"p6BuHCo98mQ":true,"pL1l-nP1gFm":true,"paF5SD9doIP":true},"ezBYUsf4Qm0":{"pG8MWAykFAZ":true,"pL1l-nP1gFm":true,"pQ6GuzZehYG":true,"pRTrXPy98OV":true,"pDiVrdUnABS":true,"pxWrXQbpPDR":true,"paF5SD9doIP":true,"p6BuHCo98mQ":true,"pAHFCZKSad-":true,"pMpqkSJNWV4":true,"p9icjeZY7sj":true,"pS_dsH3rqYj":true,"pNGvpS1wJwI":true,"po4_bF-7HY4":true}}}],"pages":[{"key":"p-dA0FzdrkH","title":"Leadership & Management Column","desc":"Let’s talk metaverse — how are we going to anticipate the effects of the virtual world on the physical world, and in what ways are we not prepared?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NlVlR3oFdz.jpg","path":"leadership--management-column"},{"key":"p1mKvyvhNwr","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds"},{"key":"p4Xp9x5Hdxh","title":"Education & Training Column","desc":"The risk of radicalization for private & public organizations is real & security leaders can mitigate some risk by evaluating processes & procedures.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LdEF7Aztox.jpg","path":"education--training-column"},{"key":"p6BuHCo98mQ","title":"AD-House Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sKkDBAkWBR.jpg","path":"ad-house-bookstore"},{"key":"p7kcbz71PS8","title":"De-escalation Strategies Feature","desc":"A key component of a comprehensive targeted workplace violence prevention plan is de-escalation and crisis management training. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2MddpCWGs5.jpg","path":"de-escalation-strategies-feature"},{"key":"p9icjeZY7sj","title":"AD-DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aS2gxV4cuu.jpg","path":"ad-dks"},{"key":"pAHFCZKSad-","title":"AD-House Refer A Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3SXQQ07PNN.png","path":"ad-house-refer-a-friend"},{"key":"pDiVrdUnABS","title":"AD-House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8PFVF-U-kT.png","path":"ad-house-most-influential"},{"key":"pEgswr3OKTa","title":"Recovered Content","cover":"https://cdn.vev.design/cover/SH-T5USlCM/pEgswr3OKTa/gd4d6_1200.jpg","path":"recovered-content"},{"key":"pG8MWAykFAZ","title":"AD-House SBS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Reh1Edo0wD.png","path":"ad-house-sbs"},{"key":"pIpzmGlTiKH","title":"eMagazine Help Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uNg-kDZ1n7.jpg","path":"emagazine-help-guide"},{"key":"pL1l-nP1gFm","title":"AD-House SEC 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2p5J_Muo2C.png","path":"ad-house-sec-500"},{"key":"pMpqkSJNWV4","title":"AD-House Brivo InfoCenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gXYInHHCoU.png","path":"ad-house-brivo-infocenter"},{"key":"pN7ZIjANFwo","title":"8 Tips Physical Security Feature","desc":"Implementing a physical security plan to protect your organization’s information systems requires strategic planning and assessment. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Hhe0r8Lmd6.jpg","path":"8-tips-physical-security-feature"},{"key":"pNGvpS1wJwI","title":"AD-House SEC Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QI8W1jM9aw.jpg","path":"ad-house-sec-renewal"},{"key":"pOUO-hZnuJM","title":"Product Spotlight","desc":"From security policy building to automated cybersecurity defense, Security magazine spotlights solutions from the 2022 RSA Conference.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GKIXf5-nbK.jpg","path":"product-spotlight"},{"key":"pOcd2ynanLN","title":"Security April 2022","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"","index":true},{"key":"pP55UZD1AKn","title":"Leader to Leader Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SSldkSKU9f.jpg","path":"leader-to-leader-column"},{"key":"pQ6GuzZehYG","title":"AD-Mission 500","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5kXB8RwVXP.jpg","path":"ad-mission-500"},{"key":"pQmTgpmWNR2","title":"Ad Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dosdsvdeB6.jpg","path":"ad-index"},{"key":"pRTrXPy98OV","title":"AD-Speco","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/n5dNBNCStI.png","path":"ad-speco"},{"key":"pS_dsH3rqYj","title":"AD-Axis","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TFRXNKwQCv.jpg","path":"ad-axis"},{"key":"paF5SD9doIP","title":"AD-House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_sFeskacJ.png","path":"ad-house-bnp-engage"},{"key":"pbxAANzu64Y","title":"Global News Department","desc":"Security magazine spotlights the latest evolutions in cybersecurity, from cyber workforce development to implementing zero trust.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vCQLucUSSG.jpg","path":"global-news-department"},{"key":"pcHzuNJYa41","title":"Higher Education Strategies Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WIQlDKrWwr.jpg","path":"higher-education-strategies-feature"},{"key":"pdcWFPKdXZE","title":"Career Intelligence Column","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QcMI41h6r6.jpg","path":"career-intelligence-column"},{"key":"peUo0kov8Vy","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/glrAPfYIPx.jpg","path":"classifieds-control-command-ad"},{"key":"pfseF5YtT2-","title":"Cyber Tactics Column","desc":"Take a look at the BlackBerry 2022 Threat Report, which aims to allow security leaders to perform a thoughtful analysis shaping their security environment.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nUb_a-kw8b.jpg","path":"cyber-tactics-column"},{"key":"plTCL4Ic3LV","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UrEP4Qamcz.png","path":"online-contents"},{"key":"po4_bF-7HY4","title":"AD-House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rjjn8dZ081.png","path":"ad-house-security-benchmark"},{"key":"pobWsLgGDGc","title":"Special Report Feature","desc":"A virtual GSOC can increase reach, productivity and operational efficiencies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","path":"special-report-feature"},{"key":"pq7D3f5RYQT","title":"Security Talk Column","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kYkJSKm4ek.jpg","path":"security-talk-column"},{"key":"ptw6zPewDEt","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2UoAiSL8k4.jpg","path":"staff-listing"},{"key":"pxWrXQbpPDR","title":"AD-House eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZDlGE2wlJW.jpg","path":"ad-house-enewsletter"},{"key":"pxpOyEIstNY","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bDBwBZCxUm.jpg","path":"table-of-contents"}],"shapes":{},"images":{"AJJ_30iOfJ":{"meta":{"height":4800,"description":"Blue, Organism, Electricity","photographer":" monsitj / iStock / Getty Images Plus / via Getty Images","width":6500},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AJJ_30iOfJ.jpg",2560]]},"K1ATuPru5E":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/K1ATuPru5E.svg","srcset":[]},"MP-cejsYH":{"meta":{"description":"Logo, Font, Text"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/500.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",2100]]},"bQEzKncVue":{"meta":{"width":600,"height":502,"photographer":"mage courtesy of Wentworth","description":"Wentworth"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bQEzKncVue.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bQEzKncVue.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bQEzKncVue.jpg",600]]},"e_nF32OOm4":{"meta":{"height":1431,"width":1007,"photographer":"Image courtesy of Gummer","description":"Gummer"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/e_nF32OOm4.jpg",1431]]},"hlwspwUbQe":{"meta":{"width":1100,"description":"Portable communications device, Tablet computer, Map, Font","height":700},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hlwspwUbQe.jpg",1100]]},"jsfF5zOB2N":{"meta":{"width":8358,"photographer":"Image courtesy of Dummett","height":11893,"description":"John Dummett"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jsfF5zOB2N.jpg",2560]]},"nibU0HeoyL":{"meta":{"description":"Dennis Hackney","width":600,"height":598,"photographer":"Image courtesy of Hackney"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nibU0HeoyL.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nibU0HeoyL.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nibU0HeoyL.png",600]]},"tyZBAReCn7":{"meta":{"photographer":"Photo courtesy Brett Wentworth ","width":3202,"height":4262,"description":"Brett Wentworth "},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tyZBAReCn7.jpg",2560]]},"vNWK15VOrT":{"meta":{"photographer":"","width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1br1l0lsu-u06":"pgxSSDpDPRe","rectangle":"basic","image":"basic","frame":"basic","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1cal72054-hh4":"pL-YXwgdPSb8","section":"basic","text":"basic","w75y8u1c":"basic","wTnDfofkley":"XbbrSxSJp"},"menus":{"9WJ0p8Leab":{"children":[{"link":{"mode":0},"title":"DOWNLOAD ISSUE","key":"Lpne3xBspf"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"target":true,"href":"https://www.securitymagazine.com/emagazine","mode":2}},{"title":"HELP","link":{"mode":0},"key":"AIoU2R3TUb"}],"title":"Main menu","key":"9WJ0p8Leab"},"VKOOSIUEfw":{"title":"Cyber MENU","children":[{"title":"Profile #1","children":[{"key":"tcqML0DoXh","title":"Profile #6","link":{"mode":0}}],"key":"VQJnkJ6EyX","link":{"mode":0}},{"title":"Profile #2","key":"b1sOrWTWb8","link":{"mode":0}},{"link":{"mode":0},"title":"Profile #3","children":[{"title":"Profile #4","key":"2ztDiDh787","link":{"mode":0}}],"key":"8X9x83O40O"},{"children":[],"link":{"mode":0},"key":"NKQCi5jV9M","title":"Profile #5"}],"key":"VKOOSIUEfw"},"ZrlWNJlcNk":{"title":"Hamburger MENU","children":[{"title":"Security April 2022","key":"RaZEop8-Dr","link":{"page":"pOcd2ynanLN","mode":0}},{"key":"N-86NZaX-1","link":{"mode":0,"page":"p9icjeZY7sj"},"title":"AD-DKS"},{"key":"9YYosMA-ER","link":{"mode":0,"page":"pxpOyEIstNY"},"title":"Table of Contents"},{"title":"AD-Speco","key":"VjjltqYOxw","link":{"page":"pRTrXPy98OV","mode":0}},{"key":"pAyiJ8aI8_","title":"Online Contents","link":{"page":"plTCL4Ic3LV","mode":0}},{"title":"Security Talk Column","key":"zhBVDxThlD","link":{"mode":0,"page":"pq7D3f5RYQT"}},{"title":"AD-Security Benchmark","key":"WNlo-7hCSq","link":{"page":"po4_bF-7HY4","mode":0}},{"title":"Global News Department","link":{"mode":0,"page":"pbxAANzu64Y"},"key":"ODzLCpxDQC"},{"link":{"page":"pobWsLgGDGc","mode":0},"key":"kYmuYlFnWp","title":"Special Report Feature"},{"link":{"page":"p7kcbz71PS8","mode":0},"title":"De-escalation Strategies Feature","key":"TRqNvC6Nl6"},{"title":"AD-Most Influential","link":{"page":"pDiVrdUnABS","mode":0},"key":"l0M3qErriv"},{"title":"Higher Education Strategies Feature","key":"b6GNyhEc5U","link":{"page":"pcHzuNJYa41","mode":0}},{"title":"AD-Security 500","link":{"mode":0,"page":"pL1l-nP1gFm"},"key":"57Re7VZrx5"},{"title":"8 Tips Physical Security Feature","link":{"mode":0,"page":"pN7ZIjANFwo"},"key":"fr4lOeyhb6"},{"key":"xr_IUX_boU","title":"AD-Refer A Friend","link":{"mode":0,"page":"pAHFCZKSad-"}},{"key":"FnlhwwMu2I","title":"Leader to Leader Column","link":{"mode":0,"page":"pP55UZD1AKn"}},{"key":"iT3v3SbOW3","title":"AD-Mission 500","link":{"page":"pQ6GuzZehYG","mode":0}},{"title":"Career Intelligence Column","link":{"page":"pdcWFPKdXZE","mode":0},"key":"-1QvFrzLA5"},{"title":"AD-SBS","key":"Vs_Q_Wlu6K","link":{"page":"pG8MWAykFAZ","mode":0}},{"key":"SPxPOkbEFm","link":{"mode":0,"page":"pMpqkSJNWV4"},"title":"AD-Brivo InfoCenter"},{"key":"z8ilWfsfyY","link":{"page":"p-dA0FzdrkH","mode":0},"title":"Leadership & Management Column"},{"title":"AD-SEC Renewal","key":"vzaJC66b7b","link":{"page":"pNGvpS1wJwI","mode":0}},{"key":"-DxNSNhPcY","link":{"page":"pfseF5YtT2-","mode":0},"title":"Cyber Tactics Column"},{"link":{"page":"pxWrXQbpPDR","mode":0},"title":"AD-eNewsletter","key":"G8-so6FjCc"},{"link":{"page":"p4Xp9x5Hdxh","mode":0},"key":"wunowOVFP4","title":"Education & Training Column"},{"link":{"page":"p6BuHCo98mQ","mode":0},"title":"AD-Bookstore","key":"OKaDPRC9Rz"},{"link":{"page":"pOUO-hZnuJM","mode":0},"title":"Product Spotlight","key":"HkwdEqB4H0"},{"title":"AD-BNP Engage","key":"xqMlZEVzuS","link":{"page":"paF5SD9doIP","mode":0}},{"key":"RDK6Ol_Mri","link":{"page":"p1mKvyvhNwr","mode":0},"title":"Classifieds"},{"title":"Ad Index","link":{"mode":0,"page":"pQmTgpmWNR2"},"key":"5X3eaCNk8E"},{"link":{"mode":0,"page":"pS_dsH3rqYj"},"title":"AD-Axis","key":"nHsqXCAjKh"},{"key":"Srsue0-O6v","link":{"mode":0,"page":"ptw6zPewDEt"},"title":"Staff Listing"}],"key":"ZrlWNJlcNk"},"cBYCbks09X":{"title":"Side menu","children":[],"key":"cBYCbks09X"},"fSPzLGr8R5":{"children":[{"link":{"href":"https://www.dropbox.com/s/ccidomw3jnudybe/SEC_April-2022_Full-Issue.pdf?dl=1","mode":2,"target":true},"children":[],"key":"Lpne3xBspf","title":"DOWNLOAD ISSUE"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"mode":2,"target":true,"href":"https://www.securitymagazine.com/emagazine"}},{"key":"AIoU2R3TUb","link":{"mode":0,"page":"pIpzmGlTiKH"},"title":"HELP"}],"title":"dummy","key":"fSPzLGr8R5"},"k2khWr7AGS":{"children":[{"title":"CONTENTS","link":{"mode":0,"page":"pxpOyEIstNY"},"key":"nstkKxEhBy","children":[]},{"children":[{"key":"K51wrkyIzR","link":{"page":"pobWsLgGDGc","mode":0},"title":"Special Report Feature"},{"title":"De-escalation Strategies","key":"PqhffTLIMR","link":{"mode":0,"page":"p7kcbz71PS8"}},{"link":{"page":"pcHzuNJYa41","mode":0},"key":"QrTBPv5xbR","title":"Higher Education Strategies"},{"link":{"page":"pN7ZIjANFwo","mode":0},"key":"cr21ubKEjp","title":"8 Tips for Physical Security"},{"title":"Product Spotlight","link":{"mode":0,"page":"pOUO-hZnuJM"},"key":"Hl1H4DidFc"}],"title":"FEATURES","key":"XqwLVZhe1R","link":{"mode":2}},{"children":[{"title":"Security Talk","link":{"page":"pq7D3f5RYQT","mode":0},"key":"GgZ-j8M6QK"},{"title":"Leader to Leader","key":"eOyIqoQ9jp","link":{"page":"pP55UZD1AKn","mode":0}},{"key":"qrnhSNIXuY","title":"Career Intelligence","link":{"mode":0,"page":"pdcWFPKdXZE"}},{"link":{"page":"p-dA0FzdrkH","mode":0},"title":"Leadership & Management","key":"ckI48V_8EP"},{"key":"qrY2W-kirS","link":{"page":"pfseF5YtT2-","mode":0},"title":"Cyber Tactics"},{"key":"cDiBzDVtYH","link":{"page":"p4Xp9x5Hdxh","mode":0},"title":"Education & Training"}],"key":"YA8VpnNiHa","title":"COLUMNS","link":{"mode":2}},{"link":{"mode":2},"children":[{"key":"TFis1X6OWv","title":"Global News & Analysis","link":{"mode":0,"page":"pbxAANzu64Y"}},{"title":"Online Contents","link":{"mode":0,"page":"plTCL4Ic3LV"},"key":"OJfaz1aMe0"},{"link":{"mode":0,"page":"p1mKvyvhNwr"},"key":"aJLVrzsMUw","title":"Classified Advertising"},{"title":"Advertising Index","link":{"mode":0,"page":"pQmTgpmWNR2"},"key":"V2jmK__mcr"},{"key":"HX1ar5_Bu-","link":{"mode":0,"page":"ptw6zPewDEt"},"title":"Staff Listing"}],"key":"QCL0eNn2SZ","title":"DEPARTMENTS"}],"title":"Main menu GOLD","key":"k2khWr7AGS"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","canvasSize":[1440,900],"columnWidth":[1024,1024]},{"mode":"tablet","columnWidth":[600,600],"canvasSize":[768,1024]},{"columnWidth":[320,320],"mode":"mobile","canvasSize":[375,667]}]}}