\u003c/strong>Contributing Writer\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eMuBfNf0tpB","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg","key":"xV2-3pD3WU"}},"type":"image","cl":"image"},{"key":"eN0hppILxnw","content":{"text":"\u003ch1 >Tips for Crafting a Comprehensive Risk Assessment\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ejMsUlNmDy0","content":{"text":"\u003ch2 >A successful risk assessment isn’t a one-size-fits all approach. \u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ehLas87eGA1","type":"section","children":["eyr3X5BOTsn","eMuBfNf0tpB","eN0hppILxnw","ejMsUlNmDy0"],"cl":"section"},{"key":"eQ8bH0brpmW","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg","key":"2EUzJ_ZWjp"}},"type":"image","cl":"image"},{"key":"en4Jlf_7aWi","content":{"text":"\u003cp >\u003cem >gorodenkoff / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"e2hgTBHj2sl","type":"section","children":["eQ8bH0brpmW","en4Jlf_7aWi"],"cl":"section"},{"key":"eydYAWOb4Pj","content":{"text":"\u003cp >As organizations move through 2023 and into 2024, emerging risks continue to surface, and security teams must be prepared to respond and mitigate potential threats to people, operations and assets. \u003c/p>\u003cp >Organizations in the United States will continue to face increased risk from \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/99095-best-practices-for-protecting-businesses-against-extreme-weather\">natural hazards\u003c/a>, such as wildfires in the West, tornadic activity in the Midwest and hurricanes in the Atlantic Basin. Many factors can be attributed to this increase in loss to natural hazards, including increased development in risk-prone areas and \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/99121-its-time-to-assess-and-mitigate-climate-risk\">climate change\u003c/a>. Organizations must be prepared to mitigate and respond to natural risks, including having the appropriate redundancy, limited points of failure or the potential to shift operations.\u003c/p>\u003cp >Additionally, organizations must be prepared for increased human-made and technological risks, such as active threats, corporate espionage, \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/keywords/1507-cyber-attacks\">cyberattacks\u003c/a>, terrorism and infrastructure failure. Many organizations continue to see increased attacks on critical infrastructure that support corporate enterprise and government operations. Continual efforts must be made to ensure risks are appropriately identified and proper mitigation measures are employed to minimize potential loss. An in-depth defensive posture deploys a layered security approach that incorporates people, processes and technology to protect assets. Companies and government entities should develop a layered security approach to help detect, deter and respond to human-made and technological risks. \u003c/p>\u003ch5 >Conducting Tailored Risk Assessments\u003c/h5>\u003cp >Although many industries face the same natural hazards based on geography, the technological and human-made risks can vary greatly by industry type or facility use. As a result of the potential threat diversity, security practitioners and risk adjustors should modify how they conduct assessments. The one-size-fits-all assessment that fails to account for business operations and industry-specific threats will most likely not deliver the results that a client needs to properly mitigate potential vulnerabilities. Instead, assessments must be tailored to the systems and operations of the assessed organization, taking an all-hazards approach. \u003c/p>\u003cp >Developing a comprehensive list of the threats that have the potential to impact operations is a worthy first step in assessing enterprise risk. Once threats are initially identified, establishing a radius of review for the assessed location will help to refine the potential human-made and technological risks within the operational area. \u003c/p>\u003cp >The next step would include reviewing the assessed site demographics and operational environment against open-source and proprietary data to ensure that all potential threats have been properly identified. A follow-up field review to validate the collected information is always recommended to ensure the source data is correct. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e_xTzfhpsmi","type":"section","children":["eydYAWOb4Pj"],"cl":"section"},{"key":"eWhEdFSt4kf","content":{"text":"\u003ch1 >The one-size-fits-all assessment that fails to account for business operations and industry-specific threats will most likely not deliver the results that a client needs to properly mitigate potential vulnerabilities.\u003c/h1>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eihv4IzH6bf","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","key":"IKfRqm6_25","ratio":1}},"type":"image","cl":"image"},{"key":"ei3kg8YwMRc","type":"section","children":["eWhEdFSt4kf","eihv4IzH6bf"],"cl":"section"},{"key":"eR4UFDPBWNN","content":{"text":"\u003cp >In many instances, the initial list of potential threats identified by an organization fails to incorporate human-made risks operating within the determined operational radius of review. For example, the failure of facility operators to identify \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/97863-protecting-utilities-top-criminal-and-terrorist-targets\">critical infrastructure\u003c/a> (e.g., pipelines, electrical substations, rail lines) or hazardous material facilities (e.g., chemical manufacturers, petroleum storage) that operate within the same geographical space could result in potential facility impacts, including the need to shelter-in-place or evacuate. Understanding the holistic threat landscape will allow security teams to properly develop mitigation strategies to help minimize operational impacts and increase their ability to return to operations. \u003c/p>\u003ch5 >Review Controls\u003c/h5>\u003cp >Once the assessor has properly identified the threats, the next step is to review the controls deployed by the organization to protect the facility and assets. This step includes checking the measures to harden the target, means deployed to detect and delay the potential threat, and operational processes to properly respond to the threat. The standard mitigation for most organizations involves physical barriers, security technology, security policies and procedures to minimize the potential for facility impact and assist occupants with the proper response to an incident. This review takes a balanced approach to ensure the intended operations can be maintained without compromising security. Physical security controls for a public or semi-public venue, like a school or church, take a far different approach than the security controls for a controlled access facility like a data center or power plant. Security professionals conducting a risk assessment must consider how the facilities being assessed are used to ensure that the controls in place — or controls that are being proposed — allow for successful operation. Thus, creating an assessment template that considers the facility use type and intended audience is essential. \u003c/p>\u003cp >Security professionals must take a balanced approach and research properly before conducting a facility risk assessment. Creating a unique assessment for each facility use type will produce the best results for an organization. Considering all potential hazards will identify the potential threats a facility could face. Conducting a complete information and field review of the facilities will yield comprehensive results and provide facility operators with a holistic view of the risk environment, allowing for the development of proper mitigation strategies to minimize loss.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eiiiAhgMAcS","type":"section","children":["eR4UFDPBWNN"],"cl":"section"},{"key":"esh8TV1VVfG","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"eq1V9Ynb75v","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eHzDTQCNOju","type":"section","children":["esh8TV1VVfG","eq1V9Ynb75v"],"cl":"section"},{"key":"e02-g48VAS5","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Anthony Mangieri is the Senior Director of Corporate Security at Tomahawk Strategic Solutions. \u003cem >Image courtesy of Mangieri\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eoNw98uGV0w","type":"section","children":["e02-g48VAS5"],"cl":"section"},{"key":"emAnAJXmpJ7","content":{"text":"\u003cp >august 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"eDS8FIBRg-D","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eZwzgqAY7C4","type":"section","children":["emAnAJXmpJ7","eDS8FIBRg-D"],"cl":"section"},{"key":"ePfV51HYWNa","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"efs-rxW2ajK","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ezBvCQ_4Jo5","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKaT2G6QYR_","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["ePfV51HYWNa","efs-rxW2ajK","ezBvCQ_4Jo5"],"cl":"image"},{"key":"embe47qY96Y","type":"section","children":["eKaT2G6QYR_"],"cl":"section"},{"key":"p7x494ekDOh","children":["ee9DlG2aYUg","eLXFg8_UKsp","ekFD3uSopj6","ehLas87eGA1","e2hgTBHj2sl","e_xTzfhpsmi","ei3kg8YwMRc","eiiiAhgMAcS","eHzDTQCNOju","eoNw98uGV0w","eZwzgqAY7C4","embe47qY96Y"]},{"key":"e3ElT-JdeVk","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"exo2TBB5_sF","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"e3ElT-JdeVk":true,"exo2TBB5_sF":{"piEOLMeuH7J":true}},"children":["e3ElT-JdeVk","exo2TBB5_sF"]}],"pages":[{"key":"p-VpmQPES-7","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"p7KIId2Znl-","title":"AD–xxx","cover":"undefined/image/social/QzhB8NQfSl/p7KIId2Znl-/v/0.jpg","path":"adxxx-copy"},{"key":"p7XQxP7aEsZ","title":"Security Talk-Column","desc":"Erin Belknap, Managing Director, Security at Sterling Bay, shares her career advice for the next generation of security leaders.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg","path":"security-talk-column"},{"key":"p7x494ekDOh","title":"Education & Training-Column","desc":"Risk assessment professionals must take a balanced approach and research properly before conducting a facility risk assessment.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg","path":"education-training-column"},{"key":"pAcrZsSqoz4","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wgDmZHqGcp.png","path":"ad-dks"},{"key":"pByOlkPOPe1","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pDRhNDytE4O","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qOjInVjwET.png","path":"ad-security-500"},{"key":"pGZwroHCTbS","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pHvN3H30E5Z","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vjQ5Gi5oOL.jpg","path":"advertising-index"},{"key":"pHyrLe5p-1S","title":"xxxxx-Edit","desc":"","cover":"undefined/image/social/QzhB8NQfSl/pHyrLe5p-1S/v/0.jpg","path":"xxxxx-feature"},{"key":"pIj9Tr5hnLd","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-continue-education"},{"key":"pKaJDFPDB4j","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pPL36LiHmEi","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KsXc43uf_s.jpg","path":"staff-listing"},{"key":"pRFZProgRlH","title":"AD–House GSX","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lY4vjeeicM.png","path":"ad-gsx"},{"key":"pRNUp0zqrrD","title":"AD–Webinar Cisco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3RCc7yBMrQ.png","path":"ad-webinar-cisco"},{"key":"pU3j2Iy44of","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-security-enewsletter"},{"key":"pUSjF3IQljU","title":"Security August 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mvvRJwAtzM.jpg","path":"","index":true},{"key":"pUz40Yr3wFn","title":"Cyber Tactics-Column","desc":"Kevin Kealy, Chief Information Security Officer (CISO) at Light & Wonder, shares insights on casino cybersecurity defense.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKwCG_RVi_.jpg","path":"cyber-tactics-column"},{"key":"pV11y7eNuwN","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V2DhnNSinT.png","path":"ad-solutions-by-sector"},{"key":"pVO1NzWH5RC","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpXeAnE2qP.jpg","path":"ad-mission-500"},{"key":"pWI5bjpg4v1","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"adhouse-refer-a-friend"},{"key":"pYQ5lQXl1ov","title":"Global News & Analysis-Department","desc":"Protecting the personal information of remote executives; building better workplace safety practices in warehouses; the importance of digital trust.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hx_VFxZlqm.jpg","path":"global-news-analysis-department"},{"key":"pYXa5Bd24Qz","title":"AD–House BNP Engage","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pa6TyycEWFp","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pauslDFh9Lu","title":"Product Spotlight-Department","desc":"Access control products help security leaders protect vulnerable physical spaces including schools, offices and hospitals. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/EHhE3H3dk5.jpg","path":"product-spotlight-department"},{"key":"pbSslteDF6i","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mvvRJwAtzM.jpg","path":"table-of-contents"},{"key":"pbcJAzSCDvG","title":"Career Intelligence-Column","desc":"Deciding to relocate for a security executive position involves considering the effects of the move on your personal and professional life.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/z2PaL-5NJs.jpg","path":"career-intelligence-column"},{"key":"pbnaW-KNy1A","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cpbJhvO2jZ.png","path":"online-contents"},{"key":"pc-t6JblB_f","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WhMlwZw55P.png","path":"ad-webinar-exterro"},{"key":"pe5GimUWbC3","title":"Incident Response-Feature","desc":"Enterprise security teams cannot eliminate business travel threats, but their ability to adapt in an incident can reduce risk and maintain business continuity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TtF405KY9p.jpg","path":"incident-response-feature"},{"key":"pf94Id5LF4d","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/QzhB8NQfSl/pf94Id5LF4d/v/0.jpg","path":"xxxxxx-column"},{"key":"piEOLMeuH7J","title":"Expanding the Security Candidate Pool-Special Report","desc":"Expanding the security candidate pool is a critical step in better aligning security with the business and creating cross-functional teams.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ORaJuWdKdx.jpg","path":"expanding-the-security-candidate-pool"},{"key":"pnELCJ77_JB","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ir_CSz8nrn.png","path":"ad-speco"},{"key":"pnxftY5wOoo","title":"Leadership & Management-Column","desc":"Amid layoffs, security leaders reflect on what truly defines leadership in the industry, from volunteerism to mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UO3UkS_jpn.jpg","path":"leadership-management-column"},{"key":"ptxPcStMH3c","title":"Profile in Excellence-Feature","desc":"Huntsville Hospital Health Systems’ P.R.I.D.E Academy standardizes its hospital security officer training with certifications and de-escalation. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qJ58-1sXcX.jpg","path":"profile-in-excellence-feature"},{"key":"pvvosgDEaGa","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"adhouse-security-bookstore"},{"key":"pyR0O_PNpKJ","title":"Government Security-Feature","desc":"U.S. government security leaders share their experiences balancing security and public accessibility. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SX85vKbO_u.jpg","path":"government-security-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"2EUzJ_ZWjp":{"meta":{"width":5120,"height":2880,"description":"Automotive design, Clothing, Trousers, Workwear, Sleeve, Floor"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg",2560]]},"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xV2-3pD3WU":{"meta":{"width":2399,"height":2369,"description":"Dress shirt, Smile, Tie, Sleeve, Gesture, Collar, Suit"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xV2-3pD3WU.jpg",2399]]}},"interactions":[],"pkg":{"section":"basic","external-link":"basic","image":"basic","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","w1br1l0lsu-u06":"pgxSSDpDPRe","w1c12qdsln-oon":"pjbqXRuSWpE","frame":"basic","shape":"basic","w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"8hXxK5VhiK":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management-Column","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu","key":"8hXxK5VhiK"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/dh7g2ryr72t2v0e9k5uq9/SEC_Aug-2023_Full-Issue.pdf?rlkey=ca8c6adgerc01esbypoobg7tb&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"OOOdQcvXgr":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu","key":"OOOdQcvXgr"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"k8n_dseFg3":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence","key":"UgPS0U8-xf"}],"title":"Main menu","key":"k8n_dseFg3"},"qJf6gzO8js":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"p7x494ekDOh"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pYQ5lQXl1ov"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pauslDFh9Lu"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pKaJDFPDB4j"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pHvN3H30E5Z"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pPL36LiHmEi"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"p-VpmQPES-7"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"Security August 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pAcrZsSqoz4"},"title":"AD–DKS","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDRhNDytE4O"},"title":"AD–Security 500 Conference","key":"C-1B3Ls4n7"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk-Column","key":"2Mh1WdFTdh"},{"link":{"mode":0,"page":"pnELCJ77_JB"},"title":"AD–Speco","key":"lzOiyhHYMa"},{"link":{"mode":0,"page":"pYQ5lQXl1ov"},"title":"Global News & Analysis-Department","key":"Qnvvg8zRUj"},{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool-Special Report","key":"U6t-HBfsnx"},{"link":{"mode":0,"page":"pRFZProgRlH"},"title":"AD–GSX","key":"ZKNqy1iVZF"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security-Feature","key":"NWKVr9VMM7"},{"link":{"mode":0,"page":"pV11y7eNuwN"},"title":"AD–Solutions by Sector","key":"T42tOCynSJ"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response-Feature","key":"7NgrI1AdqU"},{"link":{"mode":0,"page":"pVO1NzWH5RC"},"title":"AD–Mission 500","key":"32GVTR375H"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"Vndc1-t_JO"},{"link":{"mode":0,"page":"pc-t6JblB_f"},"title":"AD–Webinar Exterro","key":"UL5druprJr"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence-Column","key":"BzOrLtZmnq"},{"link":{"mode":0,"page":"pU3j2Iy44of"},"title":"AD–Security eNewsletter","key":"4FCPPhzz5B"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management-Column","key":"acuz8AkkRv"},{"link":{"mode":0,"page":"pIj9Tr5hnLd"},"title":"AD–Continuing Education","key":"-JeYPK-m0Y"},{"link":{"mode":0,"page":"pByOlkPOPe1"},"title":"AD–Security Renewal","key":"vGK7_xiujY"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics-Column","key":"qA9I49oOfU"},{"link":{"mode":0,"page":"pvvosgDEaGa"},"title":"AD–Security Bookstore","key":"cU5JLZXSDV"},{"link":{"mode":0,"page":"p7x494ekDOh"},"title":"Education & Training-Column","key":"L4eSVAkgm2"},{"link":{"mode":0,"page":"pRNUp0zqrrD"},"title":"AD–Webinar Cisco","key":"yhSxmH3bx8"},{"link":{"mode":0,"page":"pYXa5Bd24Qz"},"title":"AD–BNP Engage","key":"IoncLI6Oeu"},{"link":{"mode":0,"page":"pauslDFh9Lu"},"title":"Product Spotlight-Department","key":"H-5-tiUiF3"},{"link":{"mode":0,"page":"pa6TyycEWFp"},"title":"AD–Brivo Infocenter","key":"yCcRI-tgUZ"},{"link":{"mode":0,"page":"pWI5bjpg4v1"},"title":"AD–Refer a Friend","key":"bw_IW7m-be"},{"link":{"mode":0,"page":"pKaJDFPDB4j"},"title":"Classifieds","key":"Aue-xhZRIt"},{"link":{"mode":0,"page":"pHvN3H30E5Z"},"title":"Advertising Index","key":"DTeewK4j_n"},{"link":{"mode":0,"page":"pPL36LiHmEi"},"title":"Staff Listing","key":"OTHhOnCPPc"},{"link":{"mode":0,"page":"p-VpmQPES-7"},"title":"eMagazine Navigation Guide","key":"ceCJ3yicYA"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}