Editor in Chief\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eh_GW3lX_ly","content":{"src":{"key":"54nd1t6Yeu","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","ratio":1.025236593059937}},"type":"image","cl":"image"},{"key":"eoGxa0STpoF","content":{"text":"\u003ch1 >Growing Into Security Leadership\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eHp-9OJPfRF","content":{"text":"\u003ch2 >Reflecting on her own career progression, Erin Belknap, Managing Director, Security at Sterling Bay, shares advice for early- and mid-career professionals looking to move into a leadership role.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"edFQ2kfMVbA","type":"section","children":["e2k5pFeaHU_","eh_GW3lX_ly","eoGxa0STpoF","eHp-9OJPfRF"],"cl":"section"},{"key":"eQg4cQBvFSn","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg","key":"0zgRtEJy71"}},"type":"image","cl":"image"},{"key":"eN39Vy6co2S","content":{"text":"\u003cp >Erin Belknap, Managing Director, Security at Sterling Bay. \u003cem >Image courtesy of Belknap\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"esZYMoGykke","type":"section","children":["eQg4cQBvFSn","eN39Vy6co2S"],"cl":"section"},{"key":"eSbtNeS887Y","content":{"text":"\u003cp >There are as many ways to progress through the enterprise security profession as there are security professionals. In such a dynamic field, security leaders today come from various backgrounds, including law enforcement, enterprise operations and more.\u003c/p>\u003cp >For early- and mid-career security professionals looking to move into leadership roles, success is defined less by where they start and more by their tenacity, dedication and depth of experience.\u003c/p>\u003cp >Erin Belknap, Managing Director, Security at Sterling Bay, a Chicago-based \u003ca href=\"https://www.securitymagazine.com/topics/2245-construction-real-estate-property-management\" target=\"_blank\">real estate\u003c/a> developer, credits some of her success in the security field with her ability to adapt to new challenges as her role grew. Belknap entered the security field through the U.S. Marines, where she served first as a Signals Intelligence Analyst and then a Sergeant and Special Security Office Chief, where she gained experience protecting top-secret facilities. As she neared the end of her enlistment, Belknap landed a Security Manager role maintaining physical security efforts at a data center, which she held for eight years before starting in a leadership position at Sterling Bay.\u003c/p>\u003cp >“By the end of the hiring process at Sterling Bay, it was between me and an individual with more experience. Sterling Bay leadership liked the idea of me being able to grow with the job. That was more than eight years ago, and now the company and my responsibilities have grown drastically,” Belknap says.\u003c/p>\u003cp >Belknap’s position has grown with the expansion of the real estate developer, which was comprised of a few buildings in Chicago when she started. Now, Sterling Bay owns 68 buildings across the United States. Along with the responsibility of securing more properties, Belknap has used her leadership role to develop career opportunities for her team.\u003c/p>\u003cp >“While our Chicago portfolio has continued to grow exponentially, we have also focused on expansion into new markets and market sectors. As a result, we’ve been able to build a fantastic opportunity for our security officers to develop their skills and then be promoted to leadership positions at other properties,” she says.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e0H8jfgNaOp","type":"section","children":["eSbtNeS887Y"],"cl":"section"},{"key":"emAdNo6qt4W","content":{"text":"\u003ch1 >Making sure that your leadership is aware that you are eager to expand your knowledge and you’re ready to take on more work is a great way to start progressing toward that goal. \u003c/h1>\u003ch2 >— Erin Belknap, Managing Director, Security at Sterling Bay\u003c/h2>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"e2AI0MJBI4C","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","key":"IKfRqm6_25","ratio":1}},"type":"image","cl":"image"},{"key":"e5ECRly3pXZ","type":"section","children":["emAdNo6qt4W","e2AI0MJBI4C"],"cl":"section"},{"key":"eh9Btcv6p1B","content":{"text":"\u003cp >In her eight and a half years at Sterling Bay, Belknap’s role has evolved from a focus on access and compliance to a multi-faceted position that incorporates security across all aspects of the business. From her initial assignment of standardizing ingress across Sterling Bay’s first few properties, her role has expanded to include involvement in \u003ca target=\"_blank\" href=\"https://www.securitymagazine.com/keywords/7483-security-design\">security design\u003c/a> for Sterling Bay’s development projects; leading crisis management and emergency response; coordinating with a team of on-site property managers, engineers, contract security officers, high-profile office tenants, local first responders; and more.\u003c/p>\u003cp >Reflecting on her own career progression, Belknap shares advice for early- and mid-career professionals looking to move into a leadership role. The first step towards leadership, according to Belknap, is demonstrating your interest in roles with more responsibility.\u003c/p>\u003cp >“It’s important to be vocal that you are interested in moving up. Making sure that your leadership is aware that you are eager to expand your knowledge and you’re ready to take on more work is a great way to start progressing toward that goal,” she says.\u003c/p>\u003cp >Throughout Belknap’s career, she has relied on a number of mentors for advice in different segments of her career journey, from security-specific insights to navigating leadership as a woman in the field. \u003c/p>\u003cp >“Having a mentor or multiple mentors is so important. That doesn’t need to be someone that you’ve shaken hands with and said, ‘Okay, we’re going to be in a mentor relationship.’ It’s simply someone who has the expertise you are seeking, or is in a role you aspire to. Start informally by asking them questions or inviting them out for coffee,” says Belknap.\u003c/p>\u003cp >In addition to one-on-one mentor relationships, Belknap recommends participating in and leading industry events.\u003c/p>\u003cp >“Something else helpful for my career was getting involved in industry events, which are fantastic for professional exposure. I don’t necessarily mean going to networking happy hours as much as organizing or volunteering at an event or a panel,” Belknap explains. “There are good opportunities to meet different people working in the field by being a person at the event who is filling a specific role, like handing out name tags or organizing speakers.”\u003c/p>\u003cp >Lastly, Belknap emphasizes that leadership takes time and experience. In today’s job market, it is common to hop from one organization to another, she says it can be difficult for young professionals to feel successful while remaining in the same role for multiple years.\u003c/p>\u003cp >“I’ve been doing this for over 20 years now. When I got out of the Marines 16 years ago, I thought that I should have immediately been offered the role I have now,” says Belknap. “It took me years to realize that I wasn’t ready or qualified for that level of leadership or responsibility yet. There are phases in your professional life where you do just have to put in the time in a specific role to gain the operational experience to eventually move up to the next level.”\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e3BjVQF_gQk","type":"section","children":["eh9Btcv6p1B"],"cl":"section"},{"key":"er2i2asmGCj","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"exhzrTzCp9g","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eEKfNyeSabC","type":"section","children":["er2i2asmGCj","exhzrTzCp9g"],"cl":"section"},{"key":"eaf-5n_uiHo","content":{"text":"\u003cp >august 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"e0BU-lYx-eO","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"e02VjHw64S3","type":"section","children":["eaf-5n_uiHo","e0BU-lYx-eO"],"cl":"section"},{"key":"ey9DYl2oLsk","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eJ-CqbvQtc5","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eHr8h88GC3v","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eGCORl2Fyd4","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["ey9DYl2oLsk","eJ-CqbvQtc5","eHr8h88GC3v"],"cl":"image"},{"key":"eU5SXyBdLvD","type":"section","children":["eGCORl2Fyd4"],"cl":"section"},{"key":"p7XQxP7aEsZ","children":["eGhIcPX_ZaD","e4y_ZENPGLB","e5zgYtA16jK","edFQ2kfMVbA","esZYMoGykke","e0H8jfgNaOp","e5ECRly3pXZ","e3BjVQF_gQk","eEKfNyeSabC","e02VjHw64S3","eU5SXyBdLvD"]},{"key":"e3ElT-JdeVk","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"exo2TBB5_sF","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"e3ElT-JdeVk":true,"exo2TBB5_sF":{"piEOLMeuH7J":true}},"children":["e3ElT-JdeVk","exo2TBB5_sF"]}],"pages":[{"key":"p-VpmQPES-7","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"p7KIId2Znl-","title":"AD–xxx","cover":"undefined/image/social/QzhB8NQfSl/p7KIId2Znl-/v/0.jpg","path":"adxxx-copy"},{"key":"p7XQxP7aEsZ","title":"Security Talk-Column","desc":"Erin Belknap, Managing Director, Security at Sterling Bay, shares her career advice for the next generation of security leaders.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg","path":"security-talk-column"},{"key":"p7x494ekDOh","title":"Education & Training-Column","desc":"Risk assessment professionals must take a balanced approach and research properly before conducting a facility risk assessment.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2EUzJ_ZWjp.jpg","path":"education-training-column"},{"key":"pAcrZsSqoz4","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wgDmZHqGcp.png","path":"ad-dks"},{"key":"pByOlkPOPe1","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pDRhNDytE4O","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qOjInVjwET.png","path":"ad-security-500"},{"key":"pGZwroHCTbS","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pHvN3H30E5Z","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vjQ5Gi5oOL.jpg","path":"advertising-index"},{"key":"pHyrLe5p-1S","title":"xxxxx-Edit","desc":"","cover":"undefined/image/social/QzhB8NQfSl/pHyrLe5p-1S/v/0.jpg","path":"xxxxx-feature"},{"key":"pIj9Tr5hnLd","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-continue-education"},{"key":"pKaJDFPDB4j","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pPL36LiHmEi","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KsXc43uf_s.jpg","path":"staff-listing"},{"key":"pRFZProgRlH","title":"AD–House GSX","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lY4vjeeicM.png","path":"ad-gsx"},{"key":"pRNUp0zqrrD","title":"AD–Webinar Cisco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3RCc7yBMrQ.png","path":"ad-webinar-cisco"},{"key":"pU3j2Iy44of","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-security-enewsletter"},{"key":"pUSjF3IQljU","title":"Security August 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mvvRJwAtzM.jpg","path":"","index":true},{"key":"pUz40Yr3wFn","title":"Cyber Tactics-Column","desc":"Kevin Kealy, Chief Information Security Officer (CISO) at Light & Wonder, shares insights on casino cybersecurity defense.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKwCG_RVi_.jpg","path":"cyber-tactics-column"},{"key":"pV11y7eNuwN","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V2DhnNSinT.png","path":"ad-solutions-by-sector"},{"key":"pVO1NzWH5RC","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpXeAnE2qP.jpg","path":"ad-mission-500"},{"key":"pWI5bjpg4v1","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"adhouse-refer-a-friend"},{"key":"pYQ5lQXl1ov","title":"Global News & Analysis-Department","desc":"Protecting the personal information of remote executives; building better workplace safety practices in warehouses; the importance of digital trust.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hx_VFxZlqm.jpg","path":"global-news-analysis-department"},{"key":"pYXa5Bd24Qz","title":"AD–House BNP Engage","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pa6TyycEWFp","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pauslDFh9Lu","title":"Product Spotlight-Department","desc":"Access control products help security leaders protect vulnerable physical spaces including schools, offices and hospitals. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/EHhE3H3dk5.jpg","path":"product-spotlight-department"},{"key":"pbSslteDF6i","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mvvRJwAtzM.jpg","path":"table-of-contents"},{"key":"pbcJAzSCDvG","title":"Career Intelligence-Column","desc":"Deciding to relocate for a security executive position involves considering the effects of the move on your personal and professional life.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/z2PaL-5NJs.jpg","path":"career-intelligence-column"},{"key":"pbnaW-KNy1A","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cpbJhvO2jZ.png","path":"online-contents"},{"key":"pc-t6JblB_f","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WhMlwZw55P.png","path":"ad-webinar-exterro"},{"key":"pe5GimUWbC3","title":"Incident Response-Feature","desc":"Enterprise security teams cannot eliminate business travel threats, but their ability to adapt in an incident can reduce risk and maintain business continuity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TtF405KY9p.jpg","path":"incident-response-feature"},{"key":"pf94Id5LF4d","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/QzhB8NQfSl/pf94Id5LF4d/v/0.jpg","path":"xxxxxx-column"},{"key":"piEOLMeuH7J","title":"Expanding the Security Candidate Pool-Special Report","desc":"Expanding the security candidate pool is a critical step in better aligning security with the business and creating cross-functional teams.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ORaJuWdKdx.jpg","path":"expanding-the-security-candidate-pool"},{"key":"pnELCJ77_JB","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ir_CSz8nrn.png","path":"ad-speco"},{"key":"pnxftY5wOoo","title":"Leadership & Management-Column","desc":"Amid layoffs, security leaders reflect on what truly defines leadership in the industry, from volunteerism to mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UO3UkS_jpn.jpg","path":"leadership-management-column"},{"key":"ptxPcStMH3c","title":"Profile in Excellence-Feature","desc":"Huntsville Hospital Health Systems’ P.R.I.D.E Academy standardizes its hospital security officer training with certifications and de-escalation. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qJ58-1sXcX.jpg","path":"profile-in-excellence-feature"},{"key":"pvvosgDEaGa","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"adhouse-security-bookstore"},{"key":"pyR0O_PNpKJ","title":"Government Security-Feature","desc":"U.S. government security leaders share their experiences balancing security and public accessibility. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SX85vKbO_u.jpg","path":"government-security-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"0zgRtEJy71":{"meta":{"width":4200,"height":2800,"description":"Flash photography, Fashion design, Lip, Smile, Shoulder, Lipstick, Neck, Sleeve, Eyelash"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0zgRtEJy71.jpg",2560]]},"54nd1t6Yeu":{"meta":{"width":325,"description":"Forehead, Nose, Cheek, Smile, Lip, Jaw, Happy, Gesture, Iris","height":317},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",325]]},"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"interactions":[],"pkg":{"section":"basic","external-link":"basic","image":"basic","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","w1br1l0lsu-u06":"pgxSSDpDPRe","w1c12qdsln-oon":"pjbqXRuSWpE","frame":"basic","shape":"basic","w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"8hXxK5VhiK":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management-Column","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu","key":"8hXxK5VhiK"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/dh7g2ryr72t2v0e9k5uq9/SEC_Aug-2023_Full-Issue.pdf?rlkey=ca8c6adgerc01esbypoobg7tb&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"OOOdQcvXgr":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu","key":"OOOdQcvXgr"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"k8n_dseFg3":{"children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence","key":"UgPS0U8-xf"}],"title":"Main menu","key":"k8n_dseFg3"},"qJf6gzO8js":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence","key":"UgPS0U8-xf"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"p7x494ekDOh"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pYQ5lQXl1ov"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pauslDFh9Lu"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pKaJDFPDB4j"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pHvN3H30E5Z"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pPL36LiHmEi"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"p-VpmQPES-7"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pUSjF3IQljU"},"title":"Security August 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pAcrZsSqoz4"},"title":"AD–DKS","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pbSslteDF6i"},"title":"Table of Contents","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDRhNDytE4O"},"title":"AD–Security 500 Conference","key":"C-1B3Ls4n7"},{"link":{"mode":0,"page":"pbnaW-KNy1A"},"title":"Online Contents","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p7XQxP7aEsZ"},"title":"Security Talk-Column","key":"2Mh1WdFTdh"},{"link":{"mode":0,"page":"pnELCJ77_JB"},"title":"AD–Speco","key":"lzOiyhHYMa"},{"link":{"mode":0,"page":"pYQ5lQXl1ov"},"title":"Global News & Analysis-Department","key":"Qnvvg8zRUj"},{"link":{"mode":0,"page":"piEOLMeuH7J"},"title":"Expanding the Security Candidate Pool-Special Report","key":"U6t-HBfsnx"},{"link":{"mode":0,"page":"pRFZProgRlH"},"title":"AD–GSX","key":"ZKNqy1iVZF"},{"link":{"mode":0,"page":"pyR0O_PNpKJ"},"title":"Government Security-Feature","key":"NWKVr9VMM7"},{"link":{"mode":0,"page":"pV11y7eNuwN"},"title":"AD–Solutions by Sector","key":"T42tOCynSJ"},{"link":{"mode":0,"page":"pe5GimUWbC3"},"title":"Incident Response-Feature","key":"7NgrI1AdqU"},{"link":{"mode":0,"page":"pVO1NzWH5RC"},"title":"AD–Mission 500","key":"32GVTR375H"},{"link":{"mode":0,"page":"ptxPcStMH3c"},"title":"Profile in Excellence-Feature","key":"Vndc1-t_JO"},{"link":{"mode":0,"page":"pc-t6JblB_f"},"title":"AD–Webinar Exterro","key":"UL5druprJr"},{"link":{"mode":0,"page":"pbcJAzSCDvG"},"title":"Career Intelligence-Column","key":"BzOrLtZmnq"},{"link":{"mode":0,"page":"pU3j2Iy44of"},"title":"AD–Security eNewsletter","key":"4FCPPhzz5B"},{"link":{"mode":0,"page":"pnxftY5wOoo"},"title":"Leadership & Management-Column","key":"acuz8AkkRv"},{"link":{"mode":0,"page":"pIj9Tr5hnLd"},"title":"AD–Continuing Education","key":"-JeYPK-m0Y"},{"link":{"mode":0,"page":"pByOlkPOPe1"},"title":"AD–Security Renewal","key":"vGK7_xiujY"},{"link":{"mode":0,"page":"pUz40Yr3wFn"},"title":"Cyber Tactics-Column","key":"qA9I49oOfU"},{"link":{"mode":0,"page":"pvvosgDEaGa"},"title":"AD–Security Bookstore","key":"cU5JLZXSDV"},{"link":{"mode":0,"page":"p7x494ekDOh"},"title":"Education & Training-Column","key":"L4eSVAkgm2"},{"link":{"mode":0,"page":"pRNUp0zqrrD"},"title":"AD–Webinar Cisco","key":"yhSxmH3bx8"},{"link":{"mode":0,"page":"pYXa5Bd24Qz"},"title":"AD–BNP Engage","key":"IoncLI6Oeu"},{"link":{"mode":0,"page":"pauslDFh9Lu"},"title":"Product Spotlight-Department","key":"H-5-tiUiF3"},{"link":{"mode":0,"page":"pa6TyycEWFp"},"title":"AD–Brivo Infocenter","key":"yCcRI-tgUZ"},{"link":{"mode":0,"page":"pWI5bjpg4v1"},"title":"AD–Refer a Friend","key":"bw_IW7m-be"},{"link":{"mode":0,"page":"pKaJDFPDB4j"},"title":"Classifieds","key":"Aue-xhZRIt"},{"link":{"mode":0,"page":"pHvN3H30E5Z"},"title":"Advertising Index","key":"DTeewK4j_n"},{"link":{"mode":0,"page":"pPL36LiHmEi"},"title":"Staff Listing","key":"OTHhOnCPPc"},{"link":{"mode":0,"page":"p-VpmQPES-7"},"title":"eMagazine Navigation Guide","key":"ceCJ3yicYA"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}