Contributing Writer\u003c/h4>","children":[]},"preset":"pGQMJGt39jG","type":"text","cl":"text pGQMJGt39jG"},{"key":"ef628DOnTf-","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","key":"mDryoM81MQ","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eMVOUzse04H","content":{"children":[]},"type":"section","children":["eF9vJvWF2Ee","eJ4gMSVCHfJ","elT4LfZmfKC","ef628DOnTf-"],"cl":"section"},{"key":"eQX0U6ZJt_q","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg","key":"XA0IBINSKY"},"children":[]},"type":"image","cl":"image"},{"key":"e5oUOwlbHmK","content":{"text":"\u003cp >\u003cem >scyther5 / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"preset":"pcXiQUrvRN5","type":"text","cl":"text pcXiQUrvRN5"},{"key":"eIfBRk7j9sj","content":{"children":[]},"type":"section","children":["eQX0U6ZJt_q","e5oUOwlbHmK"],"cl":"section"},{"key":"e9QXAOQ5nR3","content":{"text":"\u003cp >George Gershwin wrote his classic \u003cem >Rhapsody in Blue\u003c/em> in about five weeks. George Orwell knocked out \u003cem >Animal Farm\u003c/em> in four months. It took about the same amount of time for the paint to dry on Velazquez’s masterpiece \u003cem >Las Meninas\u003c/em>.\u003c/p>\u003cp >It officially took about six months for \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/keywords/319-asis-international\">ASIS International\u003c/a> to hire its new CEO, Bill Tenney, who stepped into the role on July 1. ASIS would be delighted with just a fraction of the success of a Gershwin, Orwell or Velasquez, though the Board certainly has more realistic expectations.\u003c/p>\u003cp >The CEO of ASIS might be the most high-profile leadership position in private security. Its global footprint, influence, certifications, standards and guidelines, events and publications have made the organization the face of security for decades. Tenney won the role among thousands of contenders, many of them highly qualified.\u003c/p>\u003cp >Tenney’s arrival corresponds to the departure of \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/86889-introducing-peter-oneil-the-new-ceo-of-asis\">former CEO\u003c/a> Peter O'Neil, who helmed ASIS for more than eight years. (Full disclosure: I worked with Peter from 2016 to 2019; he promoted me to Chief Global Knowledge & Learning Officer and ASIS’s first ever Chief Security Officer.) O’Neil navigated ASIS through severe financial pressures and a global pandemic, reorganized departments, made key staffing changes, introduced association best practices, implemented an ESRM mandate, and changed the culture of the almost 80-year-old organization.\u003c/p>\u003cp >To move ASIS forward, the Board decided to replace O’Neil with a highly regarded security practitioner with extensive senior-level experience.\u003c/p>\u003cp >In a future column, I will discuss what Tenney considers his major goals and challenges, as well as his plan for the first 100 days.\u003c/p>","children":[]},"preset":"px9wGknIVpf","type":"text","cl":"text px9wGknIVpf"},{"key":"e24r3Xb5g3M","content":{"children":[]},"type":"section","children":["e9QXAOQ5nR3"],"cl":"section"},{"key":"eSP2QEZyMzU","content":{"text":"\u003ch1 >The CEO of ASIS might be the most high-profile leadership position in private security. Its global footprint, influence, certifications, standards and guidelines, events, and publications have made the organization the face of security for decades.”\u003c/h1>","children":[]},"preset":"pzCBR6rvMFP","type":"text","cl":"text pzCBR6rvMFP"},{"key":"eXoyhDuWRPI","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"e98qM4gNtut","content":{"children":[]},"type":"section","children":["eSP2QEZyMzU","eXoyhDuWRPI"],"cl":"section"},{"key":"eBvqH9bc5Z1","content":{"text":"\u003cp >Does it align with what the membership and industry want? Shortly after the hiring announcement, I posted a LinkedIn poll that asked what Tenney’s biggest challenge will be, offering four choices: relevance/credibility; finances/revenue growth; member value/membership growth; and other.\u003c/p>\u003cp >As several commenters observed, these factors are intertwined and not easily separated. Security marketing whiz Suzanna Alsayed posted, “You have to ask yourself the questions: What value does a member get? What is the value of the overall brand? Is it recognized outside the industry? If yes, is it credible? Where are the finances being distributed? How do you become relevant to the 18-24 year-old demographic?”\u003c/p>\u003cp >Security engineer Sean Ahrens called the question “the metaphorical ‘chicken and egg.’ Their issue is finances/growth, but foundationally, they need to show member value/membership growth first. Through membership growth they will achieve relevance. This will either be a Jack Welch story or it won’t.”\u003c/p>\u003cp >Also citing the combination of factors was Intel’s Kasia Hanson, who views the challenge through a technological lens. “The technology transitions happening in the market will ultimately feed into member value, relevance, and revenue growth.”\u003c/p>\u003cp >Sixty percent of poll voters pointed to member value/growth as the biggest challenge, followed by relevance/credibility (29 percent), finances (6 percent), and other (5 percent). Smart-city expert Jon Polly pointed to loss of value as the primary cause of member attrition. Factors for the decline, he said, include dated certification content and the dwindling value of ASIS certifications. Ecuador-based Kevin Palacios wrote that the issue is “a delicate balance of revenue and member value,” complicated further because “different regions have different expectations."\u003c/p>\u003cp >Other commenters reframed the question or offered alternative challenges. Ron Worman of The Sage Group wrote that if he were at the table with Bill, he wouldn’t start the conversation with ASIS. “I would start with the Mind of the Market — risk, resilience, security. This is a great opportunity to construct a new vision based on meeting this moment with fresh eyes." GardaWorld’s Chris Anquist contended that professionalization of the industry should be considered job number one “if we want to have any chance of making lasting change towards a body of knowledge, increased standardization, and ethical and professional oversight to the level where we deserve a seat at the C suite level.”\u003c/p>\u003cp >That would be a tall order for anyone. Forget Gershwin, Melville, and Velazquez. Tenney may have to channel Einstein, da Vinci and Jack Welch.\u003c/p>","children":[]},"preset":"px9wGknIVpf","type":"text","cl":"text px9wGknIVpf"},{"key":"evBfnwr6G6m","content":{"children":[]},"type":"section","children":["eBvqH9bc5Z1"],"cl":"section"},{"key":"eIGc5NqEIBS","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eD4A2HO2vMP","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"],"x-twitter":{"url":"https://cdn.vev.design/private/an2K3NyIunQ4E5tG3LwwGhVDbi23/34j8-logo-white.png"}},"cl":"w1c12qdsln-oon"},{"key":"ebqhDU43_sG","content":{"children":[]},"type":"section","children":["eIGc5NqEIBS","eD4A2HO2vMP"],"cl":"section"},{"key":"eK_16sgyAtt","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem >Columnist image courtesy of Gips\u003c/em>\u003c/h1>","children":[]},"preset":"pcS1ri5HZdw","type":"text","cl":"text pcS1ri5HZdw"},{"key":"eWZ4Es1CIP-","content":{"children":[]},"type":"section","children":["eK_16sgyAtt"],"cl":"section"},{"key":"eB7D6ZtYiPq","content":{"children":[],"link":{"mode":0,"page":"pfZh61kbYCe"}},"type":"external-link","cl":"external-link"},{"key":"eld2RXwYAbW","content":{"text":"\u003ch6 >\u003cem >COMING UP NEXT\u003c/em>\u003c/h6>\u003cp >\u003cstrong >Cyber Tactics\u003c/strong>\u003c/p>\u003cp >Unlocking Digital Trust: The Power of Collaboration in a Data-Driven World\u003c/p>","children":[]},"preset":"pW2KkHRgsz","type":"text","actions":["eB7D6ZtYiPq"],"cl":"text pW2KkHRgsz"},{"key":"eIbDJKJQJ9V","content":{"children":[],"link":{"mode":0,"page":"prZq1Rm8PCK"}},"type":"external-link","cl":"external-link"},{"key":"eDUpCDQha2d","content":{"children":[]},"type":"frame","actions":["eIbDJKJQJ9V"],"cl":"frame"},{"key":"e8B15H0natG","content":{"shapeId":"angle-double-right-solid","children":[]},"type":"shape","cl":"shape"},{"key":"eg6KyBreOQm","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg","key":"Vzoct-3Xsk"},"children":[]},"type":"image","cl":"image"},{"key":"eM_2r_sbpFa","content":{"children":[]},"type":"section","children":["eld2RXwYAbW","eDUpCDQha2d","e8B15H0natG","eg6KyBreOQm"],"cl":"section"},{"key":"pLHKNFA_46T","children":["eeoSIb9QQEa","eWl_Jfl-Ehi","e0LeKnKZpjy","eMVOUzse04H","eIfBRk7j9sj","e24r3Xb5g3M","e98qM4gNtut","evBfnwr6G6m","ebqhDU43_sG","eWZ4Es1CIP-","eM_2r_sbpFa"]},{"key":"eLn5rTEZ30q","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eAf5xVrx-1N","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e6G-lJ2optP","content":{"text":"\u003cp >august 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"eKiReRHfMqJ","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"es9B85KEyN3","content":{"children":[]},"type":"section","children":["e6G-lJ2optP","eKiReRHfMqJ"],"cl":"section"},{"key":"exgyUdP6_am","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eLgueOXQ0Wd","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eBYIJfEp8y-","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eTgKaxo4RK9","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["exgyUdP6_am","eLgueOXQ0Wd","eBYIJfEp8y-"],"cl":"image"},{"key":"eGLyBzvdngb","content":{"children":[]},"type":"section","children":["eTgKaxo4RK9"],"cl":"section"},{"key":"ee8FV1E_AEX","content":{"text":"\u003cp >\u003cem >Copyright ©2024. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"e4WwFk1csXp","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eNDlUaJ-TyA","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eEcjZI8dupW","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"preset":"pWabAOUihi","type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eLqF88WbBZ2","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"eH9C7XMZgA7","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"ecpJSeY1Y0j","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"e-xmK1wiIW-","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eFrrqs3LN71","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e-xmK1wiIW-"],"cl":"image"},{"key":"errKfdIpyGD","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eqWSEbgfQjs","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["errKfdIpyGD"],"cl":"image"},{"key":"eLtceJqacLd","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eYNTmAxS17u","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eLtceJqacLd"],"cl":"image"},{"key":"eWcvUwcbMIn","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eNEH0wkZw0c","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["eWcvUwcbMIn"],"cl":"image"},{"key":"eHjf3hcTz4h","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eRTTrTpPTD6","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eHjf3hcTz4h"],"cl":"image"},{"key":"eXZ5a2x2apS","content":{"children":[]},"type":"section","children":["ee8FV1E_AEX","e4WwFk1csXp","eNDlUaJ-TyA","eEcjZI8dupW","eLqF88WbBZ2","eH9C7XMZgA7","ecpJSeY1Y0j","eFrrqs3LN71","eqWSEbgfQjs","eYNTmAxS17u","eNEH0wkZw0c","eRTTrTpPTD6"],"cl":"section"},{"key":"fixed","visibility":{"es9B85KEyN3":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eXZ5a2x2apS":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eGLyBzvdngb":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eAgqx2PxM18":"footer","eAf5xVrx-1N":{"pPRsyb8wjCg":true},"er7p8K3ug0L":"footer","eLn5rTEZ30q":true},"children":["eLn5rTEZ30q","eAf5xVrx-1N","es9B85KEyN3","eGLyBzvdngb","eXZ5a2x2apS"]}],"pages":[{"key":"p2OS7BBDoOQ","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RJ9pSbm4hX.png","path":"online-contents"},{"key":"p90S1fw6zcX","title":"AD–Webinar Alert Media","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6EVYE4MVh2.png","path":"ad–webinar-alert-media"},{"key":"pBfF7X1_ZTn","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pBoB81piQ5K","title":"AD–MCA","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zA25BuNFWt.png","path":"ad-mca"},{"key":"pDIUrYkWMTY","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pDMW1pakmva","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ARzZ31lBJo.png","path":"ad-dks"},{"key":"pEcrVOYeecd","title":"AD–xxxx","desc":"","cover":"/image/social/y0DcpS3nQy/pEcrVOYeecd/v/0.jpg","path":"ad-xxxx"},{"key":"pEvN4f8JNBB","title":"Security Talk-Column","desc":"Industry leaders discuss their approaches to security and creating a positive culture from the top down.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg","path":"security-talk-column"},{"key":"pILv3C3JF6i","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CsuUjiOCU6.jpg","path":"staff-listing"},{"key":"pJSRZv7z3IH","title":"Product Spotlight-Department","desc":"Security magazine highlights a variety of cybersecurity products to protect data and businesses.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dyLnUCnF1I.jpg","path":"product-spotlight-department"},{"key":"pKWmUVFeRO0","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"},{"key":"pLHKNFA_46T","title":"Leadership & Management-Column","desc":"Security leaders discuss the future of ASIS International as new CEO is announced.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg","path":"leadership-management-column"},{"key":"pMHGgkwSiuH","title":"Education & Training-Column","desc":"Security leaders should pay close attention to evolving threats as domestic terrorism attacks rise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N1-PVb9P5N.jpg","path":"education-training-column"},{"key":"pO-Egzjmjla","title":"Global News & Analysis-Department","desc":"API remains a top data security threat; IT and security leaders express generative artificial intelligence (AI) concerns.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLKNTr49kx.jpg","path":"global-news-analysis-department"},{"key":"pO3TL3IXXjz","title":"xxxxxx-Feature","cover":"/image/social/undefined/pO3TL3IXXjz/v/0.jpg","path":"xxxxxx-feature"},{"key":"pPRsyb8wjCg","title":"Special Report-Advancing in Your Security Career","desc":"When looking to advance a security career, one consistent recommendation among most security leaders is to find a mentor.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tt7eZXRdOe.jpg","path":"special-report-advancing-in-your-security-career"},{"key":"pVYbeg0i_q8","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pZfiZUXfieX","title":"Security Strategy-Feature","desc":"Law enforcement agencies must prioritize the implementation of tailored solutions to safeguard their personnel, assets and the communities they serve.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dCqI1GYRV9.jpg","path":"security-strategy-feature"},{"key":"p_ITdrYuubN","title":"Security August 2024","desc":"Security August 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tt7eZXRdOe.jpg","path":"","index":true},{"key":"pe_oS7ORYhB","title":"Hospitality & Duty of Care-Feature","desc":"Doug Alexander, Director of Security and Loss Prevention at Grand Hotel on Mackinac Island, Michigan discusses challenges and advice within the industry. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzreKVdY4y.jpg","path":"hospitality-duty-of-care-feature"},{"key":"pgJyF-r0J62","title":"Cyber Tactics-Column","desc":"As the digital landscape continues to evolve, the importance of digital trust will only continue to grow.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg","path":"cyber-tactics-column"},{"key":"pgjpRODWb3p","title":"AD–Webinar G Core","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/fUEVJhaL31.png","path":"ad–webinar-gcore"},{"key":"pj3LfdU-mwP","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad-house-solutions-by-sector"},{"key":"plUWGgFxAVx","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RA1sB5YVUm.jpg","path":"advertising-index"},{"key":"pn-MKXD7UrA","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"poP7gJBi3fH","title":"xxxxx-Column","cover":"/image/social/undefined/poP7gJBi3fH/v/0.jpg","path":"xxxxx-column"},{"key":"pp96Zy7Nefe","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"prZq1Rm8PCK","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"ptLm-gGQ1tG","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/diH9008qFI.png","path":"ad–altronix"},{"key":"ptW1iI1P7Pe","title":"Strategic Surveillance-Feature","desc":"To bring surveillance systems up to date, schools are beginning to explore the potential of artificial intelligence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zghAU6I7pZ.jpg","path":"strategic-surveillance-feature"},{"key":"puvFF-ZVYrX","title":"Career Intelligence-Column","desc":"Recruitment companies of all sizes adapt in diverse ways to the changing face of talent acquisition.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HktmuxXQlE.jpg","path":"career-intelligence-column"},{"key":"pxnzEDJ3gqg","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MY4H8hPQu3.jpg","path":"table-of-contents"},{"key":"pyXIH4KY9RL","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eEWl_pbxfZ.png","path":"ad–house-security-500"},{"key":"pzXChLfCnmi","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"}],"shapes":{"angle-double-right-solid":[448,512,"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z"],"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Vzoct-3Xsk":{"meta":{"width":3600,"height":1920,"description":"Automotive design, Hand, Gesture, Finger, Speedometer"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg",2560]]},"XA0IBINSKY":{"meta":{"width":3600,"height":2326,"description":"Creative arts, Azure, Fin"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg",2560]]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"mDryoM81MQ":{"meta":{"width":400,"height":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"variables":[],"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","w1c12qdsln-oon":"pjbqXRuSWpE","frame":"basic"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/yvg3obahjlhvry0wo1wa6/SEC_Aug-2024_Full-Issue.pdf?rlkey=fyarx3j2gyoekdn5anyorq8dg&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"p_ITdrYuubN"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"plUWGgFxAVx"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p_ITdrYuubN"},"title":"Security August 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pDMW1pakmva"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pyXIH4KY9RL"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"plUWGgFxAVx"},"title":"Advertising Index","key":"De1ABBCBkX"},{"link":{"mode":0,"page":"pj3LfdU-mwP"},"title":"AD–Solutions by Sector","key":"Trvw0_BOar"},{"link":{"mode":0,"page":"p2OS7BBDoOQ"},"title":"Online Contents","key":"vtl5k_vGAE"},{"link":{"mode":0,"page":"pEvN4f8JNBB"},"title":"Security Talk-Column","key":"EiJsh2NkoU"},{"link":{"mode":0,"page":"p90S1fw6zcX"},"title":"AD–Webinar Alert Media","key":"e1mdCo9zg5"},{"link":{"mode":0,"page":"pO-Egzjmjla"},"title":"Global News & Analysis-Department","key":"mGgQIgSPEj"},{"link":{"mode":0,"page":"pPRsyb8wjCg"},"title":"Special Report-Advancing in Your Security Career","key":"08bJjPUhm3"},{"link":{"mode":0,"page":"pBoB81piQ5K"},"title":"AD–MCA","key":"kivCy_-DYL"},{"link":{"mode":0,"page":"pe_oS7ORYhB"},"title":"Hospitality & Duty of Care-Feature","key":"9oPm_1RE0F"},{"link":{"mode":0,"page":"ptLm-gGQ1tG"},"title":"AD–Altronix","key":"Brq4JstJFq"},{"link":{"mode":0,"page":"ptW1iI1P7Pe"},"title":"Strategic Surveillance-Feature","key":"ZllnH7E74Q"},{"link":{"mode":0,"page":"pKWmUVFeRO0"},"title":"AD–Continuing Education (CEU)","key":"5SViLydztG"},{"link":{"mode":0,"page":"pZfiZUXfieX"},"title":"Security Strategy-Feature","key":"xfuwtVGSPk"},{"link":{"mode":0,"page":"pn-MKXD7UrA"},"title":"AD–Security Bookstore","key":"5rqxS2CtX6"},{"link":{"mode":0,"page":"puvFF-ZVYrX"},"title":"Career Intelligence-Column","key":"zzDuX9Fnzq"},{"link":{"mode":0,"page":"pgjpRODWb3p"},"title":"AD–Webinar G Core","key":"P4_WqoFOdB"},{"link":{"mode":0,"page":"pLHKNFA_46T"},"title":"Leadership & Management-Column","key":"TDNTACCuWQ"},{"link":{"mode":0,"page":"prZq1Rm8PCK"},"title":"AD–LinkedIn","key":"CGeWJh131x"},{"link":{"mode":0,"page":"pgJyF-r0J62"},"title":"Cyber Tactics-Column","key":"CZgE2zMarB"},{"link":{"mode":0,"page":"pVYbeg0i_q8"},"title":"AD–Security Renewal","key":"vnZQCXAFxE"},{"link":{"mode":0,"page":"pMHGgkwSiuH"},"title":"Education & Training-Column","key":"tv5ertMsg7"},{"link":{"mode":0,"page":"pBfF7X1_ZTn"},"title":"AD–Security eNewsletter","key":"ustmAMMoon"},{"link":{"mode":0,"page":"pJSRZv7z3IH"},"title":"Product Spotlight-Department","key":"KA_MaO2OVv"},{"link":{"mode":0,"page":"pp96Zy7Nefe"},"title":"Classifieds","key":"bibmoaPmlm"},{"link":{"mode":0,"page":"pILv3C3JF6i"},"title":"Staff Listing","key":"e9iIHZSoo5"},{"link":{"mode":0,"page":"pzXChLfCnmi"},"title":"eMagazine Navigation Guide","key":"vJL-cHHRsm"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}