Editor in Chief\u003c/h4>","children":[]},"preset":"pGQMJGt39jG","type":"text","cl":"text pGQMJGt39jG"},{"key":"eVUHZ0HxJRY","content":{"text":"\u003ch1 >Leading by Example\u003c/h1>","children":[]},"preset":"pyY1pMQxVIq","type":"text","cl":"text pyY1pMQxVIq"},{"key":"eTt0yX4d9qP","content":{"text":"\u003ch2 >Industry leaders discuss their approaches to security and creating a positive culture from the top down.\u003c/h2>","children":[]},"preset":"pyY1pMQxVIq","type":"text","cl":"text pyY1pMQxVIq"},{"key":"eDRnjjoENR5","content":{"src":{"key":"PAn9ZXRQfM","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"evxbUyfC27U","content":{"children":[]},"type":"section","children":["ezLCPfEOA8S","eVUHZ0HxJRY","eTt0yX4d9qP","eDRnjjoENR5"],"cl":"section"},{"key":"es9LrJdkI31","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg","key":"ihbHFdnHag"},"children":[]},"type":"image","cl":"image"},{"key":"e8iXIHIRBN3","content":{"text":"\u003cp >\u003cem >mbortolino / E+ via Getty Images\u003c/em>\u003c/p>","children":[]},"preset":"pcXiQUrvRN5","type":"text","cl":"text pcXiQUrvRN5"},{"key":"euzue3sA4xR","content":{"children":[]},"type":"section","children":["es9LrJdkI31","e8iXIHIRBN3"],"cl":"section"},{"key":"eanTGa1CE4N","content":{"text":"\u003cp >Building a robust security culture is central creating a successful security strategy within any organization. Here, I had the opportunity to discuss with two industry leaders — Kirsten Provence, Executive Director Security Programs & Governance at Kaiser Permanente, and Kristine Raad, Chief Security Officer at General Motors, their approaches to security and creating a positive culture from the top down.\u003c/p>\u003cp >“It really doesn’t matter what industry you’re in, security is everyone’s responsibility. However, you can’t just say that and not give people the tools to drive security and resiliency,” says Provence. “People, at their core, want to be empowered, and by providing them with some key components to enable them to be a security ambassador, an organization is essentially scaling its security apparatus by a huge magnitude.” \u003c/p>\u003cp >“Security culture to me is made up of the beliefs, values, attitudes and behavioral norms the organization and its employees have toward security,” says Kristine Raad, Chief Security Officer at General Motors. “An organization’s security culture is truly the driver of their policies, investment decisions, risk awareness and day to day actions; all of which are the outward expression of the culture.\u003c/p>\u003ch5 >Contributing to a Positive Security Culture\u003c/h5>\u003cp >When it comes to building a strong security culture in an organization, transparency and communication is key. \u003c/p>\u003cp >“People have to know what measures are in place in order to assess what additional tactics they may need to employ to increase security,” Provence says. “As with anything, communication is key. The more that an organization can provide topical messaging to team members about security, the more that those team members will think about security as a continual thread in their daily operation. That’s not saying that security organizations should be releasing multi-page intelligence summaries for the general population of an organization to consume, but a quick one-page graphical flyer that gives some key takeaways on a topic can be incredibly powerful.”\u003c/p>\u003cp >“Creating a positive security culture is no simple task and requires a comprehensive and consistent strategy,” adds Raad. “This includes: \u003c/p>\u003col >\u003cli >\u003cdiv style=\"position:relative\">Building a positive attitude towards security through education, marketing and leadership messaging focused on the benefits to individuals and business interests.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Ensuring leaders are onboard and model the desired behaviors to create norms for their teams.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Creating awareness of key concepts through engaging training and micro learning.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Communicating key principles and policies at all levels of the organization on a regular basis through a variety of channels.”\u003c/div>\u003c/li>\u003c/ol>\u003ch5 >The Role of Leadership\u003c/h5>\u003cp >When it comes to shaping or fostering a security-conscious culture within an organization, both Raad and Provence say it is important for the message to come through leaders from the top down. \u003c/p>\u003cp >“Building the organization’s security culture begins with leadership clearly defining core values through strategic goals and policies, communicating with consistency and modeling the behavior through their actions and decisions,” Raad says. “Leaders are absolutely critical in creating a positive security culture. When they model behaviors including a positive security attitude, compliance with policies, and decision making that supports security initiatives, they are establishing social norms and expectations for the behavior of their teams and others.”\u003c/p>\u003cp >“As with many things, shaping a security-conscious culture starts at the top,” Provence adds. “That means leadership must set the example of how they want their team members to engage with security every day.”\u003c/p>\u003cp >For security leaders looking to enhance their organization’s security culture, these leaders offer this advice.\u003c/p>\u003cp >“Start talking and empower your security team members to do so too. Your CSO isn’t the only face of security. All team members are, and they should be empowered and trusted to do so,” Provence says. “Give them some high-level talking points about the security organization’s top-line goals to use as conversation starters, and then they can take the conversation down their area of expertise on their own. It will connect their work to the larger mission and will scale the power of the ‘CSO elevator chat’.”\u003c/p>\u003cp >“Start by identifying what your security culture goals are for the organization and what gaps exist between your current and desired state,” Raad says. “While this sounds simple, determining the measurable attributes and desired outcomes is the most important step. I recommend engaging with strategic partners and leaders to gain their support and ensure alignment to overarching organization goals which is essential to successful culture change.”\u003c/p>","children":[]},"preset":"px9wGknIVpf","type":"text","cl":"text px9wGknIVpf"},{"key":"ewya3niDXf_","content":{"children":[]},"type":"section","children":["eanTGa1CE4N"],"cl":"section"},{"key":"e8BMKX6Qm5H","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"ewiq6x7727R","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"],"x-twitter":{"url":"https://cdn.vev.design/private/an2K3NyIunQ4E5tG3LwwGhVDbi23/34j8-logo-white.png"}},"cl":"w1c12qdsln-oon"},{"key":"e3DYDWp3d1h","content":{"children":[]},"type":"section","children":["e8BMKX6Qm5H","ewiq6x7727R"],"cl":"section"},{"key":"e4SSTksp8Pq","content":{"children":[],"link":{"mode":0,"page":"pfZh61kbYCe"}},"type":"external-link","cl":"external-link"},{"key":"ejRNkXn4qMx","content":{"text":"\u003ch6 >\u003cem >COMING UP NEXT\u003c/em>\u003c/h6>\u003cp >\u003cstrong >Global News & Analysis\u003c/strong>\u003c/p>\u003cp >API remains a top data security threat; IT and security leaders express generative artificial intelligence (AI) concerns.\u003c/p>","children":[]},"preset":"pW2KkHRgsz","type":"text","actions":["e4SSTksp8Pq"],"cl":"text pW2KkHRgsz"},{"key":"exrvInQYM6d","content":{"children":[],"link":{"mode":0,"page":"p90S1fw6zcX"}},"type":"external-link","cl":"external-link"},{"key":"eEbD09gSl5P","content":{"children":[]},"type":"frame","actions":["exrvInQYM6d"],"cl":"frame"},{"key":"eRcxKM8OL7a","content":{"shapeId":"angle-double-right-solid","children":[]},"type":"shape","cl":"shape"},{"key":"ebsIC3Csvqz","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg","key":"sP1BUmJ0b3"},"children":[]},"type":"image","cl":"image"},{"key":"etFDwsG3b1H","content":{"children":[]},"type":"section","children":["ejRNkXn4qMx","eEbD09gSl5P","eRcxKM8OL7a","ebsIC3Csvqz"],"cl":"section"},{"key":"pEvN4f8JNBB","children":["ec2Xp5noNU8","eziffgpdjCG","e_P2InOI-LT","evxbUyfC27U","euzue3sA4xR","ewya3niDXf_","e3DYDWp3d1h","etFDwsG3b1H"]},{"key":"eLn5rTEZ30q","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eAf5xVrx-1N","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e6G-lJ2optP","content":{"text":"\u003cp >august 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"eKiReRHfMqJ","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"es9B85KEyN3","content":{"children":[]},"type":"section","children":["e6G-lJ2optP","eKiReRHfMqJ"],"cl":"section"},{"key":"exgyUdP6_am","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eLgueOXQ0Wd","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eBYIJfEp8y-","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eTgKaxo4RK9","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["exgyUdP6_am","eLgueOXQ0Wd","eBYIJfEp8y-"],"cl":"image"},{"key":"eGLyBzvdngb","content":{"children":[]},"type":"section","children":["eTgKaxo4RK9"],"cl":"section"},{"key":"ee8FV1E_AEX","content":{"text":"\u003cp >\u003cem >Copyright ©2024. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"e4WwFk1csXp","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eNDlUaJ-TyA","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eEcjZI8dupW","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"preset":"pWabAOUihi","type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eLqF88WbBZ2","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"eH9C7XMZgA7","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"ecpJSeY1Y0j","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"e-xmK1wiIW-","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eFrrqs3LN71","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e-xmK1wiIW-"],"cl":"image"},{"key":"errKfdIpyGD","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eqWSEbgfQjs","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["errKfdIpyGD"],"cl":"image"},{"key":"eLtceJqacLd","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eYNTmAxS17u","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eLtceJqacLd"],"cl":"image"},{"key":"eWcvUwcbMIn","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eNEH0wkZw0c","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["eWcvUwcbMIn"],"cl":"image"},{"key":"eHjf3hcTz4h","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eRTTrTpPTD6","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eHjf3hcTz4h"],"cl":"image"},{"key":"eXZ5a2x2apS","content":{"children":[]},"type":"section","children":["ee8FV1E_AEX","e4WwFk1csXp","eNDlUaJ-TyA","eEcjZI8dupW","eLqF88WbBZ2","eH9C7XMZgA7","ecpJSeY1Y0j","eFrrqs3LN71","eqWSEbgfQjs","eYNTmAxS17u","eNEH0wkZw0c","eRTTrTpPTD6"],"cl":"section"},{"key":"fixed","visibility":{"es9B85KEyN3":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eXZ5a2x2apS":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eGLyBzvdngb":{"poP7gJBi3fH":"footer","p2OS7BBDoOQ":"footer","pZfiZUXfieX":"footer","pMHGgkwSiuH":"footer","ptW1iI1P7Pe":"footer","pe_oS7ORYhB":"footer","pPRsyb8wjCg":"footer","plUWGgFxAVx":"footer","pzXChLfCnmi":"footer","puvFF-ZVYrX":"footer","pLHKNFA_46T":"footer","pILv3C3JF6i":"footer","pp96Zy7Nefe":"footer","pxnzEDJ3gqg":"footer","pDIUrYkWMTY":"footer","pgJyF-r0J62":"footer","pEvN4f8JNBB":"footer","pO-Egzjmjla":"footer","pJSRZv7z3IH":"footer"},"eAgqx2PxM18":"footer","eAf5xVrx-1N":{"pPRsyb8wjCg":true},"er7p8K3ug0L":"footer","eLn5rTEZ30q":true},"children":["eLn5rTEZ30q","eAf5xVrx-1N","es9B85KEyN3","eGLyBzvdngb","eXZ5a2x2apS"]}],"pages":[{"key":"p2OS7BBDoOQ","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RJ9pSbm4hX.png","path":"online-contents"},{"key":"p90S1fw6zcX","title":"AD–Webinar Alert Media","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6EVYE4MVh2.png","path":"ad–webinar-alert-media"},{"key":"pBfF7X1_ZTn","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pBoB81piQ5K","title":"AD–MCA","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zA25BuNFWt.png","path":"ad-mca"},{"key":"pDIUrYkWMTY","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pDMW1pakmva","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ARzZ31lBJo.png","path":"ad-dks"},{"key":"pEcrVOYeecd","title":"AD–xxxx","desc":"","cover":"/image/social/y0DcpS3nQy/pEcrVOYeecd/v/0.jpg","path":"ad-xxxx"},{"key":"pEvN4f8JNBB","title":"Security Talk-Column","desc":"Industry leaders discuss their approaches to security and creating a positive culture from the top down.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg","path":"security-talk-column"},{"key":"pILv3C3JF6i","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CsuUjiOCU6.jpg","path":"staff-listing"},{"key":"pJSRZv7z3IH","title":"Product Spotlight-Department","desc":"Security magazine highlights a variety of cybersecurity products to protect data and businesses.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dyLnUCnF1I.jpg","path":"product-spotlight-department"},{"key":"pKWmUVFeRO0","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"},{"key":"pLHKNFA_46T","title":"Leadership & Management-Column","desc":"Security leaders discuss the future of ASIS International as new CEO is announced.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XA0IBINSKY.jpg","path":"leadership-management-column"},{"key":"pMHGgkwSiuH","title":"Education & Training-Column","desc":"Security leaders should pay close attention to evolving threats as domestic terrorism attacks rise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N1-PVb9P5N.jpg","path":"education-training-column"},{"key":"pO-Egzjmjla","title":"Global News & Analysis-Department","desc":"API remains a top data security threat; IT and security leaders express generative artificial intelligence (AI) concerns.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLKNTr49kx.jpg","path":"global-news-analysis-department"},{"key":"pO3TL3IXXjz","title":"xxxxxx-Feature","cover":"/image/social/undefined/pO3TL3IXXjz/v/0.jpg","path":"xxxxxx-feature"},{"key":"pPRsyb8wjCg","title":"Special Report-Advancing in Your Security Career","desc":"When looking to advance a security career, one consistent recommendation among most security leaders is to find a mentor.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tt7eZXRdOe.jpg","path":"special-report-advancing-in-your-security-career"},{"key":"pVYbeg0i_q8","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pZfiZUXfieX","title":"Security Strategy-Feature","desc":"Law enforcement agencies must prioritize the implementation of tailored solutions to safeguard their personnel, assets and the communities they serve.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dCqI1GYRV9.jpg","path":"security-strategy-feature"},{"key":"p_ITdrYuubN","title":"Security August 2024","desc":"Security August 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tt7eZXRdOe.jpg","path":"","index":true},{"key":"pe_oS7ORYhB","title":"Hospitality & Duty of Care-Feature","desc":"Doug Alexander, Director of Security and Loss Prevention at Grand Hotel on Mackinac Island, Michigan discusses challenges and advice within the industry. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzreKVdY4y.jpg","path":"hospitality-duty-of-care-feature"},{"key":"pgJyF-r0J62","title":"Cyber Tactics-Column","desc":"As the digital landscape continues to evolve, the importance of digital trust will only continue to grow.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Vzoct-3Xsk.jpg","path":"cyber-tactics-column"},{"key":"pgjpRODWb3p","title":"AD–Webinar G Core","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/fUEVJhaL31.png","path":"ad–webinar-gcore"},{"key":"pj3LfdU-mwP","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad-house-solutions-by-sector"},{"key":"plUWGgFxAVx","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RA1sB5YVUm.jpg","path":"advertising-index"},{"key":"pn-MKXD7UrA","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"poP7gJBi3fH","title":"xxxxx-Column","cover":"/image/social/undefined/poP7gJBi3fH/v/0.jpg","path":"xxxxx-column"},{"key":"pp96Zy7Nefe","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"prZq1Rm8PCK","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"ptLm-gGQ1tG","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/diH9008qFI.png","path":"ad–altronix"},{"key":"ptW1iI1P7Pe","title":"Strategic Surveillance-Feature","desc":"To bring surveillance systems up to date, schools are beginning to explore the potential of artificial intelligence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zghAU6I7pZ.jpg","path":"strategic-surveillance-feature"},{"key":"puvFF-ZVYrX","title":"Career Intelligence-Column","desc":"Recruitment companies of all sizes adapt in diverse ways to the changing face of talent acquisition.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HktmuxXQlE.jpg","path":"career-intelligence-column"},{"key":"pxnzEDJ3gqg","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MY4H8hPQu3.jpg","path":"table-of-contents"},{"key":"pyXIH4KY9RL","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eEWl_pbxfZ.png","path":"ad–house-security-500"},{"key":"pzXChLfCnmi","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"}],"shapes":{"angle-double-right-solid":[448,512,"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z"],"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"PAn9ZXRQfM":{"meta":{"width":200,"height":200,"description":"Vision care, Glasses, Smile, Sleeve, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png",200]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"ihbHFdnHag":{"meta":{"width":1999,"height":1499,"description":"Product, Sharing, Gesture, Community, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ihbHFdnHag.jpg",1999]]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"sP1BUmJ0b3":{"meta":{"width":2384,"height":1257,"description":"Personal computer, Input device, Peripheral, Gadget, Desk"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sP1BUmJ0b3.jpg",2384]]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"variables":[],"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","w1c12qdsln-oon":"pjbqXRuSWpE","frame":"basic"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/yvg3obahjlhvry0wo1wa6/SEC_Aug-2024_Full-Issue.pdf?rlkey=fyarx3j2gyoekdn5anyorq8dg&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"p_ITdrYuubN"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"plUWGgFxAVx"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p_ITdrYuubN"},"title":"Security August 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pDMW1pakmva"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pyXIH4KY9RL"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"plUWGgFxAVx"},"title":"Advertising Index","key":"De1ABBCBkX"},{"link":{"mode":0,"page":"pj3LfdU-mwP"},"title":"AD–Solutions by Sector","key":"Trvw0_BOar"},{"link":{"mode":0,"page":"p2OS7BBDoOQ"},"title":"Online Contents","key":"vtl5k_vGAE"},{"link":{"mode":0,"page":"pEvN4f8JNBB"},"title":"Security Talk-Column","key":"EiJsh2NkoU"},{"link":{"mode":0,"page":"p90S1fw6zcX"},"title":"AD–Webinar Alert Media","key":"e1mdCo9zg5"},{"link":{"mode":0,"page":"pO-Egzjmjla"},"title":"Global News & Analysis-Department","key":"mGgQIgSPEj"},{"link":{"mode":0,"page":"pPRsyb8wjCg"},"title":"Special Report-Advancing in Your Security Career","key":"08bJjPUhm3"},{"link":{"mode":0,"page":"pBoB81piQ5K"},"title":"AD–MCA","key":"kivCy_-DYL"},{"link":{"mode":0,"page":"pe_oS7ORYhB"},"title":"Hospitality & Duty of Care-Feature","key":"9oPm_1RE0F"},{"link":{"mode":0,"page":"ptLm-gGQ1tG"},"title":"AD–Altronix","key":"Brq4JstJFq"},{"link":{"mode":0,"page":"ptW1iI1P7Pe"},"title":"Strategic Surveillance-Feature","key":"ZllnH7E74Q"},{"link":{"mode":0,"page":"pKWmUVFeRO0"},"title":"AD–Continuing Education (CEU)","key":"5SViLydztG"},{"link":{"mode":0,"page":"pZfiZUXfieX"},"title":"Security Strategy-Feature","key":"xfuwtVGSPk"},{"link":{"mode":0,"page":"pn-MKXD7UrA"},"title":"AD–Security Bookstore","key":"5rqxS2CtX6"},{"link":{"mode":0,"page":"puvFF-ZVYrX"},"title":"Career Intelligence-Column","key":"zzDuX9Fnzq"},{"link":{"mode":0,"page":"pgjpRODWb3p"},"title":"AD–Webinar G Core","key":"P4_WqoFOdB"},{"link":{"mode":0,"page":"pLHKNFA_46T"},"title":"Leadership & Management-Column","key":"TDNTACCuWQ"},{"link":{"mode":0,"page":"prZq1Rm8PCK"},"title":"AD–LinkedIn","key":"CGeWJh131x"},{"link":{"mode":0,"page":"pgJyF-r0J62"},"title":"Cyber Tactics-Column","key":"CZgE2zMarB"},{"link":{"mode":0,"page":"pVYbeg0i_q8"},"title":"AD–Security Renewal","key":"vnZQCXAFxE"},{"link":{"mode":0,"page":"pMHGgkwSiuH"},"title":"Education & Training-Column","key":"tv5ertMsg7"},{"link":{"mode":0,"page":"pBfF7X1_ZTn"},"title":"AD–Security eNewsletter","key":"ustmAMMoon"},{"link":{"mode":0,"page":"pJSRZv7z3IH"},"title":"Product Spotlight-Department","key":"KA_MaO2OVv"},{"link":{"mode":0,"page":"pp96Zy7Nefe"},"title":"Classifieds","key":"bibmoaPmlm"},{"link":{"mode":0,"page":"pILv3C3JF6i"},"title":"Staff Listing","key":"e9iIHZSoo5"},{"link":{"mode":0,"page":"pzXChLfCnmi"},"title":"eMagazine Navigation Guide","key":"vJL-cHHRsm"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pxnzEDJ3gqg"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}