Editora de \u003cem >Security\u003c/em> magazine\u003c/h4>"},"type":"text","cl":"text pu24NM9FEqw"},{"key":"eFTSoZI4_dP","content":{"text":"\u003ch1 >El camino hacia una cultura de seguridad sostenible\u003c/h1>"},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"enhDhBEtxiV","type":"circle","cl":"circle"},{"key":"eik4Ku3Wk_0","type":"section","children":["esh6aSqx5H7","eFTSoZI4_dP","enhDhBEtxiV"],"cl":"section"},{"key":"ePqi32gJHyZ","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg","key":"MJiiSZYgc9","ratio":1.6365435356200528}},"type":"image","cl":"image"},{"key":"eOAWIqwIMLH","content":{"text":"\u003cp >crédito de fotografía: Kateryna Kovarzh / iStock / Getty Images Plus a través de Getty Images\u003c/p>"},"type":"text","cl":"text pHfe1CCeee8"},{"key":"ei6RuQ8q-cT","content":{"link":{"mode":0,"page":"p6qXXjcrJee"}},"type":"external-link","cl":"external-link"},{"key":"e8ieG8CDW3z","content":{"cont":{"tablet":{"params":{"HoverAnimation":{"duration":0.2,"delay":0,"scale":1.1,"preset":"scaleUp","easing":"easeInOutQuad"},"trigger":"Hover","updated":1667480186289}},"desktop":{"params":{"HoverAnimation":{"duration":0.2,"delay":0,"scale":1.1,"preset":"scaleUp","easing":"easeInOutQuad"},"trigger":"Hover","updated":1667480186289}},"mobile":{"params":{"HoverAnimation":{"duration":0.2,"delay":0,"scale":1.1,"preset":"scaleUp","easing":"easeInOutQuad"},"trigger":"Hover","updated":1667480186289}}}},"type":"w75y8u1c","cl":"w75y8u1c"},{"key":"eYV-f6S9RDL","content":{"src":{"key":"zDNttQcvgl","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zDNttQcvgl.svg","ratio":1}},"type":"image","actions":["ei6RuQ8q-cT","e8ieG8CDW3z"],"cl":"image"},{"key":"ee0j1MKH_az","type":"section","children":["ePqi32gJHyZ","eOAWIqwIMLH","eYV-f6S9RDL"],"cl":"section"},{"key":"eEh02x5H48D","content":{"text":"\u003cp >¿Cómo se lleva un programa de concientización sobre seguridad a ser una cultura de seguridad verdaderamente integrada? Primero, debe cambiar su mentalidad, dice John Rodríguez, fundador de Empathic Security Cultures. Rodríguez ha sido un practicante de seguridad durante 40 años y ha perfeccionado y aprendido estas habilidades con el tiempo, estudiando más de 100 empresas. \u003c/p>\u003cp >Ahora, Rodríguez quiere compartir esas lecciones aprendidas, a través de Empatic Security Cultures LLC. Rodríguez ha ocupado posiciones de liderazgo en seguridad en varias organizaciones en el pasado, en General Motors, Levi Strauss & Co., Cardinal Health, Temple-Inland y Kimberly-Clark, estando a cargo de la seguridad física, la violencia en el lugar de trabajo y otras iniciativas de mitigación de riesgos. \u003c/p>\u003cp >Rodriguez dice que hay dos componentes para crear una seguridad física y una cultura de seguridad exitosa dentro de una organización. Una de esas piezas es el componente operativo, que incluye tecnologías, políticas, capacitación y procedimientos. “Esa es la ciencia de la seguridad”, añade.\u003c/p>\u003cp >El otro componente es el arte. “El arte es el aspecto humano de la seguridad”, dice Rodríguez. “Es el enfocarse en lo psicológico, lo filosófico, lo social y cómo influir en las personas en todos los niveles, desde el director ejecutivo hasta los empleados del tercer turno, para que se llegue a un acuerdo de protegerse mutuamente y brindar información para que puedan solucionar cualquier falla de seguridad”.\u003c/p>\u003cp >Los líderes pueden enfocarse en el arte de la seguridad para crear una cultura integrada que se sitúe en la parte más alta de la organización en general. Una cultura integrada no solo ayuda a multiplicar la efectividad de los equipos de seguridad, pero también a alentar a todos los empleados de la empresa a actuar como ojos y oídos del equipo. \u003c/p>\u003cp >Si se crea una cultura de seguridad, basada en confianza y empatía, se puede reducir el agotamiento de los empleados y los que no son de seguridad, y también reducir el estrés y el trauma del trabajo, según Rodríguez. \u003c/p>\u003cp >En otras palabras, la estabilidad psicológica es igual de importante como la seguridad física. Si los lideres pueden proporcionar seguridad psicológica a los empleados en todos los niveles de la organización, la organización será mucho mejor. “Los líderes de seguridad pueden aportar mucho valor a la organización si las personas que trabajan allí se sienten protegidas”, dice Rodriguez. \u003c/p>\u003cp >Cuando los lideres intentar construir una cultura de seguridad, la educación es muy importante y es aquí donde entra en juego el arte de la seguridad. “Yo no uso el término conciencia de seguridad; prefiero llamarlo solicitudes de seguridad, porque le pedimos a todos en la organización que ayuden a protegerse unos a otros. Es muy complejo y no se puede obligar a la gente a hacerlo. Tienes que construir una cultura de seguridad, generar aceptación y confianza para que todos quieran contribuir a esa cultura”, dice Rodríguez. \u003c/p>"},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"eK9SoqsyqB2","type":"section","children":["eEh02x5H48D"],"cl":"section"},{"key":"eTI2a1Ms7KW","content":{"text":"\u003ch1 >\u003cstrong >“\u003c/strong> El lograr el apoyo de los directores ejecutivos y la unidad de negocios es importante para establecer una cultura de seguridad. Pero, es por medio de los operarios donde comienza y termina una conexión sólida. \u003cstrong >”\u003c/strong>\u003c/h1>"},"type":"text","cl":"text pN4heGCImBN"},{"key":"eqFQDK31d5m","type":"section","children":["eTI2a1Ms7KW"],"cl":"section pMFpZcY81Mk"},{"key":"ekGkAAuYPxv","content":{"text":"\u003cp >Para las organizaciones grandes, nacionales o globales, hay tres niveles de oportunidad para construir esas conexiones: \u003c/p>\u003cul >\u003cli >Directores Ejecutivos (los ejecutivos que ocupan puestos directivos más altos en la jerarquía de una organización)\u003c/li>\u003cli >Nivel de unidad de negocio (gestión de emergencias, salud y seguridad, recursos humanos, legal, unidades regionales, etc.)\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Operarios (se considera el nivel operativo más básico dentro la jerarquía de la organización y empresa, la cual está compuesta por los diferentes operarios y profesionales que desempeñan la labor rutinaria) \u003c/div>\u003c/li>\u003c/ul>\u003cp >El lograr el apoyo de los directores ejecutivos y la unidad de negocios es importante para establecer una cultura de seguridad. Pero, es por medio de los operarios donde comienza y termina una conexión sólida. “Esos operarios son los que crean la credibilidad de los programas [en los ojos de otros empleados], su compromiso asegurará una cultura fuerte”, dice Rodríguez.\u003c/p>\u003cp >Establecer una conexión solida requiere que los líderes entiendan qué motiva a las personas y qué es importante para que ellos aprecien la función de seguridad, en lugar de ser una molestia.\u003c/p>\u003cp >La forma más fácil para construir esas conexiones es identificar defensores dentro de la organización — o, aquellos que apoyan a la función de seguridad y están dispuestos a promover positivamente su misión y valores. Estos defensores pueden ayudar a derribar las barreras y crear una sensación de confianza.\u003c/p>\u003cp >Los defensores son muy importantes para crear una cultura integrada, pero las personas que se oponen a la seguridad no deberían de ser ignoradas, dice Rodríguez. “Estas personas piensan que somos policías corporativos que buscamos meterlos en problemas. A estas personas, hay que acercárseles y entender por qué sienten así y pedir que nos den una oportunidad”. \u003c/p>\u003cp >Los líderes de seguridad deben formular y practicar un plan (ya sea formal o informal), que se enfoque en: con quién conectarse; cómo conectarse con ellos; definir elementos del programa, misión y valores que la función de seguridad espera compartir; y verbalizar los objetivos. \u003c/p>\u003cp >Un elemento del plan debe ser la creación de historias diseñadas para comunicar la importancia de la seguridad y conectarse con otros a nivel personal, generando empatía y apoyo. “Conéctese con las personas, cuénteles su historia y esté dispuesto a escucharlas. Es así como surgirán cambios”, dice Rodríguez.\u003c/p>\u003cp >Aunque los pasos para construir una cultura suenan simples, el camino no es fácil y llevará años desarrollarlo. Requerirá paciencia, persistencia y agilidad por parte del líder de seguridad. “Las personas y los negocios siempre están cambiando y hay que tener eso en cuenta y estar preparado para adaptarse”, dice Rodríguez. “No desarrollarás una cultura de seguridad de la noche a la mañana. Toma tiempo”.\u003c/p>"},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"enfIV6uDy0g","type":"section","children":["ekGkAAuYPxv"],"cl":"section"},{"key":"eK2zMSZU5PQ","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"edMcZmeH2Hi","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ex-Qdk2GoDP","type":"section","children":["eK2zMSZU5PQ","edMcZmeH2Hi"],"cl":"section"},{"key":"elwHEL29uiG","type":"section","cl":"section"},{"key":"eNijBji1hFY","content":{"text":"\u003cp >december 2022 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\" >SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"euFB-2vFHAH","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"elflO8nejih","type":"section","children":["eNijBji1hFY","euFB-2vFHAH"],"cl":"section"},{"key":"esEFH1OjTDQ","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ePNxoyoHCEX","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eOx9UvkuW3A","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eRPd7hs-DrP","content":{"src":"MP-cejsYH"},"type":"image","actions":["esEFH1OjTDQ","ePNxoyoHCEX","eOx9UvkuW3A"],"cl":"image"},{"key":"eAQyxmLPG_i","type":"section","children":["eRPd7hs-DrP"],"cl":"section"},{"key":"p8sTk2Oqax1","children":["emkfbEXqpdF","ewABJGXkgoS","eCB6QzZCs-S","eik4Ku3Wk_0","ee0j1MKH_az","eK9SoqsyqB2","eqFQDK31d5m","enfIV6uDy0g","ex-Qdk2GoDP","elwHEL29uiG","elflO8nejih","eAQyxmLPG_i"]},{"key":"exMgN3Buq5y","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"e1IwRKSWwwx","content":{"link":{"mode":0,"page":"pKPz3CGjyUd"}},"type":"external-link","cl":"external-link"},{"key":"ecuGN9O6nSk","content":{"shapeId":"x3bgfk0KZl"},"type":"shape","actions":["exMgN3Buq5y","e1IwRKSWwwx"],"cl":"shape"},{"key":"eTBDIrxUTq3","content":{"link":{"mode":0,"page":"p9Ob_lylnwJ"}},"type":"external-link","cl":"external-link"},{"key":"eqelNHqysQr","content":{"shapeId":"yqvBihdwM_"},"type":"shape","actions":["eTBDIrxUTq3"],"cl":"shape"},{"key":"eQVzK0j-vZy","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"efSZc26_Ktq","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"fixed","visibility":{"eQVzK0j-vZy":{"pzdo2Fxujei":true,"piHzlYp8jYo":true,"pCCDBuDcbZj":true,"p0QPjppPfXp":true,"p9goXTGL7D2":true,"p6qXXjcrJee":true,"pOaceUiKCNH":true,"ph5MoVRARZz":true,"pWO8NQw0hTa":true,"pnkzRfEJvCc":true,"pkubojKcOC7":true,"pj8fTCFI96r":true,"pysbPXXddoW":true,"pTfzG7V2hga":true,"paqgqEKYorO":true,"pKPz3CGjyUd":true,"prGblbpaV7j":true,"p9TxxBBfmc4":true,"pBNqex3WPSz":true,"pdpTH9Sa_IQ":true,"psLufA0Ir8y":true,"pg6qmjUxK56":true,"pF5Xt47SsA8":true,"pA5qP-W1LFQ":true,"pNwQ-zRg4Iz":true,"pkuuMfij4IM":true,"pzbyw8649GO":true,"p9Ob_lylnwJ":true,"pWzk6Rk602O":true,"pwKUvhxvoes":true,"pAKigXXVBkw":true,"pGicg6Ki682":true,"pH2Ngml6ZuE":true,"pENX4VhUVSE":true,"pG75AmFECyi":true},"eqelNHqysQr":{"p8sTk2Oqax1":true},"ecuGN9O6nSk":{"p8sTk2Oqax1":true},"efSZc26_Ktq":{"pN3q89nSSIb":true}},"children":["ecuGN9O6nSk","eqelNHqysQr","eQVzK0j-vZy","efSZc26_Ktq"]}],"pages":[{"key":"p0QPjppPfXp","title":"AD - House BNP Engage","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v8HcJHbXuh.png","path":"ad---house-bnp-engage"},{"key":"p6qXXjcrJee","title":"Security Talk - Column","desc":"Building a strong, integrated security culture begins with connection at all levels of an organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg","path":"security-talk-column"},{"key":"p8sTk2Oqax1","title":"Security Talk - Column (ESP)","desc":"¿Cómo puede crear una cultura de seguridad sólida e integrada que sea compatible con todos los niveles de la organización?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg","path":"security-talk-column-esp"},{"key":"p9Ob_lylnwJ","title":"AD - Allied Universal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rxLw6fFC4t.png","path":"ad---allied-universal"},{"key":"p9TxxBBfmc4","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WTth7LxWoE.jpg","path":"classifieds-control-command-ad"},{"key":"p9goXTGL7D2","title":"xxx - Feature","cover":"undefined/image/social/undefined/p9goXTGL7D2/v/0.jpg","path":"xxx---feature"},{"key":"pA5qP-W1LFQ","title":"Parking Lot Security - Feature","desc":"Lighting choices are critical for parking safety best practices, but choosing appropriate lighting means juggling ROI, energy savings & reliability.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cpYS0NJphW.jpg","path":"parking-lot-security-feature"},{"key":"pAKigXXVBkw","title":"Cyber Tactics - Column","desc":"With the year ahead looming, security leaders can focus on three challenges to manage & make their organizations more resilient & secure.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qnbsFw1S1y.jpg","path":"cyber-tactics-column"},{"key":"pBNqex3WPSz","title":"Boxerbaum Award Profile - Feature","desc":"Advanced Data Risk Management (ADRM) updated the security posture of One Post Office Square, a Boston multi-tenant smart building, during a renovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9JdHBGupGf.jpg","path":"boxerbaum-award-profile-feature"},{"key":"pCCDBuDcbZj","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WTth7LxWoE.jpg","path":"classifieds"},{"key":"pENX4VhUVSE","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/fc563onJGW.jpg","path":"table-of-contents"},{"key":"pF5Xt47SsA8","title":"Global News - Department","desc":"How to alleviate the cybersecurity workforce gap; enterprise risk management challenges; & biological threats that impact national security. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iZHoHwT5gD.jpg","path":"global-news-department"},{"key":"pG75AmFECyi","title":"AD - Webinar Everbridge","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVBukfo2eX.png","path":"ad---webinar-everbridge"},{"key":"pGicg6Ki682","title":"eMagazine Help Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nikQ_9i9Qv.jpg","path":"emagazine-help-guide"},{"key":"pH2Ngml6ZuE","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tg1q7RBZKi.jpg","path":"advertising-index"},{"key":"pKPz3CGjyUd","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Fc5Zo3Hod.png","path":"online-contents"},{"key":"pN3q89nSSIb","title":"Security December 2022","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XM_5FCu0z-.jpg","path":"","index":true},{"key":"pNwQ-zRg4Iz","title":"Career Intelligence - Column","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8_HZTIau86.jpg","path":"career-intelligence-column"},{"key":"pOaceUiKCNH","title":"Product Spotlight - Department","desc":"Security magazine highlights innovative physical security products, technology and solutions, from access control, video surveillance, alarms & more. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZepKuCCAeA.jpg","path":"product-spotlight-department"},{"key":"pTfzG7V2hga","title":"AD - AXIS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MfAIWa7PZ8.jpg","path":"ad---axis"},{"key":"pWO8NQw0hTa","title":"Guarding Report - Cover Story","desc":"Security executives and guarding providers discuss the state of security guarding, including hiring, retention and new technology, such as robots & artificial intelligence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aG6cWEbtND.jpg","path":"guarding-report-cover-story"},{"key":"pWzk6Rk602O","title":"AD - House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IlrNGz4QVf.jpg","path":"ad---house-security-bookstore"},{"key":"paqgqEKYorO","title":"AD - House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/JkZXT19EiR.jpg","path":"ad---house-security-enewsletter"},{"key":"pdpTH9Sa_IQ","title":"AD - House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DbqLv6Ctmx.png","path":"ad---house-refer-a-friend"},{"key":"pg6qmjUxK56","title":"AD - Control Risks","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P5KphJ_bXp.png","path":"ad---control-risks"},{"key":"ph5MoVRARZz","title":"AD - House Security 500 Conference","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6OKk2zr2Sc.png","path":"ad---house-security-500-conference"},{"key":"piHzlYp8jYo","title":"AD - DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0kJw9mNWIc.jpg","path":"ad---dks"},{"key":"pj8fTCFI96r","title":"AD - House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KoRbnPNIdK.png","path":"ad---house-solutions-by-sector"},{"key":"pkubojKcOC7","title":"AD - House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Lx2b1tsv7Q.jpg","path":"ad---house-security-renewal"},{"key":"pkuuMfij4IM","title":"AD - xxx","cover":"undefined/image/social/undefined/pkuuMfij4IM/v/0.jpg","path":"ad---xxx"},{"key":"pnkzRfEJvCc","title":"xxx - Column","cover":"undefined/image/social/undefined/pnkzRfEJvCc/v/0.jpg","path":"xxx---column"},{"key":"prGblbpaV7j","title":"Leadership & Management - Column","desc":"Success and notoriety outside of the industry comes from a combination of cultural factors, opportunities, timing, hard work & luck.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TQvBlnRQtm.jpg","path":"leadership-management-column"},{"key":"psLufA0Ir8y","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KmedVrY28X.jpg","path":"staff-listing"},{"key":"pwKUvhxvoes","title":"Education & Training - Column","desc":"From virtual reality to verbal de-escalation, security executives share physical security training techniques they have found impactful in their organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wee5o2cqhE.jpg","path":"education-training-column"},{"key":"pysbPXXddoW","title":"AD - Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Xa2f0OFO-t.jpg","path":"ad---mission-500"},{"key":"pzbyw8649GO","title":"Drones - Feature","desc":"Drones can be a huge security benefit, but it’s essential to understand available technology, regulatory requirements and continued costs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S9AYkbrtYx.jpg","path":"drones-feature"},{"key":"pzdo2Fxujei","title":"AD - Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Gu2_ZBLiBZ.png","path":"ad---speco"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"x3bgfk0KZl":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"yqvBihdwM_":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"MJiiSZYgc9":{"meta":{"width":4962,"description":"Human body, Hair, Head, Helmet, Cap, Organism, Font","photographer":"Kateryna Kovarzh / iStock / Getty Images Plus via Getty Images","height":3032},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MJiiSZYgc9.jpg",2560]]},"MP-cejsYH":{"meta":{"description":"Logo, Font, Text"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/500.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",2100]]},"RN6UhCms-f":{"meta":{"width":400,"description":"Nose, Cheek, Smile, Lip, Outerwear, Eyelash, Jaw, Happy, Gesture, Iris","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RN6UhCms-f.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RN6UhCms-f.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RN6UhCms-f.jpg",400]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"oJioknbLG7":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/oJioknbLG7.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"zDNttQcvgl":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zDNttQcvgl.svg","srcset":[]}},"interactions":[],"pkg":{"text":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","external-link":"basic","section":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","circle":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","frame":"basic","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w75y8u1c":"basic","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/wkcuxjt9zctoyby/SEC_Dec-2022_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[],"title":"HOME BUTTON MENU","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"children":[],"link":{"mode":0,"page":"pN3q89nSSIb"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pENX4VhUVSE"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pKPz3CGjyUd"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pWO8NQw0hTa"},"title":"Guarding Report - Cover Story","key":"HdbKjOZGLb"},{"link":{"mode":0,"page":"pBNqex3WPSz"},"title":"Boxerbaum Award Profile","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pzbyw8649GO"},"title":"Drones","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pA5qP-W1LFQ"},"title":"Parking Lot Security","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p6qXXjcrJee"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pNwQ-zRg4Iz"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"prGblbpaV7j"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pAKigXXVBkw"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pwKUvhxvoes"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pF5Xt47SsA8"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pOaceUiKCNH"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pCCDBuDcbZj"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pH2Ngml6ZuE"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"psLufA0Ir8y"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pGicg6Ki682"},"title":"eMagazine Help Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pN3q89nSSIb"},"title":"Security December 2022","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"piHzlYp8jYo"},"title":"AD - DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pENX4VhUVSE"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph5MoVRARZz"},"title":"AD - Security 500 Conference","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pKPz3CGjyUd"},"title":"Online Contents","key":"2b1WHbp5Jd"},{"link":{"mode":0,"page":"p6qXXjcrJee"},"title":"Security Talk - Column","key":"GwRBTHixdu"},{"link":{"mode":0,"page":"p9Ob_lylnwJ"},"title":"AD - Allied Universal","key":"euZL4ZcgTy"},{"link":{"mode":0,"page":"pF5Xt47SsA8"},"title":"Global News - Department","key":"3sAYhBAdxS"},{"link":{"mode":0,"page":"pzdo2Fxujei"},"title":"AD - Speco","key":"-LyIOzzDI_"},{"link":{"mode":0,"page":"pWO8NQw0hTa"},"title":"Guarding Report - Cover Story","key":"NEkdcs4HOo"},{"link":{"mode":0,"page":"pg6qmjUxK56"},"title":"AD - Control Risks","key":"5Nnm4mA_qY"},{"link":{"mode":0,"page":"pBNqex3WPSz"},"title":"Boxerbaum Award Profile - Feature","key":"I3VYjXDQ_m"},{"link":{"mode":0,"page":"pG75AmFECyi"},"title":"AD - Webinar Everbridge","key":"xFmfYJ9lhh"},{"link":{"mode":0,"page":"pzbyw8649GO"},"title":"Drones - Feature","key":"t5emq4GlWU"},{"link":{"mode":0,"page":"pj8fTCFI96r"},"title":"AD - Solutions by Sector","key":"Qq9nO-90cN"},{"link":{"mode":0,"page":"pA5qP-W1LFQ"},"title":"Parking Lot Security - Feature","key":"vvPR1ciMI_"},{"link":{"mode":0,"page":"pkubojKcOC7"},"title":"AD - Security Renewal","key":"DAY-A20MIn"},{"link":{"mode":0,"page":"pNwQ-zRg4Iz"},"title":"Career Intelligence - Column","key":"NvLByweJaw"},{"link":{"mode":0,"page":"pysbPXXddoW"},"title":"AD - Mission 500","key":"1Rp6Vq0Vq-"},{"link":{"mode":0,"page":"prGblbpaV7j"},"title":"Leadership & Management - Column","key":"u-_drTsuk3"},{"link":{"mode":0,"page":"paqgqEKYorO"},"title":"AD - Security eNewsletter","key":"1TZgVh4MZo"},{"link":{"mode":0,"page":"pAKigXXVBkw"},"title":"Cyber Tactics - Column","key":"2LSPCdDSe1"},{"link":{"mode":0,"page":"pWzk6Rk602O"},"title":"AD - Security Bookstore","key":"1oDXjwfqoj"},{"link":{"mode":0,"page":"pwKUvhxvoes"},"title":"Education & Training - Column","key":"_HIEPJxdDl"},{"link":{"mode":0,"page":"pdpTH9Sa_IQ"},"title":"AD - Refer a Friend","key":"wj605Dbua-"},{"link":{"mode":0,"page":"pOaceUiKCNH"},"title":"Product Spotlight - Department","key":"0-C85S8jk_"},{"link":{"mode":0,"page":"p0QPjppPfXp"},"title":"AD - BNP Engage","key":"UKRIbu_FNv"},{"link":{"mode":0,"page":"pCCDBuDcbZj"},"title":"Classifieds","key":"gUpFasgKI6"},{"link":{"mode":0,"page":"pH2Ngml6ZuE"},"title":"Advertising Index","key":"4poz-fk_Ch"},{"link":{"mode":0,"page":"pTfzG7V2hga"},"title":"AD - AXIS","key":"txX1ZQhd2r"},{"link":{"mode":0,"page":"psLufA0Ir8y"},"title":"Staff Listing","key":"_HajmfnIIW"},{"link":{"mode":0,"page":"pGicg6Ki682"},"title":"eMagazine Help Guide","key":"8BrkW57FeY"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","minMax":true,"columnWidth":[1024,1024],"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","minMax":true,"columnWidth":[320,320],"canvasSize":[375,667]}]},"masterMode":"desktop"}