Editor in Chief\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eYSpED_lbUf","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TXfXGMyg-n.jpg","key":"TXfXGMyg-n","ratio":1.025236593059937}},"type":"image","cl":"image"},{"key":"eoaAhIjMPmS","content":{"text":"\u003ch1 >Navigating Today’s Hotel Security Challenges\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"enuwCMqlaSg","content":{"text":"\u003ch2 >As the hospitality sector adjusts to the new normal of post-COVID travel, security leaders reflect on their priorities moving forward.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"e8iptqoVNqI","type":"section","children":["eBsUv4-iwpA","eYSpED_lbUf","eoaAhIjMPmS","enuwCMqlaSg"],"cl":"section"},{"key":"efrXRBtDhug","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg","key":"1l7E_VZaky"}},"type":"image","cl":"image"},{"key":"e41rl2IKMNp","content":{"text":"\u003cp >\u003cem >FilippoBacci / E+ via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eaFN1vh6RcI","type":"section","children":["efrXRBtDhug","e41rl2IKMNp"],"cl":"section"},{"key":"ePhMHdaemuf","content":{"text":"\u003cp >Nearly three years ago, COVID-19 emerged and drastically changed the threat landscape across the world. When the virus began to spread, hotel security teams responded by implementing \u003ca href=\"https://www.securitymagazine.com/articles/92279-ahla-launches-safe-stay-for-enhanced-industry-wide-hotel-cleaning-standards\" target=\"_blank\">enhanced cleaning protocols\u003c/a>; opening up \u003ca href=\"https://www.usnews.com/news/best-states/articles/2020-04-20/states-are-moving-vulnerable-homeless-populations-to-hotels-amid-coronavirus-outbreak\" target=\"_blank\">rooms\u003c/a> to house people experiencing homelessness in safer environments than shelters; and shutting down \u003ca href=\"https://www.securitymagazine.com/blogs/14-security-blog/post/91883-a-guide-to-situational-awareness-and-hospitality-protocols-to-combat-the-coronavirus\" target=\"_blank\">high-risk facilities\u003c/a>, such as spas and fitness centers, before the first COVID-19 vaccinations were developed.\u003c/p>\u003cp >As the hospitality industry navigated changing threat levels and regulations regarding COVID-19, organizations also faced the challenge of significant decreases in business and leisure travel. A number of facilities experienced travel losses of \u003ca href=\"https://www.securitymagazine.com/articles/94511-hospitality-security-adjusts-to-covid-19-constraints\" target=\"_blank\">up to 90%\u003c/a>, and risk professionals around the globe expect business travel recovery to take between \u003ca href=\"https://www.securitymagazine.com/articles/97413-business-travel-and-work-environments-will-stabilize-this-year\" target=\"_blank\">one to three years\u003c/a>.\u003c/p>\u003cp >Now, hotels and motels are moving forward into the era of leisure and business travel upticks. Taking the lessons they learned during the height of the COVID-19 pandemic into today’s threat landscape has helped hospitality security leaders stay agile in the face of modern security challenges.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eUxXRcOqBkX","type":"section","children":["ePhMHdaemuf"],"cl":"section"},{"key":"e-iLriyoDBq","content":{"link":{"mode":0,"page":"pt7ggwr-Dr"}},"type":"external-link","cl":"external-link"},{"key":"eqUo7GOas5q","content":{"text":"\u003cp >Hwee-Fong Yong, Safety Manager at Marina Bay Sands. \u003cem >Image courtesy of Hwee-Fong Yong\u003c/em>\u003c/p>"},"type":"text","actions":["e-iLriyoDBq"],"cl":"text pcXiQUrvRN5"},{"key":"eI5TAIH75Pe","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg","key":"aie5Yd-e_E"}},"type":"image","cl":"image"},{"key":"e8vIA02g_e8","content":{"link":{"mode":0,"page":"pt7ggwr-Dr"}},"type":"external-link","cl":"external-link"},{"key":"ern6070mAIC","content":{"text":"\u003cp >Doug Alexander, Director of Security and Loss Prevention at the Grand Hotel. \u003cem >Image courtesy of Doug Alexander\u003c/em>\u003c/p>"},"type":"text","actions":["e8vIA02g_e8"],"cl":"text pcXiQUrvRN5"},{"key":"etavjkS9p6b","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg","key":"CFbUc5Kalo"}},"type":"image","cl":"image"},{"key":"eaL4FeqA4R-","type":"section","children":["eqUo7GOas5q","eI5TAIH75Pe","ern6070mAIC","etavjkS9p6b"],"cl":"section"},{"key":"e8CB4rLlbqi","content":{"text":"\u003ch5 >Priorities for Hospitality Security in 2023\u003c/h5>\u003cp >\u003cem >Security\u003c/em> magazine spoke with hotel security leaders to determine where their priorities lie as the industry propels into the new normal. Security professionals named these focuses as critical to enterprise security in their organizations:\u003c/p>\u003cul >\u003cli >\u003cdiv style=\"position:relative\">Surveillance Technology\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Loss Prevention\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Communication\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Executive Protection\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">Event Planning\u003c/div>\u003c/li>\u003c/ul>\u003cp >Event planning and high-profile hotel visits may have slowed for facilities during 2020 and 2021, but security leaders are now back to ensuring the safety of event attendees and VIP guests. Surveillance, loss prevention efforts and communication have remained critical over the past years.\u003c/p>\u003ch5 >Overt vs. Covert Security at Hotels\u003c/h5>\u003cp >The careful balance of overt and covert security plays an important role in hospitality security. At the Grand Hotel on Mackinac Island, the security team maintains an overt and customer service-oriented presence. “The guests need to feel safe and know that we are here for them,” says Doug Alexander, Director of Security and Loss Prevention at the Grand Hotel. “At the same time, they should be able to relax and enjoy their vacation, and not have security threats on their mind.” \u003c/p>\u003cp >At the Grand Hotel, the security team uses their uniform — a professional suit and small badge — as a way to remain visible, yet approachable. The team utilizes a combination of video surveillance and patrols to ensure guests remain safe during their stay. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eZdpW1tDDEv","type":"section","children":["e8CB4rLlbqi"],"cl":"section"},{"key":"erxgF5gl4Kj","content":{"text":"\u003ch1 >“The guests need to feel safe and know that we are here for them. At the same time, they should be able to relax and enjoy their vacation, and not have security threats on their mind.” \u003c/h1>\u003ch2 >— Doug Alexander\u003c/h2>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"efO6Q0joUvp","content":{"src":{"key":"7Iq54aVwp4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","ratio":1}},"type":"image","cl":"image"},{"key":"e7eoJeL34gi","type":"section","children":["erxgF5gl4Kj","efO6Q0joUvp"],"cl":"section"},{"key":"et05il6DTR6","content":{"text":"\u003cp >Hwee-Fong Yong, Safety Manager at Marina Bay Sands, a luxury hotel in Singapore, agrees that uniforms play a part in maintaining the balance of overt vs. covert security in hospitality spaces. “Where budget allows, having a team of security personnel in plain clothes will help on the covert security side,” she says. Yong also stresses the importance of communication with internal and external stakeholders to maintain a safe hotel environment. “To strike a balance between covert and overt security is to build up the security knowledge across departments such that they can act as the extended arm for the security department,” she says. Creating a security-minded culture both within the hotel facility and with community partners helps keep everyone safe, she says. \u003c/p>\u003cp >On the technology side, surveillance is a key tool for hotel security leaders to extend the reach of their teams and ensure safety at their facilities. “The most important technology you can have in a hotel is your audio and video systems,” Alexander says. At the Grand Hotel, security teams use surveillance and RFID tags while conducting patrols, responding to incidents, and assessing the safety of the facility. \u003c/p>\u003cp >Hotel security teams can rely on surveillance to boost safety across their facilities, especially in areas where security officers don’t patrol as frequently. Technology can also extend the reach of hotel security departments, which may face workforce shortages and retention issues, according to Yong. In situations where security officer patrols are unavailable or ill-suited to a location, “the use of robots to conduct roving patrols can be a relief to manpower shortages,” Yong says. The technology can also bridge the gap between an incident and the security response, she says, by “quickly detecting unusual activities at high-risk locations and triggering a response to the location instead of the need for a command center operator to dispatch responders,” she says.\u003c/p>\u003ch5 >Moving Forward Safely\u003c/h5>\u003cp >Hotel security leaders have responded in innovative ways to the challenges affecting the sector in recent years. Looking forward, security leaders can look to risk assessment and communication techniques to further bolster their security posture. “To boost your physical defenses, conduct a threat vulnerability risk assessment every few years and review if the existing posture needs enhancements,” Yong says. “Do a cost-benefit analysis and present a business case to the C-suite, weighing out the pros and cons for a few options,” she says.\u003c/p>\u003cp >Alexander sees communicating with business leaders as a security priority as well. “The biggest thing is communication with your administration, as well as with your staff, guests and other security professionals,” he says. “It’s important to always communicate with your peers and keep your mind open for education.”\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eFSJveB6nW1","type":"section","children":["et05il6DTR6"],"cl":"section"},{"key":"eL-PT3zdNm6","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"et_np8DGh2W","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"efeIqXRW7l9","type":"section","children":["eL-PT3zdNm6","et_np8DGh2W"],"cl":"section"},{"key":"eMXcYJYggDH","content":{"text":"\u003cp >february 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"exVQCae0JXd","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eukifNtF4v2","type":"section","children":["eMXcYJYggDH","exVQCae0JXd"],"cl":"section"},{"key":"eFTRQDf_dJT","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ew8pArC3rhI","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ec3rWKhSg2p","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epo2K_3Y0tF","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","key":"pwAptEAolq","ratio":null}},"type":"image","actions":["eFTRQDf_dJT","ew8pArC3rhI","ec3rWKhSg2p"],"cl":"image"},{"key":"e4Vvg9Li2qf","type":"section","children":["epo2K_3Y0tF"],"cl":"section"},{"key":"pB4Nxs1Z1R_","children":["ej94L9Jur-W","eO3K6MheJgG","e7fAHzSKqAb","e8iptqoVNqI","eaFN1vh6RcI","eUxXRcOqBkX","eaL4FeqA4R-","eZdpW1tDDEv","e7eoJeL34gi","eFSJveB6nW1","efeIqXRW7l9","eukifNtF4v2","e4Vvg9Li2qf"]},{"key":"e8mDVMAP78r","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eyE5Rkmn1cP","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eGoQ5r795jN","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"fixed","visibility":{"e8mDVMAP78r":{"pNxlgVdGu-W":true},"eyE5Rkmn1cP":{"pfjvISRJLio":true},"eGoQ5r795jN":{"pTt2TSZbuf0":true,"p4d-b-J0d-L":true,"pcIZlGONpw3":true,"pewEx3oG-OH":true,"pvOsn2CqJ6b":true,"pUjmWGBb460":true,"pB4Nxs1Z1R_":true,"pXCsuONNc_-":true,"pZmjhMDlGor":true,"pacSs9ogYss":true,"poqfHnsK2FT":true,"pEIa7la5-vR":true,"p88QwrapDji":true,"pHDljnPwTEy":true,"pAl7_IKl0EV":true,"pwHYagGdjwV":true,"pIt1mPjej0N":true,"pzff7l8c-eQ":true,"ppRrpruQH8i":true,"p2evrM19r5d":true,"p7OIZUSRPtv":true,"pb1ZzGeLeuJ":true,"pLIVdC3iJzY":true,"p_WjOkyKpFw":true,"p0zfQ_fgI_u":true,"pqmsFvMm6-z":true,"pA6rWyV_Xtn":true,"pC1V4kqKWQL":true,"p05MZdpfWSn":true,"pqIKZb4DJjc":true,"pNxlgVdGu-W":true,"pE1ZMTu_Zj-":true}},"children":["e8mDVMAP78r","eyE5Rkmn1cP","eGoQ5r795jN"]}],"pages":[{"key":"p05MZdpfWSn","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"p0zfQ_fgI_u","title":"Career Intelligence-Column","desc":"Earning security executive jobs requires understanding the candidate pool and job search firm practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AG_O0zyIAU.jpg","path":"career-intelligence-column"},{"key":"p2evrM19r5d","title":"Cyber Tactics-Column","desc":"CISOs have been named in criminal and civil lawsuits related to cyberattacks. Security executives should work with legal teams to ensure they are protected.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Zvw7cJsJ-J.jpg","path":"cyber-tactics-column"},{"key":"p4d-b-J0d-L","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"p7OIZUSRPtv","title":"Security Talk-Column","desc":"Across all 50 states security leaders have been using federal & state funds to bolster school safety in the wake of gun violence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2DSX_YLZel.jpg","path":"security-talk-column"},{"key":"p88QwrapDji","title":"AD–Speco","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZMSQqt_wLT.png","path":"adspeco"},{"key":"pA6rWyV_Xtn","title":"AD–House ISC West","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I7X6XVZFR2.png","path":"adhouse-isc-west"},{"key":"pAl7_IKl0EV","title":"K9 Security-Feature","desc":"Implementing K-9 security programs requires taking a look at the individual organization’s needs, end goals and budget.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bFeGTrRVDq.jpg","path":"k9-security-feature"},{"key":"pB4Nxs1Z1R_","title":"Education & Training-Column","desc":"Hospitality security teams protect their hotel facilities with surveillance, communication, and a balance of overt and covert security initiatives.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg","path":"education-training-column"},{"key":"pC1V4kqKWQL","title":"AD–House Refer a Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"adhouse-refer-a-friend"},{"key":"pE1ZMTu_Zj-","title":"AD–House Solutions by Sector","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Kc48vqOAwN.png","path":"adhouse-solutions-by-sector"},{"key":"pEIa7la5-vR","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/COUQBzGIs4.png","path":"addks"},{"key":"pHDljnPwTEy","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rgINNQB0gT.png","path":"online-contents"},{"key":"pIt1mPjej0N","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q8HsTmPIyW.png","path":"adhouse-brivo-infocenter"},{"key":"pLIVdC3iJzY","title":"Table of Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/f184zQ3CyV.jpg","path":"table-of-contents"},{"key":"pNxlgVdGu-W","title":"Salary of CSO-Cover Story","desc":"Take a look at salary and compensation within security and compliance and see how your salary matches up.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6gIpkh67Qc.jpg","path":"salary-of-cso-cover-story"},{"key":"pTt2TSZbuf0","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Eqb0o2zCgU.jpg","path":"adhouse-security-bookstore"},{"key":"pUjmWGBb460","title":"Leadership & Management-Column","desc":"Leading with a values-based approach encourages structure, employee buy-in and positive culture growth in security programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/km8hCmfGZC.jpg","path":"leadership-management-column"},{"key":"pXCsuONNc_-","title":"Product Spotlight-Department","desc":"Security magazine highlights school security solutions that can be component of a comprehensive and holistic security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i-_liciXqB.jpg","path":"product-spotlight-department"},{"key":"pZmjhMDlGor","title":"Security Culture-Feature","desc":"To build and sustain a thriving companywide security culture, security leaders give 12 recommendations on where to start.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/JyBj7VDJCH.jpg","path":"security-culture-feature"},{"key":"p_WjOkyKpFw","title":"AD–House LinkedIn Follow","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RcKoU0ThJC.png","path":"adhouse-linkedin-follow"},{"key":"pacSs9ogYss","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5nHz15fQrF.jpg","path":"adhouse-security-enewsletter"},{"key":"pb1ZzGeLeuJ","title":"AD–House Security Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WNMgB8Yi0g.jpg","path":"adhouse-security-renewal"},{"key":"pcIZlGONpw3","title":"Video Surveillance-Feature","desc":"Video analytics can analyze object and human behavior to identify security threats before they escalate, transforming surveillance into a proactive tool.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8o1l407d9A.jpg","path":"video-surveillance-feature"},{"key":"pewEx3oG-OH","title":"AD–Seerist","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zUWamRDj-a.png","path":"adcontrol-risks"},{"key":"pfjvISRJLio","title":"Security February 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6gIpkh67Qc.jpg","path":"","index":true},{"key":"poqfHnsK2FT","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"ppRrpruQH8i","title":"AD–xxx","cover":"undefined/image/social/undefined/ppRrpruQH8i/v/0.jpg","path":"adxxx"},{"key":"pqIKZb4DJjc","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bG14hNw9E-.png","path":"adhouse-bnp-engage"},{"key":"pqmsFvMm6-z","title":"AD–House Women in Security","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nNiKDrEhWb.png","path":"adhouse-women-in-security"},{"key":"pvOsn2CqJ6b","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pwHYagGdjwV","title":"Global News-Department","desc":"Discover physical security & cybersecurity trends to watch out for in 2023, from the geopolitical factors affecting risk management to cloud security best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kRXHS9_y1M.jpg","path":"global-news-department"},{"key":"pzff7l8c-eQ","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1IiMx0bVT.jpg","path":"advertising-index"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"1l7E_VZaky":{"meta":{"width":3000,"height":2001},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1l7E_VZaky.jpg",2560]]},"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"CFbUc5Kalo":{"meta":{"width":3000,"height":2942,"description":"Dress shirt, Flash photography, Forehead, Nose, Lip, Tie, Coat, Gesture, Suit"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CFbUc5Kalo.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"TXfXGMyg-n":{"meta":{"width":325,"height":317,"description":"Forehead, Nose, Cheek, Smile, Lip, Jaw, Happy, Gesture, Iris"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TXfXGMyg-n.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TXfXGMyg-n.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TXfXGMyg-n.jpg",325]]},"aie5Yd-e_E":{"meta":{"width":2400,"height":2400,"description":"Face, Hair, Smile, Head, Lip, Outerwear, Arm, Eye, Neck, Sleeve"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aie5Yd-e_E.jpg",2400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"text":"basic","external-link":"basic","section":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","image":"basic","frame":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/pb4xtdvod87b13v/SEC_Feb-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"pfjvISRJLio"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pLIVdC3iJzY"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pHDljnPwTEy"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pNxlgVdGu-W"},"title":"Salary of CSO","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pZmjhMDlGor"},"title":"Security Culture","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pcIZlGONpw3"},"title":"Video Surveillance","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pAl7_IKl0EV"},"title":"K-9 Security","key":"68auvQvp5c"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"p7OIZUSRPtv"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"p0zfQ_fgI_u"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pUjmWGBb460"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"p2evrM19r5d"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pB4Nxs1Z1R_"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pwHYagGdjwV"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pXCsuONNc_-"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"p4d-b-J0d-L"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pzff7l8c-eQ"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"poqfHnsK2FT"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"p05MZdpfWSn"},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pfjvISRJLio"},"title":"Security February 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pEIa7la5-vR"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pLIVdC3iJzY"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pqmsFvMm6-z"},"title":"AD–Women in Security","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pHDljnPwTEy"},"title":"Online Contents","key":"8UgSTEdg26"},{"link":{"mode":0,"page":"p7OIZUSRPtv"},"title":"Security Talk-Column","key":"-EsfGOIgGb"},{"link":{"mode":0,"page":"pewEx3oG-OH"},"title":"AD–Control Risks","key":"Z4NYNmYtFW"},{"link":{"mode":0,"page":"pwHYagGdjwV"},"title":"Global News-Department","key":"5FawkfV4xL"},{"link":{"mode":0,"page":"pNxlgVdGu-W"},"title":"Salary of CSO-Cover Story","key":"Zj2upcqjzf"},{"link":{"mode":0,"page":"p88QwrapDji"},"title":"AD–Speco","key":"u0cVVIyJra"},{"link":{"mode":0,"page":"pZmjhMDlGor"},"title":"Security Culture-Feature","key":"tIGvnDRuIk"},{"link":{"mode":0,"page":"pA6rWyV_Xtn"},"title":"AD–ISC West","key":"lgGoLZz2Fe"},{"link":{"mode":0,"page":"pcIZlGONpw3"},"title":"Video Surveillance-Feature","key":"kSjLmeVV5c"},{"link":{"mode":0,"page":"pAl7_IKl0EV"},"title":"K9 Security-Feature","key":"q1DlcaMfG2"},{"link":{"mode":0,"page":"pE1ZMTu_Zj-"},"title":"AD–Solutions by Sector","key":"ioe-6GB-z2"},{"link":{"mode":0,"page":"p0zfQ_fgI_u"},"title":"Career Intelligence-Column","key":"PMnY73Guu5"},{"link":{"mode":0,"page":"pqIKZb4DJjc"},"title":"AD–BNP Engage","key":"B-Y3J3-kxb"},{"link":{"mode":0,"page":"pUjmWGBb460"},"title":"Leadership & Management-Column","key":"UH6fzVnUYd"},{"link":{"mode":0,"page":"pIt1mPjej0N"},"title":"AD–Brivo Infocenter","key":"84JtW_t_uJ"},{"link":{"mode":0,"page":"p2evrM19r5d"},"title":"Cyber Tactics-Column","key":"HeZKHC3FQP"},{"link":{"mode":0,"page":"pTt2TSZbuf0"},"title":"AD–Security Bookstore","key":"Q_O4VcVN_3"},{"link":{"mode":0,"page":"pB4Nxs1Z1R_"},"title":"Education & Training-Column","key":"PwUJFYutWY"},{"link":{"mode":0,"page":"pb1ZzGeLeuJ"},"title":"AD–Security Renewal","key":"g8Wc9NBpHj"},{"link":{"mode":0,"page":"pacSs9ogYss"},"title":"AD–Security eNewsletter","key":"tTgYulkcWk"},{"link":{"mode":0,"page":"pXCsuONNc_-"},"title":"Product Spotlight-Department","key":"YwIY45oxT-"},{"link":{"mode":0,"page":"p_WjOkyKpFw"},"title":"AD–LinkedIn Follow","key":"q-WK1uBaoT"},{"link":{"mode":0,"page":"pC1V4kqKWQL"},"title":"AD–Refer a Friend","key":"HkVL_Ps8U_"},{"link":{"mode":0,"page":"p4d-b-J0d-L"},"title":"Classifieds","key":"nyAW0vGkSM"},{"link":{"mode":0,"page":"pzff7l8c-eQ"},"title":"Advertising Index","key":"Clt3CoVEus"},{"link":{"mode":0,"page":"poqfHnsK2FT"},"title":"Staff Listing","key":"5RjWZe36cR"},{"link":{"mode":0,"page":"p05MZdpfWSn"},"title":"eMagazine Navigation Guide","key":"EtEycBZVOC"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}