Contributing Writer\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"edDMzjS44uA","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FQPy-RD064.jpg","key":"FQPy-RD064"},"children":[]},"type":"image","cl":"image"},{"key":"eOetFwYdCT8","content":{"text":"\u003ch1 >Better Software Supply Chain Security Through SBOMs\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ey2lT7knoCM","content":{"text":"\u003ch2 >Creating a cybersecurity supply chain governance framework is a critical step in securing your organization’s digital supply chain.\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"epUKSBarHHY","content":{"children":[]},"type":"section","children":["eRe5jx-JSKi","edDMzjS44uA","eOetFwYdCT8","ey2lT7knoCM"],"cl":"section"},{"key":"eCY2cRHcC-z","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","key":"x_XqHGvGpT"},"children":[]},"type":"image","cl":"image"},{"key":"eExUjJz-n2J","content":{"text":"\u003cp >\u003cem >Just_Super / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"emMLkQcIgSF","content":{"children":[]},"type":"section","children":["eCY2cRHcC-z","eExUjJz-n2J"],"cl":"section"},{"key":"eeQwbGoYaPx","content":{"text":"\u003cp >An executive order from President Biden in 2021 focused on \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/\">enhancing software supply chain security\u003c/a>. This added transparency can help to identify and mitigate security risks, such as vulnerabilities in open source components or malicious code that has been inserted into the supply chain. These Software Bills of Materials (SBOMs) play an important role in enhancing software supply chain security by providing transparency into the components used to build software. This requirement is designed to help the government to better understand and manage the security risks associated with the software it uses.\u003c/p>\u003cp >The development of commercial software \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.isaca.org/go/supply-chain-security-gaps\">often lacks transparency, security focus, and safeguards against tampering.\u003c/a> To ensure software functions securely and as intended, especially critical software, there is a need for more robust and predictable mechanisms. With this in mind, let’s explore the concept of a Supplier/Vendor Software Bill of Materials (SBOM). \u003c/p>\u003cp >In today's interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance. As organizations rely on an intricate network of suppliers and vendors to source these components, ensuring transparency and understanding the composition of these software elements becomes crucial. This is where the concept of an SBOM comes into play. \u003c/p>\u003cp >What is a \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98171-6-areas-to-watch-in-the-software-bill-of-materials-evolution\">SBOM\u003c/a>? It is a comprehensive document that provides a detailed inventory of all software components and dependencies used in a particular product or system, including those contributed by suppliers and vendors. It serves as a critical element of supply chain risk management and cybersecurity governance. The SBOM lists each binary component, its version, origin and potential vulnerabilities, enabling organizations to assess the security and compliance of their software supply chain thoroughly. \u003c/p>\u003cp >SBOM serves as a \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98690-understanding-sboms-a-snapshot-of-your-software-security\" target=\"_blank\">critical tool\u003c/a> for transparency, security and risk management. It empowers organizations to make informed decisions about their software components, enabling them to build more secure, compliant and resilient products and services.\u003c/p>\u003cp >Creating a cybersecurity supply chain governance framework is a critical step in securing your organization's digital supply chain. Here's a step-by-step guide to get started:\u003c/p>\u003cp >\u003cstrong >Governance Structure:\u003c/strong> Establish a dedicated cross-functional team responsible for SBOM governance. This team should include representatives from cybersecurity, software development, procurement, legal and compliance.\u003c/p>\u003cp >\u003cstrong >Policy and Standards:\u003c/strong> Develop clear policies and standards that mandate the creation, maintenance and sharing of SBOMs for all software products used within the organization. These policies should outline the frequency of updates, data format and sharing mechanisms.\u003c/p>\u003cp >\u003cstrong >SBOM Creation:\u003c/strong> Define a standardized process for creating SBOMs for each software product. This process should involve automated tools and manual reviews to ensure accuracy and completeness.\u003c/p>\u003cp >\u003cstrong >Inventory Management:\u003c/strong> Maintain an up-to-date inventory of software components, libraries, frameworks and dependencies used in each software product. Track versions, origins and licenses for all components.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"ehc34ZqVhUV","content":{"children":[]},"type":"section","children":["eeQwbGoYaPx"],"cl":"section"},{"key":"eK419OxtJrZ","content":{"text":"\u003ch1 >In an era of increasing cyber threats and regulatory scrutiny, the SBOM is a valuable tool that enhances transparency, security, and risk mitigation within the supply chain, ultimately safeguarding the integrity of software, firmware or products.”\u003c/h1>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"ePjOO3Za1b1","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eWgbqIUmAHQ","content":{"children":[]},"type":"section","children":["eK419OxtJrZ","ePjOO3Za1b1"],"cl":"section"},{"key":"eYMbMnNCjWy","content":{"text":"\u003cp >\u003cstrong >Integration with Development Lifecycle:\u003c/strong> Integrate SBOM creation and maintenance into the software development lifecycle. Developers should generate SBOMs automatically during the build process, ensuring that each software release is accompanied by an accurate SBOM.\u003c/p>\u003cp >\u003cstrong >Supplier Engagement:\u003c/strong> Collaborate with software suppliers and vendors to obtain SBOMs for third-party components. Mandate the provision of accurate and timely SBOMs as part of procurement agreements.\u003c/p>\u003cp >\u003cstrong >Continuous Monitoring:\u003c/strong> Implement continuous monitoring of software components and their vulnerabilities. Regularly update SBOMs to include information about newly discovered vulnerabilities and available patches.\u003c/p>\u003cp >\u003cstrong >Vulnerability Assessment:\u003c/strong> Integrate vulnerability assessment tools to analyze SBOMs and identify known vulnerabilities and security issues in software components. Prioritize addressing high-risk vulnerabilities.\u003c/p>\u003cp >\u003cstrong >Remediation and Patching:\u003c/strong> Develop a process for addressing vulnerabilities identified in SBOMs. Define responsibilities for patch management and ensure timely remediation of identified vulnerabilities.\u003c/p>\u003cp >\u003cstrong >Sharing and Transparency:\u003c/strong> Promote transparency by sharing SBOMs with relevant stakeholders, including internal teams, customers and partners. This fosters accountability and enables better risk assessment.\u003c/p>\u003cp >\u003cstrong >Compliance and Reporting:\u003c/strong> Ensure compliance with relevant industry standards and regulations that require SBOMs. Generate reports that demonstrate the organization's commitment to software transparency and security.\u003c/p>\u003cp >\u003cstrong >Incident Response:\u003c/strong> Incorporate SBOMs into the incident response process. In the case of a security breach or vulnerability exploit, having an accurate SBOM will help identify affected systems quickly.\u003c/p>\u003cp >\u003cstrong >Training and Awareness:\u003c/strong> Educate software developers, procurement teams and relevant stakeholders about the importance of SBOMs, their role in cybersecurity and the procedures for generating and managing them.\u003c/p>\u003cp >\u003cstrong >Automation and Tools:\u003c/strong> Invest in automation tools and software solutions that facilitate the creation, maintenance and analysis of SBOMs. These tools can streamline the process and enhance accuracy.\u003c/p>\u003cp >\u003cstrong >Continuous Improvement:\u003c/strong> Regularly review and update the SBOM governance model to incorporate lessons learned from incidents, changes in software development practices, and evolving cybersecurity threats.\u003c/p>\u003cp >By maintaining an SBOM, organizations can swiftly identify and remediate vulnerabilities, respond to security incidents and ensure that software components are up-to-date and compliant with regulatory requirements. In an era of increasing cyber threats and regulatory scrutiny, the SBOM is a valuable tool that enhances transparency, security, and risk mitigation within the supply chain, ultimately safeguarding the integrity of software, firmware or products. \u003c/p>\u003cp >Remember that cybersecurity supply chain governance is an ongoing process. It requires adaptability and a commitment to continuous improvement to stay ahead of evolving cyber threats and vulnerabilities in today's interconnected business environment.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eC7EAwNtioY","content":{"children":[]},"type":"section","children":["eYMbMnNCjWy"],"cl":"section"},{"key":"ey7sgYet2cS","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eH-gFSYKdMp","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ezi8lVYdvka","content":{"children":[]},"type":"section","children":["ey7sgYet2cS","eH-gFSYKdMp"],"cl":"section"},{"key":"ebb5dklbMQ8","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Pam Nigro is the Vice President of Security and Security Officer at Medecision and the Board Chair of ISACA. \u003cem >Image courtesy of Nigro\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"erV_owSDCqu","content":{"children":[]},"type":"section","children":["ebb5dklbMQ8"],"cl":"section"},{"key":"pq58xW4ikUr","children":["eNCAj7se1zD","eGlrcDAZkq7","ed_2VIdcyjW","epUKSBarHHY","emMLkQcIgSF","ehc34ZqVhUV","eWgbqIUmAHQ","eC7EAwNtioY","ezi8lVYdvka","erV_owSDCqu"]},{"key":"eP5MZESYa3L","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eZHfPlZXqUX","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eWQKmfTQhfA","content":{"children":[],"linkUrl":"https://www.axis.com/products/axis-p38-series","adCreative":{"key":"IUH9cV5TQA","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg"},"ioDetailID":579415,"adSize":"Cover Sponsor","showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"February Sponsored BOX - LOGO","page":"pucgn6gc6Uj","pageName":"Security February 2024","key":"ee_weXbZSrW"},"advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eZHfPlZXqUX"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eqOWLjmxoSu","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eLmZ9nnWhu-","content":{"text":"\u003cp >february 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"e-CYNhDygwB","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eg2CCFSKR_a","content":{"children":[]},"type":"section","children":["eLmZ9nnWhu-","e-CYNhDygwB"],"cl":"section"},{"key":"edVin4x73n9","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"egPFuIRpHis","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ekuUlvnFeEv","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQLfwWgq6vW","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["edVin4x73n9","egPFuIRpHis","ekuUlvnFeEv"],"cl":"image"},{"key":"eB1YPAfMkfk","content":{"children":[]},"type":"section","children":["eQLfwWgq6vW"],"cl":"section"},{"key":"exMHaU8ANZS","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"esA9uARI0MP","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eNrP11wA2bp","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eSzN4nYPsxx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eFlKGN7_EHU","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e8tEMY4kH7U","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eXqZHViVaxA","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e6FHBdGqazH","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eZFLV0PqIqw","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e6FHBdGqazH"],"cl":"image"},{"key":"edt5oq43nuW","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e1E7v88Xla2","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["edt5oq43nuW"],"cl":"image"},{"key":"eOyR8fweKHn","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eo4H2x9Q1vn","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eOyR8fweKHn"],"cl":"image"},{"key":"ecgIY54UXFf","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eWbTSpICotq","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["ecgIY54UXFf"],"cl":"image"},{"key":"eaPnI0L_nGv","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eVIXc4b74gj","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eaPnI0L_nGv"],"cl":"image"},{"key":"edHwDeLnD5x","content":{"children":[]},"type":"section","children":["exMHaU8ANZS","esA9uARI0MP","eNrP11wA2bp","eSzN4nYPsxx","eFlKGN7_EHU","e8tEMY4kH7U","eXqZHViVaxA","eZFLV0PqIqw","e1E7v88Xla2","eo4H2x9Q1vn","eWbTSpICotq","eVIXc4b74gj"],"cl":"section"},{"key":"fixed","visibility":{"e-hp86buZNG":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"etQr4s2oELz":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eB1YPAfMkfk":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eP5MZESYa3L":true,"eqOWLjmxoSu":{"psl2oFOE4Bd":true},"eWQKmfTQhfA":{"pucgn6gc6Uj":true},"eg2CCFSKR_a":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"ew5IIdEVgXv":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"edHwDeLnD5x":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"}},"children":["eP5MZESYa3L","eWQKmfTQhfA","eqOWLjmxoSu","eg2CCFSKR_a","eB1YPAfMkfk","edHwDeLnD5x"]}],"pages":[{"key":"p-F1g4_isX_","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PnF7Ftm5Wz.png","path":"ad–amarok"},{"key":"p2qgtuWZB1N","title":"AD–ISC West","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"ad-isc-west"},{"key":"p5h_kZ2n3ey","title":"Threat Assessment-Feature","desc":"A comprehensive physical security threat assessment is a complex project, but it’s worth its weight in gold.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SfxMYaqwqx.jpg","path":"threat-assessment-feature"},{"key":"p78PirzFKFF","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MI16Skpueq.jpg","path":"table-of-contents"},{"key":"pBfho1pOuvk","title":"Post-Invasion in Ukraine-Feature","desc":"Business leaders should prepare now for the next major geopolitical crisis that could disrupt business models, supply chains and more.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zZ7lCcXmVT.jpg","path":"post-invasion-in-ukraine-feature"},{"key":"pBmvRok2OzA","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FixdzdYkFs.png","path":"ad–women-in-security"},{"key":"pCVkb_Xsd_F","title":"Product Spotlight-Department","desc":"Security magazine highlights a number of video surveillance solutions, including cameras and video management software (VMS).","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qj589pwzGK.jpg","path":"product-spotlight-department"},{"key":"pF6qX9ZMG5D","title":"Security Talk-Column","desc":"From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","path":"security-talk-column"},{"key":"pIwnrVwj84r","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pK25tXEC1jy","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pLbM3ev79cj","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pNVjXZIIZLC","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pNVjXZIIZLC/v/0.jpg","path":"xxxxx-column"},{"key":"pPUBwKfpFgk","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FtL2xMc4El.png","path":"online-contents"},{"key":"pS1Tfcpd8JI","title":"Emergency Management-Feature","desc":"Security leaders should consider regional differences when building emergency management plans.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CNoh-kv9Ei.jpg","path":"emergency-management-feature"},{"key":"pShEQg4qa83","title":"Leadership & Management-Column","desc":"Security leaders all want to prove their value, pull their weight, support the team. But saying no appropriately and strategically goes to the heart of leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","path":"leadership-management-column"},{"key":"pSwpjDhWW4x","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pThYgty7jUY","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0MsuS1HCpq.jpg","path":"advertising-index"},{"key":"pXUdVz43hEP","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4Rz5QZoLvp.png","path":"ad–webinar exterro"},{"key":"pXWJx3mGbH0","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lLcmFy20EM.png","path":"ad-dks"},{"key":"pY0W32-tfbm","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"peuA_bCQhe2","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad–house-onsolve-infocenter"},{"key":"pinLMnBXwIu","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pizTF41WuaU","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pjnidI_us3h","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ywf_uk77nH.jpg","path":"staff-listing"},{"key":"pmFPg4nZ5F7","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bZ8DDzdk9z.png","path":"ad-house-solutions-by-sector"},{"key":"pn5dyF2M6KI","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KlVHfF3vHC/pn5dyF2M6KI/v/0.jpg","path":"ad-xxxx"},{"key":"pq58xW4ikUr","title":"Cyber Tactics-Column","desc":"In today’s interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","path":"cyber-tactics-column"},{"key":"psl2oFOE4Bd","title":"Special Report-Data Driven Security Programs","desc":"Four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication, and security buy-in.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"special-report-data-driven-security-programs"},{"key":"pt4PpmVKjo8","title":"Career Intelligence-Column","desc":"When you present your successes to a future employer, articulate how your program proactively built coalitions to get ahead of future security risks. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mXrZ3KlZeQ.jpg","path":"career-intelligence-column"},{"key":"pu7LQf7smSw","title":"Education & Training-Column","desc":"Whirlpool Corporation Chief Security Officer Erik Antons discusses the unique security challenges in the manufacturing industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","path":"education-training-column"},{"key":"pucgn6gc6Uj","title":"Security February 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"","index":true},{"key":"pxeK2JZyeVM","title":"Global News & Analysis-Department","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/65mdSbuMWw.jpg","path":"global-news-analysis-department"},{"key":"pxtkdG5hJDn","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"FQPy-RD064":{"meta":{"width":423,"height":575,"description":"Clothing, Forehead, Smile, Chin, Outerwear, Eyebrow, Eye, Sleeve, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FQPy-RD064.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FQPy-RD064.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FQPy-RD064.jpg",575]]},"IUH9cV5TQA":{"meta":{"width":1200,"height":1600,"description":"Surveillance camera, Sky, Security"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1600]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]},"x_XqHGvGpT":{"meta":{"width":6500,"height":3500,"description":"Automotive lighting, Sky, Water, World"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg",2560]]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/qdfngdqavu1d5cacl0z4w/SEC_Feb-2024_Full-Issue.pdf?rlkey=1302pjuytmsty4f1418oatet5&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"Security February 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pXWJx3mGbH0"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pXUdVz43hEP"},"title":"AD–Webinar Exterro","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"Advertising Index","key":"uPMh_NLd5l"},{"link":{"mode":0,"page":"pBmvRok2OzA"},"title":"AD–Women in Security","key":"kB9L6SuPL7"},{"link":{"mode":0,"page":"pPUBwKfpFgk"},"title":"Online Contents","key":"wKbTE4Or0U"},{"link":{"mode":0,"page":"pF6qX9ZMG5D"},"title":"Security Talk-Column","key":"0553ttXvZ3"},{"link":{"mode":0,"page":"pxeK2JZyeVM"},"title":"Global News & Analysis-Department","key":"wwHf-iOcrS"},{"link":{"mode":0,"page":"psl2oFOE4Bd"},"title":"Special Report-Data Driven Security Programs","key":"KCVTlt-yvx"},{"link":{"mode":0,"page":"p-F1g4_isX_"},"title":"AD–Amarok","key":"V4a3G_7grC"},{"link":{"mode":0,"page":"pS1Tfcpd8JI"},"title":"Emergency Management-Feature","key":"70KLWZFVDZ"},{"link":{"mode":0,"page":"pmFPg4nZ5F7"},"title":"AD–Solutions by Sector","key":"s1q5oNEAAP"},{"link":{"mode":0,"page":"pBfho1pOuvk"},"title":"Post-Invasion in Ukraine-Feature","key":"bDMnKaoT-S"},{"link":{"mode":0,"page":"p2qgtuWZB1N"},"title":"AD–ISC West","key":"pyG8aXio6u"},{"link":{"mode":0,"page":"p5h_kZ2n3ey"},"title":"Threat Assessment-Feature","key":"1IiGzQc-Tp"},{"link":{"mode":0,"page":"pLbM3ev79cj"},"title":"AD–Security eNewsletter","key":"S8z-oSvaoM"},{"link":{"mode":0,"page":"pt4PpmVKjo8"},"title":"Career Intelligence-Column","key":"xrTLtEBXJW"},{"link":{"mode":0,"page":"pY0W32-tfbm"},"title":"AD–Security Bookstore","key":"e4o4oNa3o-"},{"link":{"mode":0,"page":"pShEQg4qa83"},"title":"Leadership & Management-Column","key":"nspYtbHpit"},{"link":{"mode":0,"page":"pIwnrVwj84r"},"title":"AD–LinkedIn","key":"aY13MM2R1O"},{"link":{"mode":0,"page":"pq58xW4ikUr"},"title":"Cyber Tactics-Column","key":"-eZX4bbemo"},{"link":{"mode":0,"page":"pK25tXEC1jy"},"title":"AD–Security Renewal","key":"FYhv05juf2"},{"link":{"mode":0,"page":"pu7LQf7smSw"},"title":"Education & Training-Column","key":"aymRvcXKGK"},{"link":{"mode":0,"page":"peuA_bCQhe2"},"title":"AD–OnSolve Infocenter","key":"n6HtLDS9H4"},{"link":{"mode":0,"page":"pCVkb_Xsd_F"},"title":"Product Spotlight-Department","key":"Ezd27IznRx"},{"link":{"mode":0,"page":"pxtkdG5hJDn"},"title":"AD–Continuing Education (CEU)","key":"mjwZwM4VvL"},{"link":{"mode":0,"page":"pinLMnBXwIu"},"title":"Classifieds","key":"92UnXdaR7k"},{"link":{"mode":0,"page":"pjnidI_us3h"},"title":"Staff Listing","key":"z0tldUdreC"},{"link":{"mode":0,"page":"pizTF41WuaU"},"title":"eMagazine Navigation Guide","key":"1uiFp8F5CQ"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}