Managing Editor\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eZxpn-U2RrE","content":{"src":{"key":"PAn9ZXRQfM","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"ebaxwq5ZKZz","content":{"text":"\u003ch1 >Balancing Efficiency with Security in Manufacturing\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eG0CDD0gdqE","content":{"text":"\u003ch2 >Whirlpool Corporation Chief Security Officer Erik Antons highlights the unique security issues in the manufacturing industry. \u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eE2mg5t66Fk","content":{"children":[]},"type":"section","children":["eBYMW7cI-ue","eZxpn-U2RrE","ebaxwq5ZKZz","eG0CDD0gdqE"],"cl":"section"},{"key":"eYKtc-kWfP1","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","key":"ioT_rcugnv"},"children":[]},"type":"image","cl":"image"},{"key":"eWwDoH-cQLS","content":{"text":"\u003cp >\u003cem >coffeekai / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eyCiDNPILQQ","content":{"children":[]},"type":"section","children":["eYKtc-kWfP1","eWwDoH-cQLS"],"cl":"section"},{"key":"el28cP4b9xF","content":{"text":"\u003cp >Manufacturing is an essential part of everyday life — from the cars on the road to the pens in your desk drawer, manufacturers keep the world running. When it comes to security, there are a lot of moving parts for manufacturers to consider —access management, supply chain, theft, intellectual property and more —in order to keep production on schedule. \u003c/p>\u003cp >Protecting \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/99562-how-to-protect-an-enterprises-intellectual-property\">intellectual property\u003c/a> is a top priority for security leaders in the manufacturing industry. At Whirlpool Corporation, Chief Security Officer Erik Antons says the company has more than 7,200 patents, including unique creations which the company has spent countless hours and dollars to develop. \u003c/p>\u003cp >“This is our intellectual property and for those who play by the rules, the path is long and incredibly expensive, marked with intense periods of experimentation, self-sacrifice and continuous improvement,” Antons says. “For those who don’t play by the rules, an alternative exists to this path — take the shortcut and steal the information — and the perpetrators of this theft can be massive competitors and state actors with nearly unlimited resources. So, intellectual property theft is a major area of concern for manufacturing organizations.”\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e-Cl9eZMyuw","content":{"children":[]},"type":"section","children":["el28cP4b9xF"],"cl":"section"},{"key":"eHEqAQ5etGx","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg","key":"BhRS29lp-i"},"children":[]},"type":"image","cl":"image"},{"key":"ezCt65LBAdh","content":{"text":"\u003ch1 >Security awareness programs are probably the most rewarding tools in our bags — they rarely cost much to employ, our employees actually learn skills and feel empowered, and they allow us to demonstrate clear value for the enterprise and we create agents of every person who attends.” \u003c/h1>\u003ch2 >— Erik Antons, Chief Security Officer at Whirlpool Corporation\u003c/h2>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"emjg5ycXmO1","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"erc5cM39vP3","content":{"children":[]},"type":"section","children":["eHEqAQ5etGx","ezCt65LBAdh","emjg5ycXmO1"],"cl":"section"},{"key":"ebHAhIb8NDa","content":{"text":"\u003cp >\u003cem >Headshot image courtesy of Antons\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eyDhalZ122E","content":{"children":[]},"type":"section","children":["ebHAhIb8NDa"],"cl":"section"},{"key":"eWmTvwFxlGO","content":{"text":"\u003cp >When it comes to assessing and mitigating risk within a \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/99714-protecting-manufacturing-and-warehousing-employees\" target=\"_blank\">manufacturing\u003c/a> environment, Antons says he employs many of the same tactics and techniques used in other industries. The company’s process first involved creating global standards and operating procedures, including technical standards, to establish minimal expectations for all sites around the globe.\u003c/p>\u003cp >“These are amalgamations of existing sources like International Organization for Standardization (ISO), American National Standards Institute (ANSI), American Society for Industrial Security (ASIS) and National Institute of Standards and Technology (NIST) and others which have been benchmarked from other organizations,” he continues. “Standards are great, but without enforcement, they’re nothing more than good ideas, so we needed to develop an enforcement mechanism.”\u003c/p>\u003cp >For this, an audit program was created that referenced global security standards and operating procedures, including a 147-point audit checklist which covers 10 different domains. \u003c/p>\u003cp >“The self-scoring checklist is easy enough for a senior guard to employ and is intended to take no longer than three to four hours to complete. Scores are automatically tabulated, improvement plans are created, and results auto-populate on a platform which we can access any time,” Antons says. “Additionally, we conduct formal gap analyses for our major owned and managed sites. Armed with this information, sites understand their vulnerabilities and have a clear remediation plan for meeting our standards. We then work directly with those sites to ensure compliance.”\u003c/p>\u003ch5 >Striking a Balance\u003c/h5>\u003cp >One challenge security leaders can face is finding a way to balance security measures with the need for operational efficiency within the manufacturing setting. Antons says it often requires hundreds of employees to work a single shift in a factory, so the company’s controls must be omnipresent yet discreet and, ideally, enhance production. \u003c/p>\u003cp >“For this reason, we often try to employ solutions which have the dual purpose of providing security but also enhancing the production process,” he says. “We can’t escape certain controls which do impede movement (e.g., employee turnstiles and/or badge readers), but we try to make this as simple as possible and ensure our solutions are aligned with risk.”\u003c/p>\u003cp >Antons adds that next-level programming involves creating a culture of security where employees understand risk and how to report it. \u003c/p>\u003cp >“For this reason, \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/keyword/3083-security-awareness\">security awareness\u003c/a> programs are probably the most rewarding tools in our bags — they rarely cost much to employ, our employees actually learn skills and feel empowered, and they allow us to demonstrate clear value for the enterprise and we create agents of every person who attends,” he says.\u003c/p>\u003ch5 >Workplace Violence Mitigation\u003c/h5>\u003cp >Manufacturing organizations can employ a large number of workers in order to build their products and while workplace violence isn’t unique to manufacturing, the sheer size of the workforce can exacerbate issues. No matter the size of the facility, security is everyone’s responsibility. \u003c/p>\u003cp >“Our employees must first understand what’s acceptable and what’s not. This starts with socializing company policy and should be an element of every security awareness presentation or training,” he says. “We then need to ensure our employees understand our promise to them should they witness something strange or against policy. This facilitates reporting. If we have this level of confidence in our system, our employees will report and can be counted on to act — to some extent — as our agents. The ultimate goal is to create a culture of security.”\u003c/p>\u003cp >Antons says Whirlpool’s workplace violence prevention program has intervened numerous times before violence either manifested or escalated. \u003c/p>\u003cp >“In 2022 we saw a significant uptick in the number of workplace violence incidents over the prior year, and we started to see this trend continue through the first half of 2023,” he adds. “We interpreted this as good news — our employees were aware of our program and felt empowered to report incidents, allowing us to intervene early. In some cases, we were able to provide support to people just going through a rough patch in their lives, and this has been very gratifying.”\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e85vGd_Fbnb","content":{"children":[]},"type":"section","children":["eWmTvwFxlGO"],"cl":"section"},{"key":"efOEQJ9HhJr","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"erGr_X5lJhd","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eoQXhpo5-bq","content":{"children":[]},"type":"section","children":["efOEQJ9HhJr","erGr_X5lJhd"],"cl":"section"},{"key":"pu7LQf7smSw","children":["e1NZkXtt_kR","eI5S4CudHYY","euGoLK9bWsU","eE2mg5t66Fk","eyCiDNPILQQ","e-Cl9eZMyuw","erc5cM39vP3","eyDhalZ122E","e85vGd_Fbnb","eoQXhpo5-bq"]},{"key":"eP5MZESYa3L","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eZHfPlZXqUX","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eWQKmfTQhfA","content":{"children":[],"linkUrl":"https://www.axis.com/products/axis-p38-series","adCreative":{"key":"IUH9cV5TQA","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg"},"ioDetailID":579415,"adSize":"Cover Sponsor","showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"February Sponsored BOX - LOGO","page":"pucgn6gc6Uj","pageName":"Security February 2024","key":"ee_weXbZSrW"},"advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eZHfPlZXqUX"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eqOWLjmxoSu","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eLmZ9nnWhu-","content":{"text":"\u003cp >february 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"e-CYNhDygwB","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eg2CCFSKR_a","content":{"children":[]},"type":"section","children":["eLmZ9nnWhu-","e-CYNhDygwB"],"cl":"section"},{"key":"edVin4x73n9","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"egPFuIRpHis","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ekuUlvnFeEv","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQLfwWgq6vW","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["edVin4x73n9","egPFuIRpHis","ekuUlvnFeEv"],"cl":"image"},{"key":"eB1YPAfMkfk","content":{"children":[]},"type":"section","children":["eQLfwWgq6vW"],"cl":"section"},{"key":"exMHaU8ANZS","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"esA9uARI0MP","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eNrP11wA2bp","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eSzN4nYPsxx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eFlKGN7_EHU","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e8tEMY4kH7U","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eXqZHViVaxA","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e6FHBdGqazH","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eZFLV0PqIqw","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e6FHBdGqazH"],"cl":"image"},{"key":"edt5oq43nuW","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e1E7v88Xla2","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["edt5oq43nuW"],"cl":"image"},{"key":"eOyR8fweKHn","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eo4H2x9Q1vn","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eOyR8fweKHn"],"cl":"image"},{"key":"ecgIY54UXFf","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eWbTSpICotq","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["ecgIY54UXFf"],"cl":"image"},{"key":"eaPnI0L_nGv","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eVIXc4b74gj","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eaPnI0L_nGv"],"cl":"image"},{"key":"edHwDeLnD5x","content":{"children":[]},"type":"section","children":["exMHaU8ANZS","esA9uARI0MP","eNrP11wA2bp","eSzN4nYPsxx","eFlKGN7_EHU","e8tEMY4kH7U","eXqZHViVaxA","eZFLV0PqIqw","e1E7v88Xla2","eo4H2x9Q1vn","eWbTSpICotq","eVIXc4b74gj"],"cl":"section"},{"key":"fixed","visibility":{"e-hp86buZNG":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"etQr4s2oELz":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eB1YPAfMkfk":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eP5MZESYa3L":true,"eqOWLjmxoSu":{"psl2oFOE4Bd":true},"eWQKmfTQhfA":{"pucgn6gc6Uj":true},"eg2CCFSKR_a":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"ew5IIdEVgXv":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"edHwDeLnD5x":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"}},"children":["eP5MZESYa3L","eWQKmfTQhfA","eqOWLjmxoSu","eg2CCFSKR_a","eB1YPAfMkfk","edHwDeLnD5x"]}],"pages":[{"key":"p-F1g4_isX_","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PnF7Ftm5Wz.png","path":"ad–amarok"},{"key":"p2qgtuWZB1N","title":"AD–ISC West","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"ad-isc-west"},{"key":"p5h_kZ2n3ey","title":"Threat Assessment-Feature","desc":"A comprehensive physical security threat assessment is a complex project, but it’s worth its weight in gold.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SfxMYaqwqx.jpg","path":"threat-assessment-feature"},{"key":"p78PirzFKFF","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MI16Skpueq.jpg","path":"table-of-contents"},{"key":"pBfho1pOuvk","title":"Post-Invasion in Ukraine-Feature","desc":"Business leaders should prepare now for the next major geopolitical crisis that could disrupt business models, supply chains and more.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zZ7lCcXmVT.jpg","path":"post-invasion-in-ukraine-feature"},{"key":"pBmvRok2OzA","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FixdzdYkFs.png","path":"ad–women-in-security"},{"key":"pCVkb_Xsd_F","title":"Product Spotlight-Department","desc":"Security magazine highlights a number of video surveillance solutions, including cameras and video management software (VMS).","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qj589pwzGK.jpg","path":"product-spotlight-department"},{"key":"pF6qX9ZMG5D","title":"Security Talk-Column","desc":"From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","path":"security-talk-column"},{"key":"pIwnrVwj84r","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pK25tXEC1jy","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pLbM3ev79cj","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pNVjXZIIZLC","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pNVjXZIIZLC/v/0.jpg","path":"xxxxx-column"},{"key":"pPUBwKfpFgk","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FtL2xMc4El.png","path":"online-contents"},{"key":"pS1Tfcpd8JI","title":"Emergency Management-Feature","desc":"Security leaders should consider regional differences when building emergency management plans.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CNoh-kv9Ei.jpg","path":"emergency-management-feature"},{"key":"pShEQg4qa83","title":"Leadership & Management-Column","desc":"Security leaders all want to prove their value, pull their weight, support the team. But saying no appropriately and strategically goes to the heart of leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","path":"leadership-management-column"},{"key":"pSwpjDhWW4x","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pThYgty7jUY","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0MsuS1HCpq.jpg","path":"advertising-index"},{"key":"pXUdVz43hEP","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4Rz5QZoLvp.png","path":"ad–webinar exterro"},{"key":"pXWJx3mGbH0","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lLcmFy20EM.png","path":"ad-dks"},{"key":"pY0W32-tfbm","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"peuA_bCQhe2","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad–house-onsolve-infocenter"},{"key":"pinLMnBXwIu","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pizTF41WuaU","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pjnidI_us3h","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ywf_uk77nH.jpg","path":"staff-listing"},{"key":"pmFPg4nZ5F7","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bZ8DDzdk9z.png","path":"ad-house-solutions-by-sector"},{"key":"pn5dyF2M6KI","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KlVHfF3vHC/pn5dyF2M6KI/v/0.jpg","path":"ad-xxxx"},{"key":"pq58xW4ikUr","title":"Cyber Tactics-Column","desc":"In today’s interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","path":"cyber-tactics-column"},{"key":"psl2oFOE4Bd","title":"Special Report-Data Driven Security Programs","desc":"Four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication, and security buy-in.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"special-report-data-driven-security-programs"},{"key":"pt4PpmVKjo8","title":"Career Intelligence-Column","desc":"When you present your successes to a future employer, articulate how your program proactively built coalitions to get ahead of future security risks. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mXrZ3KlZeQ.jpg","path":"career-intelligence-column"},{"key":"pu7LQf7smSw","title":"Education & Training-Column","desc":"Whirlpool Corporation Chief Security Officer Erik Antons discusses the unique security challenges in the manufacturing industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","path":"education-training-column"},{"key":"pucgn6gc6Uj","title":"Security February 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"","index":true},{"key":"pxeK2JZyeVM","title":"Global News & Analysis-Department","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/65mdSbuMWw.jpg","path":"global-news-analysis-department"},{"key":"pxtkdG5hJDn","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"BhRS29lp-i":{"meta":{"width":1500,"height":2100},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BhRS29lp-i.jpg",2100]]},"IUH9cV5TQA":{"meta":{"width":1200,"height":1600,"description":"Surveillance camera, Sky, Security"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1600]]},"PAn9ZXRQfM":{"meta":{"width":200,"height":200,"description":"Vision care, Glasses, Smile, Sleeve, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PAn9ZXRQfM.png",200]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"ioT_rcugnv":{"meta":{"width":6244,"height":4163,"description":"Hard hat, High-visibility clothing, Workwear, Tradesman, Helmet, Engineer, Engineering"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg",2560]]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/qdfngdqavu1d5cacl0z4w/SEC_Feb-2024_Full-Issue.pdf?rlkey=1302pjuytmsty4f1418oatet5&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"Security February 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pXWJx3mGbH0"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pXUdVz43hEP"},"title":"AD–Webinar Exterro","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"Advertising Index","key":"uPMh_NLd5l"},{"link":{"mode":0,"page":"pBmvRok2OzA"},"title":"AD–Women in Security","key":"kB9L6SuPL7"},{"link":{"mode":0,"page":"pPUBwKfpFgk"},"title":"Online Contents","key":"wKbTE4Or0U"},{"link":{"mode":0,"page":"pF6qX9ZMG5D"},"title":"Security Talk-Column","key":"0553ttXvZ3"},{"link":{"mode":0,"page":"pxeK2JZyeVM"},"title":"Global News & Analysis-Department","key":"wwHf-iOcrS"},{"link":{"mode":0,"page":"psl2oFOE4Bd"},"title":"Special Report-Data Driven Security Programs","key":"KCVTlt-yvx"},{"link":{"mode":0,"page":"p-F1g4_isX_"},"title":"AD–Amarok","key":"V4a3G_7grC"},{"link":{"mode":0,"page":"pS1Tfcpd8JI"},"title":"Emergency Management-Feature","key":"70KLWZFVDZ"},{"link":{"mode":0,"page":"pmFPg4nZ5F7"},"title":"AD–Solutions by Sector","key":"s1q5oNEAAP"},{"link":{"mode":0,"page":"pBfho1pOuvk"},"title":"Post-Invasion in Ukraine-Feature","key":"bDMnKaoT-S"},{"link":{"mode":0,"page":"p2qgtuWZB1N"},"title":"AD–ISC West","key":"pyG8aXio6u"},{"link":{"mode":0,"page":"p5h_kZ2n3ey"},"title":"Threat Assessment-Feature","key":"1IiGzQc-Tp"},{"link":{"mode":0,"page":"pLbM3ev79cj"},"title":"AD–Security eNewsletter","key":"S8z-oSvaoM"},{"link":{"mode":0,"page":"pt4PpmVKjo8"},"title":"Career Intelligence-Column","key":"xrTLtEBXJW"},{"link":{"mode":0,"page":"pY0W32-tfbm"},"title":"AD–Security Bookstore","key":"e4o4oNa3o-"},{"link":{"mode":0,"page":"pShEQg4qa83"},"title":"Leadership & Management-Column","key":"nspYtbHpit"},{"link":{"mode":0,"page":"pIwnrVwj84r"},"title":"AD–LinkedIn","key":"aY13MM2R1O"},{"link":{"mode":0,"page":"pq58xW4ikUr"},"title":"Cyber Tactics-Column","key":"-eZX4bbemo"},{"link":{"mode":0,"page":"pK25tXEC1jy"},"title":"AD–Security Renewal","key":"FYhv05juf2"},{"link":{"mode":0,"page":"pu7LQf7smSw"},"title":"Education & Training-Column","key":"aymRvcXKGK"},{"link":{"mode":0,"page":"peuA_bCQhe2"},"title":"AD–OnSolve Infocenter","key":"n6HtLDS9H4"},{"link":{"mode":0,"page":"pCVkb_Xsd_F"},"title":"Product Spotlight-Department","key":"Ezd27IznRx"},{"link":{"mode":0,"page":"pxtkdG5hJDn"},"title":"AD–Continuing Education (CEU)","key":"mjwZwM4VvL"},{"link":{"mode":0,"page":"pinLMnBXwIu"},"title":"Classifieds","key":"92UnXdaR7k"},{"link":{"mode":0,"page":"pjnidI_us3h"},"title":"Staff Listing","key":"z0tldUdreC"},{"link":{"mode":0,"page":"pizTF41WuaU"},"title":"eMagazine Navigation Guide","key":"1uiFp8F5CQ"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}