Contributing Writer\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eXDR2i2rE1N","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","key":"mDryoM81MQ","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eARg-i40b3f","content":{"text":"\u003ch1 >Learning to Say “No” in Your Security Career\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eft3O5A4Lcz","content":{"text":"\u003ch2 >Saying no appropriately and strategically goes to the heart of leadership.\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"etC5irQR2k9","content":{"children":[]},"type":"section","children":["eAqBPK7wLzf","eXDR2i2rE1N","eARg-i40b3f","eft3O5A4Lcz"],"cl":"section"},{"key":"exo1w9LMSWH","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","key":"6hSVJKafBI"},"children":[]},"type":"image","cl":"image"},{"key":"eZ88p4Jd7v6","content":{"text":"\u003cp >\u003cem >Prostock-Studio / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"e0F5s_3C2_8","content":{"children":[]},"type":"section","children":["exo1w9LMSWH","eZ88p4Jd7v6"],"cl":"section"},{"key":"eXBaShL9wsU","content":{"text":"\u003cp >Security has the reputation of being the “Department of ‘No.’” No, that risk is too great. No, we can’t take the chance. No, the likelihood of failure is too high. Most of us in the profession believe that the role of the security executive is not to say “no,” but to lay out the risks, costs, relevant factors and let the business or asset owner make an informed decision whether to go forward.\u003c/p>\u003cp >On a personal level, however, it’s imperative to sometimes offer a firm “no.” Not on whether to take a risk, but whether to take on \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://wwwhttps:/www.securitymagazine.com/articles/99754-growing-into-security-leadership.securitymagazine.com/articles/99754-growing-into-security-leadership\">a new role\u003c/a> or responsibility, volunteer at an association, earn a credential present at a conference, help with a job search, write an article, or take on a mentee.\u003c/p>\u003cp >During the COVID-19 pandemic, security departments found themselves with new duties, some of which naturally aligned with their mission — such as business continuity — and some that appeared to be one-offs, such as enforcing masking rules and making decisions on air filtration. In the aftermath, some security departments gained lasting health and safety duties without a concomitant increase in resources. In an emergency, saying no can kill your career and cripple your employer.\u003c/p>\u003cp >But most of the requests we receive don’t involve emergencies.\u003c/p>\u003cp >We all want to prove our value, pull our weight, support the team. Most of us are inherent helpers, protectors, and all-around doers. It’s in our DNA. But saying no appropriately and strategically goes to the heart of \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/blogs/14-security-blog/post/99399-leadership-is-more-than-a-noun\">leadership\u003c/a>.\u003c/p>\u003cp >I should know. I’ve never mastered it. And I’m not alone.\u003c/p>\u003cp >I asked a couple of colleagues to weigh in on this issue — a C suite advisor/consultant and a corporate security executive.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eqI0SZsXDCe","content":{"children":[]},"type":"section","children":["eXBaShL9wsU"],"cl":"section"},{"key":"eaJEQQxcXTH","content":{"text":"\u003ch1 >Saying yes to yourself is critical, and you only have time to say that if you give yourself permission to say no to others.” \u003c/h1>\u003ch2 >— Angela Scalpello\u003c/h2>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"e3b_sc2zsX5","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eJqExdr3Eol","content":{"children":[]},"type":"section","children":["eaJEQQxcXTH","e3b_sc2zsX5"],"cl":"section"},{"key":"ezDqHQgKjRt","content":{"text":"\u003cp >“I have to admit, I also struggle with saying no,” says Angela Scalpello, a Corporate Advisor who often works with security professionals. She has developed a system for evaluating requests for her time and assistance. “I ask for more time. Then I sit with the feeling of ‘how will I feel if I say yes?’” she explains. “If it’s overwhelmed, or stressed, or slightly resentful, I know I need to say no.” The process doesn’t end there. “Then I sit again, and if I feel I need to make time [for the request], I feel more guided.”\u003c/p>\u003cp >What about the feeling of guilt or sense you’ve let someone down?\u003c/p>\u003cp >“Sometimes I think, ‘Why is everyone else allowed to say no except me?’” Scalpello says. “The ability to choose wisely makes us more effective in the things we say yes to.”\u003c/p>\u003cp >As a security leader, Farhad Tajali, Director, Global Security Systems and Data Analytics at Creative Artists Agency, must team with various internal stakeholders as well as executive leadership. He notes that saying “yes” Is often seen as a facilitator of business and positive collaboration. But saying no is critical for being an effective leader. Saying no may be a way to uphold standards and protocols, prevent overextension of resources, and “protect against security threats that may arise from taking on too many projects and commitments,” Tajali says. “Additionally, saying no can help maintain strategic focus, ensuring that the organization’s security posture aligns with its overall goals and risk tolerance.”\u003c/p>\u003cp >Saying yes to everyone and everything also takes a personal toll. “Self-care, especially in [the security] profession, is really important,” Scalpello says. “Saying yes to yourself is critical, and you only have time to say that if you give yourself permission to say no to others.”\u003c/p>\u003cp >Letting someone down is easier if you don’t make it personal. If your boss asks you to do something that is voluntary or tangential to your job, an effective response might be that you fear that you may not be able to accomplish the task at your traditional level of excellence given constraints such as time and resources. In that case, saying no benefits the department and the organization.\u003c/p>\u003cp >For requests that don’t come from a direct superior, such as to co-present at a conference or actively help them search for a job, Scalpello sums it up nicely: “The question to ask yourself is, do I really believe in the person and the purpose, and do I really have the bandwidth to do this?”\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e0mdMgPszSo","content":{"children":[]},"type":"section","children":["ezDqHQgKjRt"],"cl":"section"},{"key":"ehfOnjBXlGz","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"e2Hp2GP6-R3","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ekZ8cWB4jmM","content":{"children":[]},"type":"section","children":["ehfOnjBXlGz","e2Hp2GP6-R3"],"cl":"section"},{"key":"er6L0WgH-ro","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem >Columnist image courtesy of Gips\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"el2Y3QpL7ky","content":{"children":[]},"type":"section","children":["er6L0WgH-ro"],"cl":"section"},{"key":"pShEQg4qa83","children":["eeGnrxLFzTJ","eVVE6ZfYePS","eQ3USlM-xKC","etC5irQR2k9","e0F5s_3C2_8","eqI0SZsXDCe","eJqExdr3Eol","e0mdMgPszSo","ekZ8cWB4jmM","el2Y3QpL7ky"]},{"key":"eP5MZESYa3L","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eZHfPlZXqUX","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eWQKmfTQhfA","content":{"children":[],"linkUrl":"https://www.axis.com/products/axis-p38-series","adCreative":{"key":"IUH9cV5TQA","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg"},"ioDetailID":579415,"adSize":"Cover Sponsor","showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"February Sponsored BOX - LOGO","page":"pucgn6gc6Uj","pageName":"Security February 2024","key":"ee_weXbZSrW"},"advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eZHfPlZXqUX"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eqOWLjmxoSu","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eLmZ9nnWhu-","content":{"text":"\u003cp >february 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"e-CYNhDygwB","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eg2CCFSKR_a","content":{"children":[]},"type":"section","children":["eLmZ9nnWhu-","e-CYNhDygwB"],"cl":"section"},{"key":"edVin4x73n9","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"egPFuIRpHis","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ekuUlvnFeEv","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQLfwWgq6vW","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["edVin4x73n9","egPFuIRpHis","ekuUlvnFeEv"],"cl":"image"},{"key":"eB1YPAfMkfk","content":{"children":[]},"type":"section","children":["eQLfwWgq6vW"],"cl":"section"},{"key":"exMHaU8ANZS","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"esA9uARI0MP","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eNrP11wA2bp","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eSzN4nYPsxx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eFlKGN7_EHU","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e8tEMY4kH7U","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eXqZHViVaxA","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e6FHBdGqazH","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eZFLV0PqIqw","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e6FHBdGqazH"],"cl":"image"},{"key":"edt5oq43nuW","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e1E7v88Xla2","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["edt5oq43nuW"],"cl":"image"},{"key":"eOyR8fweKHn","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eo4H2x9Q1vn","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eOyR8fweKHn"],"cl":"image"},{"key":"ecgIY54UXFf","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eWbTSpICotq","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["ecgIY54UXFf"],"cl":"image"},{"key":"eaPnI0L_nGv","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eVIXc4b74gj","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eaPnI0L_nGv"],"cl":"image"},{"key":"edHwDeLnD5x","content":{"children":[]},"type":"section","children":["exMHaU8ANZS","esA9uARI0MP","eNrP11wA2bp","eSzN4nYPsxx","eFlKGN7_EHU","e8tEMY4kH7U","eXqZHViVaxA","eZFLV0PqIqw","e1E7v88Xla2","eo4H2x9Q1vn","eWbTSpICotq","eVIXc4b74gj"],"cl":"section"},{"key":"fixed","visibility":{"e-hp86buZNG":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"etQr4s2oELz":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eB1YPAfMkfk":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eP5MZESYa3L":true,"eqOWLjmxoSu":{"psl2oFOE4Bd":true},"eWQKmfTQhfA":{"pucgn6gc6Uj":true},"eg2CCFSKR_a":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"ew5IIdEVgXv":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"edHwDeLnD5x":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"}},"children":["eP5MZESYa3L","eWQKmfTQhfA","eqOWLjmxoSu","eg2CCFSKR_a","eB1YPAfMkfk","edHwDeLnD5x"]}],"pages":[{"key":"p-F1g4_isX_","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PnF7Ftm5Wz.png","path":"ad–amarok"},{"key":"p2qgtuWZB1N","title":"AD–ISC West","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"ad-isc-west"},{"key":"p5h_kZ2n3ey","title":"Threat Assessment-Feature","desc":"A comprehensive physical security threat assessment is a complex project, but it’s worth its weight in gold.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SfxMYaqwqx.jpg","path":"threat-assessment-feature"},{"key":"p78PirzFKFF","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MI16Skpueq.jpg","path":"table-of-contents"},{"key":"pBfho1pOuvk","title":"Post-Invasion in Ukraine-Feature","desc":"Business leaders should prepare now for the next major geopolitical crisis that could disrupt business models, supply chains and more.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zZ7lCcXmVT.jpg","path":"post-invasion-in-ukraine-feature"},{"key":"pBmvRok2OzA","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FixdzdYkFs.png","path":"ad–women-in-security"},{"key":"pCVkb_Xsd_F","title":"Product Spotlight-Department","desc":"Security magazine highlights a number of video surveillance solutions, including cameras and video management software (VMS).","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qj589pwzGK.jpg","path":"product-spotlight-department"},{"key":"pF6qX9ZMG5D","title":"Security Talk-Column","desc":"From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","path":"security-talk-column"},{"key":"pIwnrVwj84r","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pK25tXEC1jy","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pLbM3ev79cj","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pNVjXZIIZLC","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pNVjXZIIZLC/v/0.jpg","path":"xxxxx-column"},{"key":"pPUBwKfpFgk","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FtL2xMc4El.png","path":"online-contents"},{"key":"pS1Tfcpd8JI","title":"Emergency Management-Feature","desc":"Security leaders should consider regional differences when building emergency management plans.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CNoh-kv9Ei.jpg","path":"emergency-management-feature"},{"key":"pShEQg4qa83","title":"Leadership & Management-Column","desc":"Security leaders all want to prove their value, pull their weight, support the team. But saying no appropriately and strategically goes to the heart of leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","path":"leadership-management-column"},{"key":"pSwpjDhWW4x","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pThYgty7jUY","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0MsuS1HCpq.jpg","path":"advertising-index"},{"key":"pXUdVz43hEP","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4Rz5QZoLvp.png","path":"ad–webinar exterro"},{"key":"pXWJx3mGbH0","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lLcmFy20EM.png","path":"ad-dks"},{"key":"pY0W32-tfbm","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"peuA_bCQhe2","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad–house-onsolve-infocenter"},{"key":"pinLMnBXwIu","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pizTF41WuaU","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pjnidI_us3h","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ywf_uk77nH.jpg","path":"staff-listing"},{"key":"pmFPg4nZ5F7","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bZ8DDzdk9z.png","path":"ad-house-solutions-by-sector"},{"key":"pn5dyF2M6KI","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KlVHfF3vHC/pn5dyF2M6KI/v/0.jpg","path":"ad-xxxx"},{"key":"pq58xW4ikUr","title":"Cyber Tactics-Column","desc":"In today’s interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","path":"cyber-tactics-column"},{"key":"psl2oFOE4Bd","title":"Special Report-Data Driven Security Programs","desc":"Four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication, and security buy-in.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"special-report-data-driven-security-programs"},{"key":"pt4PpmVKjo8","title":"Career Intelligence-Column","desc":"When you present your successes to a future employer, articulate how your program proactively built coalitions to get ahead of future security risks. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mXrZ3KlZeQ.jpg","path":"career-intelligence-column"},{"key":"pu7LQf7smSw","title":"Education & Training-Column","desc":"Whirlpool Corporation Chief Security Officer Erik Antons discusses the unique security challenges in the manufacturing industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","path":"education-training-column"},{"key":"pucgn6gc6Uj","title":"Security February 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"","index":true},{"key":"pxeK2JZyeVM","title":"Global News & Analysis-Department","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/65mdSbuMWw.jpg","path":"global-news-analysis-department"},{"key":"pxtkdG5hJDn","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6hSVJKafBI":{"meta":{"width":5338,"height":3280,"description":"Sports gear, Sleeve, Gesture, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg",2560]]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IUH9cV5TQA":{"meta":{"width":1200,"height":1600,"description":"Surveillance camera, Sky, Security"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1600]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"mDryoM81MQ":{"meta":{"width":400,"height":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/qdfngdqavu1d5cacl0z4w/SEC_Feb-2024_Full-Issue.pdf?rlkey=1302pjuytmsty4f1418oatet5&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"Security February 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pXWJx3mGbH0"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pXUdVz43hEP"},"title":"AD–Webinar Exterro","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"Advertising Index","key":"uPMh_NLd5l"},{"link":{"mode":0,"page":"pBmvRok2OzA"},"title":"AD–Women in Security","key":"kB9L6SuPL7"},{"link":{"mode":0,"page":"pPUBwKfpFgk"},"title":"Online Contents","key":"wKbTE4Or0U"},{"link":{"mode":0,"page":"pF6qX9ZMG5D"},"title":"Security Talk-Column","key":"0553ttXvZ3"},{"link":{"mode":0,"page":"pxeK2JZyeVM"},"title":"Global News & Analysis-Department","key":"wwHf-iOcrS"},{"link":{"mode":0,"page":"psl2oFOE4Bd"},"title":"Special Report-Data Driven Security Programs","key":"KCVTlt-yvx"},{"link":{"mode":0,"page":"p-F1g4_isX_"},"title":"AD–Amarok","key":"V4a3G_7grC"},{"link":{"mode":0,"page":"pS1Tfcpd8JI"},"title":"Emergency Management-Feature","key":"70KLWZFVDZ"},{"link":{"mode":0,"page":"pmFPg4nZ5F7"},"title":"AD–Solutions by Sector","key":"s1q5oNEAAP"},{"link":{"mode":0,"page":"pBfho1pOuvk"},"title":"Post-Invasion in Ukraine-Feature","key":"bDMnKaoT-S"},{"link":{"mode":0,"page":"p2qgtuWZB1N"},"title":"AD–ISC West","key":"pyG8aXio6u"},{"link":{"mode":0,"page":"p5h_kZ2n3ey"},"title":"Threat Assessment-Feature","key":"1IiGzQc-Tp"},{"link":{"mode":0,"page":"pLbM3ev79cj"},"title":"AD–Security eNewsletter","key":"S8z-oSvaoM"},{"link":{"mode":0,"page":"pt4PpmVKjo8"},"title":"Career Intelligence-Column","key":"xrTLtEBXJW"},{"link":{"mode":0,"page":"pY0W32-tfbm"},"title":"AD–Security Bookstore","key":"e4o4oNa3o-"},{"link":{"mode":0,"page":"pShEQg4qa83"},"title":"Leadership & Management-Column","key":"nspYtbHpit"},{"link":{"mode":0,"page":"pIwnrVwj84r"},"title":"AD–LinkedIn","key":"aY13MM2R1O"},{"link":{"mode":0,"page":"pq58xW4ikUr"},"title":"Cyber Tactics-Column","key":"-eZX4bbemo"},{"link":{"mode":0,"page":"pK25tXEC1jy"},"title":"AD–Security Renewal","key":"FYhv05juf2"},{"link":{"mode":0,"page":"pu7LQf7smSw"},"title":"Education & Training-Column","key":"aymRvcXKGK"},{"link":{"mode":0,"page":"peuA_bCQhe2"},"title":"AD–OnSolve Infocenter","key":"n6HtLDS9H4"},{"link":{"mode":0,"page":"pCVkb_Xsd_F"},"title":"Product Spotlight-Department","key":"Ezd27IznRx"},{"link":{"mode":0,"page":"pxtkdG5hJDn"},"title":"AD–Continuing Education (CEU)","key":"mjwZwM4VvL"},{"link":{"mode":0,"page":"pinLMnBXwIu"},"title":"Classifieds","key":"92UnXdaR7k"},{"link":{"mode":0,"page":"pjnidI_us3h"},"title":"Staff Listing","key":"z0tldUdreC"},{"link":{"mode":0,"page":"pizTF41WuaU"},"title":"eMagazine Navigation Guide","key":"1uiFp8F5CQ"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}