Editor in Chief\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eHHJr2qfpVj","content":{"src":{"key":"54nd1t6Yeu","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","ratio":1.025236593059937},"children":[]},"type":"image","cl":"image"},{"key":"ekSShWp_4cp","content":{"text":"\u003ch1 >The Voices of Security\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eRPOLn9G7y6","content":{"text":"\u003ch2 >Each week, security leaders share professional and personal stories from their security careers in episodes of The \u003cem >Security\u003c/em> Podcasts.\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eUHy23CnKtF","content":{"children":[]},"type":"section","children":["erQPO05x8dK","eHHJr2qfpVj","ekSShWp_4cp","eRPOLn9G7y6"],"cl":"section"},{"key":"e7iMVMig10o","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","key":"Sc_HOPVrx9"},"children":[]},"type":"image","cl":"image"},{"key":"e0Yj7XKQLxK","content":{"text":"\u003cp >\u003cem >artiemedvedev / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eC9b2OC_vBW","content":{"src":{"key":"Jeyi1yhZQ4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Jeyi1yhZQ4.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"e3ALwqOi63h","content":{"children":[]},"type":"section","children":["e7iMVMig10o","e0Yj7XKQLxK","eC9b2OC_vBW"],"cl":"section"},{"key":"eX0OcRxsRD9","content":{"text":"\u003cp >As one of the preeminent security executive publications, the editorial team at \u003cem >Security\u003c/em> magazine works to center the voices of security leaders via as many routes as possible. One of these avenues is via our podcast channel, The \u003cem >Security\u003c/em> Podcasts.\u003c/p>\u003cp >In addition to our monthly eMagazine and constant web coverage,\u003cem > Security\u003c/em> magazine releases bite-sized podcast episodes featuring cybersecurity and physical security leaders from across the industry. From team leadership advice to explorations of emerging security threats, our podcast guests share stories from their careers for the betterment of the industry at large.\u003c/p>\u003cp >The episodes below represent a selection of dynamic conversations \u003cem >Security\u003c/em> editors have had with security professionals about current trends, predictions for the future of the industry, and more.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e0FNuN4Wfd5","content":{"children":[]},"type":"section","children":["eX0OcRxsRD9"],"cl":"section"},{"key":"e-JeEv4oMwn","content":{"text":"\u003cp >advertisement\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"enAUyhmKK51","content":{"children":[]},"type":"section","children":["e-JeEv4oMwn"],"cl":"section"},{"key":"emCce9xbiTG","content":{"children":[],"linkUrl":"https://www.idisglobal.com/","ioDetailID":"582821","adCreative":{"key":"gvx8fxxcat","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg"},"adSize":"1/2 Horizontal","advertiserName":"IDIS"},"type":"wTnDfofkley","cl":"wTnDfofkley"},{"key":"elTIUWQa7ir","content":{"text":"\u003cp >advertisement\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"etW1XvPsyDr","content":{"children":[]},"type":"section","children":["elTIUWQa7ir"],"cl":"section"},{"key":"eeEnNRUQRmO","content":{"text":"\u003ch2 >Strong Security Posture Means Building Effective Partnerships\u003c/h2>\u003cp >“If your image of a hacker is still the disaffected 20-something living in his mother’s basement, that’s not the adversaries that we’re talking about.” \u003cem >— Michael Daniel, President & CEO at Cyber Threat Alliance\u003c/em>\u003c/p>\u003cp >Michael Daniel, President & CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations, as well as the challenges faced when establishing effective partnerships in the security industry.\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"ejdmxY3o5ta","content":{"src":{"key":"v49a3xv6mW","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v49a3xv6mW.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eiMVBHN7hS4","content":{"controls":true,"auto":false,"variant":1,"rangeColor":"0c8484","rangeBg":"45506a","children":[],"url":"https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Michael-Daniel-Podcast-with-ADs.mp3?1700660947"},"type":"w781zgam","icons":{"play":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z"],"pause":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm-16 328c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160zm112 0c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160z"]},"cl":"w781zgam"},{"key":"eULk49rf5Gk","content":{"text":"\u003cp >\u003cstrong >LISTEN HERE NOW!\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"eI4WXtJR-Qx","content":{"children":[]},"type":"section","children":["eeEnNRUQRmO","ejdmxY3o5ta","eiMVBHN7hS4","eULk49rf5Gk"],"cl":"section"},{"key":"eNotFbwTZv-","content":{"text":"\u003ch2 >AMA: Healthcare Security Leader Edition — Holly Rasche\u003c/h2>\u003cp >“Interdepartmental collaboration is a vital piece of having a successful security department in healthcare. Our officers really touch every facet of the organization.” \u003cem >— Holly Rasche, Director of Security Management Services at Northwest Community Healthcare\u003c/em>\u003c/p>\u003cp >What are the unique challenges of securing a healthcare environment? How do you keep security team morale up? What are the most rewarding parts of a career in hospital security? This AMA episode features Holly Rasche, Director of Security Management Services at Northwest Community Healthcare. Rasche shares the lessons she’s learned from her 26-year career in hospital security, covering topics from how COVID-19 changed the security landscape to the benefits/challenges of contract vs. proprietary security guards in healthcare.\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"eMbQ3jp-iUi","content":{"src":{"key":"v49a3xv6mW","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v49a3xv6mW.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eIDAdSev7lR","content":{"controls":true,"auto":false,"variant":1,"rangeColor":"0c8484","rangeBg":"45506a","children":[],"url":"https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/09-20-23-AMA-Holly-Rasche-podcast.mp3?1695222077"},"type":"w781zgam","icons":{"play":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z"],"pause":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm-16 328c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160zm112 0c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160z"]},"cl":"w781zgam"},{"key":"eO5eqNjiENS","content":{"text":"\u003cp >\u003cstrong >LISTEN HERE NOW!\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"eiiigDZKT5N","content":{"children":[]},"type":"section","children":["eNotFbwTZv-","eMbQ3jp-iUi","eIDAdSev7lR","eO5eqNjiENS"],"cl":"section"},{"key":"eNNYEe_LYQt","content":{"text":"\u003ch2 >How to Build Future Security Leaders\u003c/h2>\u003cp >“Cybersecurity leaders in general have this image in their head of what they want. ‘I need a CISSP. I need someone that’s been in the industry from 10 to 15 years… In reality, sometimes your best [cybersecurity team] members don’t have that kind of experience.” \u003cem >— George Gerchow, Chief Security Officer at Sumo Logic\u003c/em>\u003c/p>\u003cp >What challenges do aspiring cybersecurity leaders face while trying to join the field? What can current security leaders do to help them? Answer these questions and more with George Gerchow, Chief Security Officer at Sumo Logic.\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"eKeHgB_GguP","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v49a3xv6mW.svg","key":"v49a3xv6mW","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eGZPA1hVhNP","content":{"controls":true,"auto":false,"variant":1,"rangeColor":"0c8484","rangeBg":"45506a","children":[],"url":"https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/11.8.2023-George-Gerchow.mp3?1699448430"},"type":"w781zgam","icons":{"play":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z"],"pause":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm-16 328c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160zm112 0c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160z"]},"cl":"w781zgam"},{"key":"eEQehacglUH","content":{"text":"\u003cp >\u003cstrong >LISTEN HERE NOW!\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"eaRd9fzy4Dk","content":{"children":[]},"type":"section","children":["eNNYEe_LYQt","eKeHgB_GguP","eGZPA1hVhNP","eEQehacglUH"],"cl":"section"},{"key":"eD91rMFqbJg","content":{"text":"\u003ch2 >The Cybersecurity and Geopolitical Discussion — Inside Cryptocurrency — Episode 18\u003c/h2>\u003cp >“For the first time in history, criminal gangs can launder hundreds of millions instantly with absolutely no concern.” \u003cem >— Lisa Forte, Partner at Red Goat Security\u003c/em>\u003c/p>\u003cp >Welcome to the enigmatic and frequently problematic world of cryptocurrency. In Episode 18 of The Cybersecurity & Geopolitical Discussion, Lisa Forte, Partner at Red Goat Security, Phil Ingram, MBE, of Grey Hare Media and Ian Thornton-Trump CD, Chief Information Security Officer (CISO) at Cyjax discuss the wide-ranging impact crypto has on geopolitical and economic conflict.\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"e4WObsJW7yl","content":{"src":{"key":"v49a3xv6mW","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v49a3xv6mW.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eQhRK_LBIPi","content":{"controls":true,"auto":false,"variant":1,"rangeColor":"0c8484","rangeBg":"45506a","children":[],"url":"https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/GCP-11-23--Audio-only-version.mp3?1701872297"},"type":"w781zgam","icons":{"play":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z"],"pause":[512,512,"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm-16 328c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160zm112 0c0 8.8-7.2 16-16 16h-48c-8.8 0-16-7.2-16-16V176c0-8.8 7.2-16 16-16h48c8.8 0 16 7.2 16 16v160z"]},"cl":"w781zgam"},{"key":"emsAJEOu3HY","content":{"text":"\u003cp >\u003cstrong >LISTEN HERE NOW!\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pYs9jY5YWIM"},{"key":"el1k3eV_aHX","content":{"children":[]},"type":"section","children":["eD91rMFqbJg","e4WObsJW7yl","eQhRK_LBIPi","emsAJEOu3HY"],"cl":"section"},{"key":"e7OyXI5MCJs","content":{"text":"\u003cp >Take a listen and subscribe to our podcast channel for high-level, strategic security content directly from experts in the field. New episodes are released on Wednesdays directly to the \u003cem >Security\u003c/em> magazine website, Spotify and Apple Podcasts. Don’t forget to rate and review The \u003cem >Security\u003c/em> Podcasts on Spotify and Apple Podcasts to support future episodes.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"efo7v5GletE","content":{"children":[]},"type":"section","children":["e7OyXI5MCJs"],"cl":"section"},{"key":"eVXiuN8-kuO","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eiN7cw5XDV5","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"e5487Ej2f4l","content":{"children":[]},"type":"section","children":["eVXiuN8-kuO","eiN7cw5XDV5"],"cl":"section"},{"key":"pF6qX9ZMG5D","children":["eWEXIpoici-","eNNUDbsTARg","eQzr2xDWqwY","eUHy23CnKtF","e3ALwqOi63h","e0FNuN4Wfd5","enAUyhmKK51","emCce9xbiTG","etW1XvPsyDr","eI4WXtJR-Qx","eiiigDZKT5N","eaRd9fzy4Dk","el1k3eV_aHX","efo7v5GletE","e5487Ej2f4l"]},{"key":"eP5MZESYa3L","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eZHfPlZXqUX","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eWQKmfTQhfA","content":{"children":[],"linkUrl":"https://www.axis.com/products/axis-p38-series","adCreative":{"key":"IUH9cV5TQA","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg"},"ioDetailID":579415,"adSize":"Cover Sponsor","showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"February Sponsored BOX - LOGO","page":"pucgn6gc6Uj","pageName":"Security February 2024","key":"ee_weXbZSrW"},"advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eZHfPlZXqUX"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eqOWLjmxoSu","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eLmZ9nnWhu-","content":{"text":"\u003cp >february 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"e-CYNhDygwB","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eg2CCFSKR_a","content":{"children":[]},"type":"section","children":["eLmZ9nnWhu-","e-CYNhDygwB"],"cl":"section"},{"key":"edVin4x73n9","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"egPFuIRpHis","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ekuUlvnFeEv","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQLfwWgq6vW","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["edVin4x73n9","egPFuIRpHis","ekuUlvnFeEv"],"cl":"image"},{"key":"eB1YPAfMkfk","content":{"children":[]},"type":"section","children":["eQLfwWgq6vW"],"cl":"section"},{"key":"exMHaU8ANZS","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"esA9uARI0MP","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eNrP11wA2bp","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eSzN4nYPsxx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eFlKGN7_EHU","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e8tEMY4kH7U","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eXqZHViVaxA","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"e6FHBdGqazH","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eZFLV0PqIqw","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["e6FHBdGqazH"],"cl":"image"},{"key":"edt5oq43nuW","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e1E7v88Xla2","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["edt5oq43nuW"],"cl":"image"},{"key":"eOyR8fweKHn","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eo4H2x9Q1vn","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eOyR8fweKHn"],"cl":"image"},{"key":"ecgIY54UXFf","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eWbTSpICotq","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["ecgIY54UXFf"],"cl":"image"},{"key":"eaPnI0L_nGv","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eVIXc4b74gj","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eaPnI0L_nGv"],"cl":"image"},{"key":"edHwDeLnD5x","content":{"children":[]},"type":"section","children":["exMHaU8ANZS","esA9uARI0MP","eNrP11wA2bp","eSzN4nYPsxx","eFlKGN7_EHU","e8tEMY4kH7U","eXqZHViVaxA","eZFLV0PqIqw","e1E7v88Xla2","eo4H2x9Q1vn","eWbTSpICotq","eVIXc4b74gj"],"cl":"section"},{"key":"fixed","visibility":{"e-hp86buZNG":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"etQr4s2oELz":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eB1YPAfMkfk":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"eP5MZESYa3L":true,"eqOWLjmxoSu":{"psl2oFOE4Bd":true},"eWQKmfTQhfA":{"pucgn6gc6Uj":true},"eg2CCFSKR_a":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"ew5IIdEVgXv":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","psl2oFOE4Bd":"footer","pCVkb_Xsd_F":"footer","pPUBwKfpFgk":"footer","pSwpjDhWW4x":"footer","pF6qX9ZMG5D":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"},"edHwDeLnD5x":{"pShEQg4qa83":"footer","p5h_kZ2n3ey":"footer","pq58xW4ikUr":"footer","pPUBwKfpFgk":"footer","pCVkb_Xsd_F":"footer","psl2oFOE4Bd":"footer","pSwpjDhWW4x":"footer","pxeK2JZyeVM":"footer","pBfho1pOuvk":"footer","pF6qX9ZMG5D":"footer","p78PirzFKFF":"footer","pt4PpmVKjo8":"footer","pjnidI_us3h":"footer","pNVjXZIIZLC":"footer","pu7LQf7smSw":"footer","pThYgty7jUY":"footer","pinLMnBXwIu":"footer","pizTF41WuaU":"footer","pS1Tfcpd8JI":"footer"}},"children":["eP5MZESYa3L","eWQKmfTQhfA","eqOWLjmxoSu","eg2CCFSKR_a","eB1YPAfMkfk","edHwDeLnD5x"]}],"pages":[{"key":"p-F1g4_isX_","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PnF7Ftm5Wz.png","path":"ad–amarok"},{"key":"p2qgtuWZB1N","title":"AD–ISC West","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"ad-isc-west"},{"key":"p5h_kZ2n3ey","title":"Threat Assessment-Feature","desc":"A comprehensive physical security threat assessment is a complex project, but it’s worth its weight in gold.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SfxMYaqwqx.jpg","path":"threat-assessment-feature"},{"key":"p78PirzFKFF","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MI16Skpueq.jpg","path":"table-of-contents"},{"key":"pBfho1pOuvk","title":"Post-Invasion in Ukraine-Feature","desc":"Business leaders should prepare now for the next major geopolitical crisis that could disrupt business models, supply chains and more.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zZ7lCcXmVT.jpg","path":"post-invasion-in-ukraine-feature"},{"key":"pBmvRok2OzA","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FixdzdYkFs.png","path":"ad–women-in-security"},{"key":"pCVkb_Xsd_F","title":"Product Spotlight-Department","desc":"Security magazine highlights a number of video surveillance solutions, including cameras and video management software (VMS).","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qj589pwzGK.jpg","path":"product-spotlight-department"},{"key":"pF6qX9ZMG5D","title":"Security Talk-Column","desc":"From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","path":"security-talk-column"},{"key":"pIwnrVwj84r","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pK25tXEC1jy","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pLbM3ev79cj","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pNVjXZIIZLC","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pNVjXZIIZLC/v/0.jpg","path":"xxxxx-column"},{"key":"pPUBwKfpFgk","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FtL2xMc4El.png","path":"online-contents"},{"key":"pS1Tfcpd8JI","title":"Emergency Management-Feature","desc":"Security leaders should consider regional differences when building emergency management plans.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CNoh-kv9Ei.jpg","path":"emergency-management-feature"},{"key":"pShEQg4qa83","title":"Leadership & Management-Column","desc":"Security leaders all want to prove their value, pull their weight, support the team. But saying no appropriately and strategically goes to the heart of leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hSVJKafBI.jpg","path":"leadership-management-column"},{"key":"pSwpjDhWW4x","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pThYgty7jUY","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0MsuS1HCpq.jpg","path":"advertising-index"},{"key":"pXUdVz43hEP","title":"AD–Webinar Exterro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4Rz5QZoLvp.png","path":"ad–webinar exterro"},{"key":"pXWJx3mGbH0","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lLcmFy20EM.png","path":"ad-dks"},{"key":"pY0W32-tfbm","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"peuA_bCQhe2","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad–house-onsolve-infocenter"},{"key":"pinLMnBXwIu","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pizTF41WuaU","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pjnidI_us3h","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ywf_uk77nH.jpg","path":"staff-listing"},{"key":"pmFPg4nZ5F7","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bZ8DDzdk9z.png","path":"ad-house-solutions-by-sector"},{"key":"pn5dyF2M6KI","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KlVHfF3vHC/pn5dyF2M6KI/v/0.jpg","path":"ad-xxxx"},{"key":"pq58xW4ikUr","title":"Cyber Tactics-Column","desc":"In today’s interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_XqHGvGpT.jpg","path":"cyber-tactics-column"},{"key":"psl2oFOE4Bd","title":"Special Report-Data Driven Security Programs","desc":"Four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication, and security buy-in.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"special-report-data-driven-security-programs"},{"key":"pt4PpmVKjo8","title":"Career Intelligence-Column","desc":"When you present your successes to a future employer, articulate how your program proactively built coalitions to get ahead of future security risks. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mXrZ3KlZeQ.jpg","path":"career-intelligence-column"},{"key":"pu7LQf7smSw","title":"Education & Training-Column","desc":"Whirlpool Corporation Chief Security Officer Erik Antons discusses the unique security challenges in the manufacturing industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ioT_rcugnv.jpg","path":"education-training-column"},{"key":"pucgn6gc6Uj","title":"Security February 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h1gQlRcO_F.jpg","path":"","index":true},{"key":"pxeK2JZyeVM","title":"Global News & Analysis-Department","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/65mdSbuMWw.jpg","path":"global-news-analysis-department"},{"key":"pxtkdG5hJDn","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"54nd1t6Yeu":{"meta":{"width":325,"height":317,"description":"Forehead, Nose, Cheek, Smile, Lip, Jaw, Happy, Gesture, Iris"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",325]]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IUH9cV5TQA":{"meta":{"width":1200,"height":1600,"description":"Surveillance camera, Sky, Security"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IUH9cV5TQA.jpg",1600]]},"Jeyi1yhZQ4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Jeyi1yhZQ4.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Sc_HOPVrx9":{"meta":{"width":4608,"height":3072,"description":"Audio equipment, Microphone"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Sc_HOPVrx9.jpg",2560]]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"gvx8fxxcat":{"meta":{"width":1100,"height":700,"description":"Product, Organism, Gesture, Font, World"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gvx8fxxcat.jpg",1100]]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"v49a3xv6mW":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v49a3xv6mW.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","wTnDfofkley":"XbbrSxSJp","w781zgam":"p781xluu"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/qdfngdqavu1d5cacl0z4w/SEC_Feb-2024_Full-Issue.pdf?rlkey=1302pjuytmsty4f1418oatet5&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pucgn6gc6Uj"},"title":"Security February 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pXWJx3mGbH0"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pXUdVz43hEP"},"title":"AD–Webinar Exterro","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pThYgty7jUY"},"title":"Advertising Index","key":"uPMh_NLd5l"},{"link":{"mode":0,"page":"pBmvRok2OzA"},"title":"AD–Women in Security","key":"kB9L6SuPL7"},{"link":{"mode":0,"page":"pPUBwKfpFgk"},"title":"Online Contents","key":"wKbTE4Or0U"},{"link":{"mode":0,"page":"pF6qX9ZMG5D"},"title":"Security Talk-Column","key":"0553ttXvZ3"},{"link":{"mode":0,"page":"pxeK2JZyeVM"},"title":"Global News & Analysis-Department","key":"wwHf-iOcrS"},{"link":{"mode":0,"page":"psl2oFOE4Bd"},"title":"Special Report-Data Driven Security Programs","key":"KCVTlt-yvx"},{"link":{"mode":0,"page":"p-F1g4_isX_"},"title":"AD–Amarok","key":"V4a3G_7grC"},{"link":{"mode":0,"page":"pS1Tfcpd8JI"},"title":"Emergency Management-Feature","key":"70KLWZFVDZ"},{"link":{"mode":0,"page":"pmFPg4nZ5F7"},"title":"AD–Solutions by Sector","key":"s1q5oNEAAP"},{"link":{"mode":0,"page":"pBfho1pOuvk"},"title":"Post-Invasion in Ukraine-Feature","key":"bDMnKaoT-S"},{"link":{"mode":0,"page":"p2qgtuWZB1N"},"title":"AD–ISC West","key":"pyG8aXio6u"},{"link":{"mode":0,"page":"p5h_kZ2n3ey"},"title":"Threat Assessment-Feature","key":"1IiGzQc-Tp"},{"link":{"mode":0,"page":"pLbM3ev79cj"},"title":"AD–Security eNewsletter","key":"S8z-oSvaoM"},{"link":{"mode":0,"page":"pt4PpmVKjo8"},"title":"Career Intelligence-Column","key":"xrTLtEBXJW"},{"link":{"mode":0,"page":"pY0W32-tfbm"},"title":"AD–Security Bookstore","key":"e4o4oNa3o-"},{"link":{"mode":0,"page":"pShEQg4qa83"},"title":"Leadership & Management-Column","key":"nspYtbHpit"},{"link":{"mode":0,"page":"pIwnrVwj84r"},"title":"AD–LinkedIn","key":"aY13MM2R1O"},{"link":{"mode":0,"page":"pq58xW4ikUr"},"title":"Cyber Tactics-Column","key":"-eZX4bbemo"},{"link":{"mode":0,"page":"pK25tXEC1jy"},"title":"AD–Security Renewal","key":"FYhv05juf2"},{"link":{"mode":0,"page":"pu7LQf7smSw"},"title":"Education & Training-Column","key":"aymRvcXKGK"},{"link":{"mode":0,"page":"peuA_bCQhe2"},"title":"AD–OnSolve Infocenter","key":"n6HtLDS9H4"},{"link":{"mode":0,"page":"pCVkb_Xsd_F"},"title":"Product Spotlight-Department","key":"Ezd27IznRx"},{"link":{"mode":0,"page":"pxtkdG5hJDn"},"title":"AD–Continuing Education (CEU)","key":"mjwZwM4VvL"},{"link":{"mode":0,"page":"pinLMnBXwIu"},"title":"Classifieds","key":"92UnXdaR7k"},{"link":{"mode":0,"page":"pjnidI_us3h"},"title":"Staff Listing","key":"z0tldUdreC"},{"link":{"mode":0,"page":"pizTF41WuaU"},"title":"eMagazine Navigation Guide","key":"1uiFp8F5CQ"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p78PirzFKFF"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}