Contributing Writer\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"e4pcBA9a9Fk","content":{"src":{"key":"eCv8uPcqMD","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg","ratio":1}},"type":"image","cl":"image"},{"key":"eanQ31FjeaK","content":{"text":"\u003ch1 >2023: The Year for Contextual Cyber Threat Intelligence\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"edA56nP7g9F","content":{"text":"\u003ch2 >A successful cyber defense strategy is predicated on intelligence.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ep3bN0IuwiT","type":"section","children":["exHub-t381K","e4pcBA9a9Fk","eanQ31FjeaK","edA56nP7g9F"],"cl":"section"},{"key":"eudI50BEeOE","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg","key":"X521fad6rP"}},"type":"image","cl":"image"},{"key":"elHpU0IkHcN","content":{"text":"\u003cp >\u003cem >Dilok Klaisataporn / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"e7l2HVJ5BXg","type":"section","children":["eudI50BEeOE","elHpU0IkHcN"],"cl":"section"},{"key":"etjI4i-KiyR","content":{"text":"\u003cp >It seems like we each have very different tastes when it comes to the books we read, the shows we watch, or the podcasts to which we listen. But media consumption studies reveal that most of us have at least one thing in common: we love a good \u003cem >whodunnit\u003c/em> story. It may be the challenge: Can we follow the clues investigators come across, identifying and stopping the criminal before they strike again?\u003c/p>\u003cp >I understand this fascination, this race against the clock, because in the early part of my career, I led investigative teams at the Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA) and served on one of the nation’s first Joint Terrorism Task Forces.\u003c/p>\u003cp >I can’t imagine successfully protecting the people, processes and assets for which I was responsible or apprehending the threat actors posed against them without having access to insights on how and why these interests were at risk. I feel the same way today as a chief information security officer (CISO) navigating the cyber threat landscape that currently challenges us. I still believe the ability to advance a successful cyber defense strategy is predicated on access to the right kinds of cyber threat intelligence (CTI).\u003c/p>\u003ch5 >Why Cyber Threat Intelligence Matters\u003c/h5>\u003cp >Cyberattacks are no longer just about the malware. Clearly, while malicious code is the tool a threat actor uses against our organizations, when it, like any tool, ceases to serve its purpose, the adversaries will discard it and try another — and another — until they find the right one for the job. Stopping the malware, the tool being utilized at a particular moment, may not stop the threat, and that is why the phrase “whack-a-mole” has meaning for most of us. To break that cycle, security leaders need to understand \u003cem >who\u003c/em> is behind an attack and \u003cem >what\u003c/em> they are trying to achieve.\u003c/p>\u003cp >I heard this explained quite well recently on a LinkedIn Live broadcast featuring BlackBerry’s Vice President of Threat Research and Intelligence, Ismael Valenzuela.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"egQCgGZf-el","type":"section","children":["etjI4i-KiyR"],"cl":"section"},{"key":"ee3kzyNvgbR","content":{"text":"\u003ch1 >I believe the ability to advance a successful cyber defense strategy is predicated on access to the right kinds of cyber threat intelligence.\u003c/h1>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eEzXHBYwBCW","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","key":"7Iq54aVwp4","ratio":1}},"type":"image","cl":"image"},{"key":"eepyqd__UBe","type":"section","children":["ee3kzyNvgbR","eEzXHBYwBCW"],"cl":"section"},{"key":"ezvnY2xzur9","content":{"text":"\u003cp >“You may not think you need to know whether an attack is coming from — let’s say Russia or China. But we want to know that, and actually, \u003cem >\u003cstrong >it adds context\u003c/strong>\u003c/em>. That information alone may not seem that helpful — unless you were a three-letter agency or working in law enforcement. You’re not going to prosecute anybody, right? But the reality is that knowing who’s behind an attack helps you to understand their motivation.\u003c/p>\u003cp >At the end of the day, we’re dealing with humans. If we reduce it to just the malware, you’re removing the human aspect, the geopolitical aspect, and the economic or military factors that drive somebody to launch an attack against an organization,” said Valenzuela.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eKWHVnFyYi4","type":"section","children":["ezvnY2xzur9"],"cl":"section"},{"key":"epVIO-3f_yd","content":{"text":"\u003cp >Another way to look at the value of contextual CTI is to consider the following: threat actors often have specific working hours just like we do. They make to-do lists; they have goals they are trying to achieve and even profit targets to hit. And quite frankly, it helps tremendously to know if certain threat actors — often with access to specific tools, techniques and procedures (TTPs) — have your company, your region or your industry vertical on their list of targets. \u003c/p>\u003cp >Knowing and applying this information can help you improve your defenses and resilience against certain “more likely” TTPs.\u003c/p>\u003ch5 >Three Things to Look for in CTI\u003c/h5>\u003cp >Many organizations that understand the importance of CTI depend on some sort of threat intelligence subscription service. If you are looking to adopt the power of CTI in 2023, here are three things for which I suggest you look:\u003c/p>\u003col >\u003cli >\u003cdiv style=\"position:relative\">Ask for a sample CTI report. The data should be actionable and help you bridge the gap between threat research and business decision-making.\u003c/div>\u003c/li>\u003cli >Ask how much context the CTI provider will provide. Does it track threats by industry vertical and other factors? This kind of detailed information is crucial to aligning your defenses against likely attacks.\u003c/li>\u003cli >Ask potential CTI providers if their threat research team is global. If yes, that’s a major plus, because intelligence analysts based in multiple countries can track geopolitical nuances and threat actor actions that might otherwise be missed. \u003c/li>\u003c/ol>\u003ch5 >Final Thoughts\u003c/h5>\u003cp >Think about the sales teams of your organization for just a moment. Chances are they have some sort of competitive intelligence. They know what the competing sales teams are saying on social media and how those companies are positioning themselves in the market. Learning about these behaviors and motivations can help sales teams counter competitive threats and make more strategic, data-driven business decisions. \u003c/p>\u003cp >Through cyber threat intelligence, CISOs have the same opportunity when it comes to the threat actors we face.\u003c/p>\u003cp >Cybersecurity should be more than a \u003cem >whodunnit.\u003c/em> Ideally, it’s a \u003cem >who might\u003c/em> \u003cem >do it\u003c/em> — and a potential roadmap for how to prevent the crime from occurring in the first place.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eTho3Q-pLY4","type":"section","children":["epVIO-3f_yd"],"cl":"section"},{"key":"eKUfr60Ta3-","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"ey0zukPKzSx","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ed0joMIkud6","type":"section","children":["eKUfr60Ta3-","ey0zukPKzSx"],"cl":"section"},{"key":"ev9KM0xvGFR","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />John McClurg, Sr. Vice President and CISO at BlackBerry, previously held executive roles at Dell and Honeywell International. \u003cem >Columnist image courtesy of McClurg\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"ecAOmOYZgIS","type":"section","children":["ev9KM0xvGFR"],"cl":"section"},{"key":"enDaoV6l1y0","content":{"text":"\u003cp >january 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\" >SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"eB5vPjTeYWo","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"e2x0nJLcVvI","type":"section","children":["enDaoV6l1y0","eB5vPjTeYWo"],"cl":"section"},{"key":"e2TDmeELQro","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eH5a2MBJi_h","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e5FwldGdeIL","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"edqdLw_TOiR","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["e2TDmeELQro","eH5a2MBJi_h","e5FwldGdeIL"],"cl":"image"},{"key":"eh85XQHzod4","type":"section","children":["edqdLw_TOiR"],"cl":"section"},{"key":"p7qp30xXib5","children":["eRL6fQPWZSV","e4tiYfe7x5d","ezrvnKJkhlR","ep3bN0IuwiT","e7l2HVJ5BXg","egQCgGZf-el","eepyqd__UBe","eKWHVnFyYi4","eTho3Q-pLY4","ed0joMIkud6","ecAOmOYZgIS","e2x0nJLcVvI","eh85XQHzod4"]},{"key":"ePx7Yotpk-t","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eDLEC1Kitoo","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eFJr-t9kYeu","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"ePx7Yotpk-t":{"phMggIqE6I4":true},"eFJr-t9kYeu":{"p_LG4o3tA9b":true},"eDLEC1Kitoo":{"p-A2AUNf_bj":true,"p_LG4o3tA9b":true,"pY9Vef64vTr":true,"pDZwW-KIxoQ":true,"piPS53whA5b":true,"pccxzy67hRK":true,"pj-oAXaAJq4":true,"pkLOI06gZR9":true,"p7AfGYgUL7K":true,"p-v_5O4Ua1Q":true,"pobT3IAF3AH":true,"phMXue6Jk0H":true,"pLUaSccayP1":true,"p7qp30xXib5":true,"pBKKzXtxtxt":true,"pUnbRYUq4Cw":true,"pzkVgYrQkUl":true,"puCMb7lXyF9":true,"p4pwQYB9wXm":true,"poaRno9fpRv":true,"pOMLwGk1Oio":true,"px3VZuR68_X":true,"p0pt1FC602x":true,"pWrgdcVo_k6":true,"pViTKyIKC3G":true,"pySx8crR6fl":true,"pJwjwm200Ws":true,"p24cKwIvGyv":true,"phKa7MvPHH7":true,"pCULU1IP_yS":true,"poS0bB1aZWW":true}},"children":["ePx7Yotpk-t","eDLEC1Kitoo","eFJr-t9kYeu"]}],"pages":[{"key":"p-A2AUNf_bj","title":"AD–House LinkedIn Follow","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RcKoU0ThJC.png","path":"adhouse-linkedin-follow"},{"key":"p-v_5O4Ua1Q","title":"Leadership & Management-Column","desc":"Charlie Brown and the rest of the Peanuts gang offer leadership lessons for security professionals.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Tu-xPNET-v.jpg","path":"leadership-management-column"},{"key":"p0pt1FC602x","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds"},{"key":"p24cKwIvGyv","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5nHz15fQrF.jpg","path":"adhouse-security-enewsletter"},{"key":"p4pwQYB9wXm","title":"Career Intelligence-Column","desc":"Organizations and their security functions are seeing challenges with the return to office shift and hardening job market.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/H6YVT5nLaC.jpg","path":"career-intelligence-column"},{"key":"p7AfGYgUL7K","title":"AD–Control Risks","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTr5Qgbysl.png","path":"adcontrol-risks"},{"key":"p7qp30xXib5","title":"Cyber Tactics-Column","desc":"Learn how to build a cyber defense strategy built on intelligence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg","path":"cyber-tactics-column"},{"key":"pBKKzXtxtxt","title":"AD–xxx","cover":"undefined/image/social/undefined/pBKKzXtxtxt/v/0.jpg","path":"adxxx"},{"key":"pCULU1IP_yS","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HyKmUUsnyP.jpg","path":"staff-listing"},{"key":"pDZwW-KIxoQ","title":"AD–House BNP Engage","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bG14hNw9E-.png","path":"adhouse-bnp-engage"},{"key":"pJwjwm200Ws","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Eqb0o2zCgU.jpg","path":"adhouse-security-bookstore"},{"key":"pLUaSccayP1","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/JVJZtdMsUJ.jpg","path":"table-of-contents"},{"key":"pOMLwGk1Oio","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Kc48vqOAwN.png","path":"adhouse-solutions-by-sector"},{"key":"pUnbRYUq4Cw","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q8HsTmPIyW.png","path":"adhouse-brivo-infocenter"},{"key":"pViTKyIKC3G","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LYKMhkvBNJ.png","path":"addks"},{"key":"pWrgdcVo_k6","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SOL5lnma08.jpg","path":"advertising-index"},{"key":"pY9Vef64vTr","title":"Security Talk-Column","desc":"Within the security industry, a true thought leader is willing to share both successes and failures.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/C-jd8G-f-0.jpg","path":"security-talk-column"},{"key":"p_LG4o3tA9b","title":"Security Intelligence-Cover Story","desc":"Developing an intelligence model for your security function will drive informed decision-making and aid in operational continuity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/VfZxmDicTm.png","path":"intelligence-cover-story"},{"key":"pccxzy67hRK","title":"AD–Webinar Omingo","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X8eFngoKhR.png","path":"adwebinar-omingo"},{"key":"phKa7MvPHH7","title":"Natural Disaster Response-Feature","desc":"Security teams help organizations stay resilient after natural disasters with infrastructure backups, emergency communications & public-private partnerships.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOI72AZaso.jpg","path":"natural-disaster-response-feature"},{"key":"phMXue6Jk0H","title":"Product Spotlight-Department","desc":"Security magazine highlights the latest access management security technology. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/dQacmUVhr9.jpg","path":"product-spotlight-department"},{"key":"phMggIqE6I4","title":"Security January 2023","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/VfZxmDicTm.png","path":"","index":true},{"key":"piPS53whA5b","title":"Profile in Excellence-Feature","desc":"Abbott’s Global Security team ensures business continuity & business resilience; risk management & protects intellectual property.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NDoqSxQOX5.jpg","path":"profile-in-excellence-feature"},{"key":"pj-oAXaAJq4","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pkLOI06gZR9","title":"Education & Training-Column","desc":"Frontline security professionals in healthcare facilities must be specially trained to demonstrate de-escalation skills, compliance & professionalism.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cjKaGYPQfs.jpg","path":"education-training-column"},{"key":"poS0bB1aZWW","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WxMH_cYl1d.png","path":"online-contents"},{"key":"poaRno9fpRv","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BFc7VuugNy.png","path":"adspeco"},{"key":"pobT3IAF3AH","title":"Cyber Physical-Feature","desc":"A proactive approach to securing physical security solutions against cyber vulnerabilities starts with the product or service provider.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GSxQLmGFQ_.jpg","path":"cyber-physical-feature"},{"key":"puCMb7lXyF9","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WNMgB8Yi0g.jpg","path":"adhouse-security-renewal"},{"key":"px3VZuR68_X","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nNiKDrEhWb.png","path":"adhouse-women-in-security"},{"key":"pySx8crR6fl","title":"Global News-Department","desc":"Learn about the top 12 risk focus areas auditors must focus on for 2023; mitigating workplace harassment. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rFomltwdBV.jpg","path":"global-news-department"},{"key":"pzkVgYrQkUl","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"X521fad6rP":{"meta":{"width":3000,"height":1769,"description":"Flash photography, Hand, Gesture, Finger"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X521fad6rP.jpg",2560]]},"eCv8uPcqMD":{"meta":{"width":400,"description":"Forehead, Cheek, Eyebrow, Sleeve, Collar","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","text":"basic","section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/f41qpkgis4igo7x/SEC_Jan-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"children":[],"link":{"mode":0,"page":"phMggIqE6I4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pLUaSccayP1"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"poS0bB1aZWW"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"p_LG4o3tA9b"},"title":"Security Intelligence-Cover Story","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"phKa7MvPHH7"},"title":"Natural Disaster Response-Feature","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pobT3IAF3AH"},"title":"Cyber Physical-Feature","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"piPS53whA5b"},"title":"Profile in Excellence-Feature","key":"KCKT_qWNT7"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pY9Vef64vTr"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"p4pwQYB9wXm"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"p-v_5O4Ua1Q"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"p7qp30xXib5"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pkLOI06gZR9"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pySx8crR6fl"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"phMXue6Jk0H"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"p0pt1FC602x"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pWrgdcVo_k6"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pCULU1IP_yS"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pj-oAXaAJq4"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"phMggIqE6I4"},"title":"Security January 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pViTKyIKC3G"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pLUaSccayP1"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"px3VZuR68_X"},"title":"AD–Women in Security","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"poS0bB1aZWW"},"title":"Online Contents","key":"rUCY3RRmVc"},{"link":{"mode":0,"page":"pY9Vef64vTr"},"title":"Security Talk-Column","key":"DODncoXpyR"},{"link":{"mode":0,"page":"pUnbRYUq4Cw"},"title":"AD–Brivo Infocenter","key":"3886Jo3-HQ"},{"link":{"mode":0,"page":"pySx8crR6fl"},"title":"Global News-Department","key":"DcMHtyBp1C"},{"link":{"mode":0,"page":"p_LG4o3tA9b"},"title":"Security Intelligence-Cover Story","key":"qoE-0N-aBS"},{"link":{"mode":0,"page":"p7AfGYgUL7K"},"title":"AD–Control Risks","key":"oXKF1uYyaM"},{"link":{"mode":0,"page":"phKa7MvPHH7"},"title":"Natural Disaster Response-Feature","key":"r_SnvK0Ivp"},{"link":{"mode":0,"page":"poaRno9fpRv"},"title":"AD–Speco","key":"mWfN-Y3WXA"},{"link":{"mode":0,"page":"pobT3IAF3AH"},"title":"Cyber Physical-Feature","key":"Ffj29TJEmh"},{"link":{"mode":0,"page":"pccxzy67hRK"},"title":"AD–Webinar Omingo","key":"ylo5LIkBUG"},{"link":{"mode":0,"page":"piPS53whA5b"},"title":"Profile in Excellence-Feature","key":"C1Kp3viKhx"},{"link":{"mode":0,"page":"pOMLwGk1Oio"},"title":"AD–Solutions by Sector","key":"NFBbwfmVjS"},{"link":{"mode":0,"page":"p4pwQYB9wXm"},"title":"Career Intelligence-Column","key":"orjowwdQEW"},{"link":{"mode":0,"page":"pDZwW-KIxoQ"},"title":"AD–BNP Engage","key":"0EBzXdCl7w"},{"link":{"mode":0,"page":"p-v_5O4Ua1Q"},"title":"Leadership & Management-Column","key":"2e00jhlcm6"},{"link":{"mode":0,"page":"p24cKwIvGyv"},"title":"AD–Security eNewsletter","key":"rb9QEKlEPV"},{"link":{"mode":0,"page":"p7qp30xXib5"},"title":"Cyber Tactics-Column","key":"4xgMqIhVQS"},{"link":{"mode":0,"page":"pJwjwm200Ws"},"title":"AD–House Security Bookstore","key":"NJg-lssg2O"},{"link":{"mode":0,"page":"pkLOI06gZR9"},"title":"Education & Training-Column","key":"d7SmMFv410"},{"link":{"mode":0,"page":"puCMb7lXyF9"},"title":"AD–Security Renewal","key":"s1wyfjKji4"},{"link":{"mode":0,"page":"phMXue6Jk0H"},"title":"Product Spotlight-Department","key":"4eAaD2GDQa"},{"link":{"mode":0,"page":"p-A2AUNf_bj"},"title":"AD–LinkedIn Follow","key":"t8LylATI4l"},{"link":{"mode":0,"page":"p0pt1FC602x"},"title":"Classifieds","key":"4_dUfWXPP8"},{"link":{"mode":0,"page":"pWrgdcVo_k6"},"title":"Advertising Index","key":"13UriGPOSY"},{"link":{"mode":0,"page":"pCULU1IP_yS"},"title":"Staff Listing","key":"oX4HYfmlnR"},{"link":{"mode":0,"page":"pj-oAXaAJq4"},"title":"eMagazine Navigation Guide","key":"Sd2Kb0hcAf"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","minMax":true,"columnWidth":[1024,1024],"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}