Contributing Writer\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eooIQSijkOw","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","key":"mDryoM81MQ","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eHdk_8w-TOz","content":{"text":"\u003ch1 >Security Leadership Philosophy and LinkedIn Communication Style\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eg6ciBgqMD7","content":{"text":"\u003ch2 >Three security leaders, three distinct and emblematic communication styles and personas on LinkedIn. How does online networking impact security leadership?\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"e8ws9K5NH8H","content":{"children":[]},"type":"section","children":["eeLhXWS8DzY","eooIQSijkOw","eHdk_8w-TOz","eg6ciBgqMD7"],"cl":"section"},{"key":"ePhJEgMdBc_","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg","key":"Fi8TpQb6KH"},"children":[]},"type":"image","cl":"image"},{"key":"eU4Vld_8ZyR","content":{"text":"\u003cp >\u003cem >Thitima Uthaiburom / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"ewQQiXViLk8","content":{"children":[]},"type":"section","children":["ePhJEgMdBc_","eU4Vld_8ZyR"],"cl":"section"},{"key":"eUp0QzC3ikk","content":{"text":"\u003cp >Reading a LinkedIn post by security professional Tyler Schmoker is like reading an e.e. cummings poem. The Poetry Foundation describes cummings’ work as “spare and precise, employing a few key words eccentrically placed on the page,” grammar and punctuation sprinkled idiosyncratically. Now take that, add some emojis, generous use of the “return” key, lots of ellipses and a breadcrumb-like progression down the page, and you approximate a Schmoker original.\u003c/p>\u003cp >Then there’s the subject matter, which relates to his passions such as the great outdoors and endurance races as much as it does to security.\u003c/p>\u003cp >It felt fitting to interview him via the \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/keywords/2835-linkedin\">LinkedIn\u003c/a> chat feature (especially since I was on a plane at the time), and I asked him about what his LinkedIn communication style says about his leadership style. He described his posts as “visual, emotional and literal.” His word and emoji choice, spacing, flow and tempo emerge from his understanding of human nature and what appeals to people psychologically and sociologically.”\u003c/p>\u003cp >As for the long and narrow format, he indicates that it “helps with reader retention after the initial hook line.” At the bottom of each post is consistent language containing Schmoker’s bona fides that balances out his “clowning around” in the post, as he puts it.\u003c/p>\u003cp >And how does that translate into his leadership style? “I’m pragmatically fluid & I allow it from my people too,” he writes. “Less constrained by industry norms, more focused on progress, disruption, and innovation.” His novel approach, including reaching well beyond the security field, has turbocharged his LinkedIn presence and performance metrics — though his nonconformist approach has also drawn some detractors. \u003c/p>\u003cp >Contrast his style with that of the ebullient and irrepressible Carlos “the Corporate Security Translator” Francisco, whose LinkedIn account pumps out videos of him discussing transitioning to a corporate security career and promoting his podcast on the same topic. The frame can barely contain his verve and animated gestures.\u003c/p>\u003cp >“Animated” is the appropriate word. Francisco draws his communications style from the world of Disney. “Drawing from Disney’s vibrant spirit, I infuse my posts, podcasts and relationships… with enthusiasm, creating what I hope to be a contagious energy that reflects my commitment to inspiring and motivating my team and others alike,” he explains. He “engages followers with bright narratives, fostering a sense of connection to the human that I am,” he continues. Empathy and vulnerability thread through his messages.\u003c/p>\u003cp >For every bit as Francisco is outgoing, Soveiga Jaskunas Kazlauskaite is soft-spoken and learning to navigate the spotlight that comes with posting on LinkedIn. Almost all of her posts thank mentors, promote others’ podcasts or books, or otherwise uplift her colleagues. Fittingly, she describes herself as a \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98452-is-our-leadership-approach-stuck-in-the-1840s\" target=\"_blank\">servant leader\u003c/a>.\u003c/p>\u003cp >Lithuanian by birth but a permanent U.S. resident, Kazlauskaite is an HR professional who recently rebranded herself as the “Immigrant Voice in HR.” “I want to encourage other immigrants because I know what the experience is like,” pointing out that she’s one of the few HR practitioners who speaks about those issues.\u003c/p>\u003cp >She adds that people misperceive her often because of her omnipresent smile and pleasant demeanor. Underneath is someone who asks the hard questions and challenges conventional wisdom.\u003c/p>\u003cp >Still, she’s still uncomfortable when people call her a leader. “I love putting others in the center of attention, helping them with their careers, mentoring them, seeing the value they can bring to others, standing for them and with them,” she says. “But I don’t like putting myself so much in the center of attention.” Her passion for helping others has led her to volunteer at organizations that assist homeless children, immigrants, and refugees. “That's why I feel so passionate about what the future brings, as I love to make a difference in others' lives,” she says\u003c/p>\u003cp >Three leaders, three distinct and emblematic communication styles and personas on LinkedIn. Do you have an intentional style or approach on \u003ca rel=\"noopener external\" href=\"https://www.linkedin.com/company/security-magazine/\" target=\"_blank\">LinkedIn\u003c/a> that communicates your professional leadership philosophy to the world? If not, it’s worth considering.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eaMtUp242V6","content":{"children":[]},"type":"section","children":["eUp0QzC3ikk"],"cl":"section"},{"key":"eURWq3HVqXy","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"ea3Sy7yCqtJ","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"e3lhMx6rnSP","content":{"children":[]},"type":"section","children":["eURWq3HVqXy","ea3Sy7yCqtJ"],"cl":"section"},{"key":"ezhUVIdzXwj","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem >Columnist image courtesy of Gips\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eMM00uhGxyo","content":{"children":[]},"type":"section","children":["ezhUVIdzXwj"],"cl":"section"},{"key":"p5opy3U4pnj","children":["eA55QHvaQrK","e5PRPt6W5XB","eY0oiurKm1R","e8ws9K5NH8H","ewQQiXViLk8","eaMtUp242V6","e3lhMx6rnSP","eMM00uhGxyo"]},{"key":"eAlFOYnloBp","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"eJhhzAfupcR","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"e8JG9iXRLdh","content":{"children":[],"linkUrl":"https://www.axis.com/en-us/products/axis-object-analytics","ioDetailID":579414,"adCreative":{"key":"CbLOZtbjgd","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg"},"showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"Jan 2024 Sponsored BOX - LOGO","page":"perzegYx9CF","pageName":"Security January 2024","key":"eVItB66XxqB"},"adSize":"Cover Sponsor","advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eJhhzAfupcR"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eUACoFYtCng","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e_kMLZwcBpK","content":{"text":"\u003cp >january 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"erCle82CgzU","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"ecY5w_Hg-Jn","content":{"children":[]},"type":"section","children":["e_kMLZwcBpK","erCle82CgzU"],"cl":"section"},{"key":"eFYTisxehYj","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e-wqdifVO3w","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"euw0fTWywo3","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eOPLi8AKgsS","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["eFYTisxehYj","e-wqdifVO3w","euw0fTWywo3"],"cl":"image"},{"key":"ekyB-SH4k0E","content":{"children":[]},"type":"section","children":["eOPLi8AKgsS"],"cl":"section"},{"key":"e2Q-F87JsnK","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ehCr650uHsV","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eF310eEHhFw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8rnUDYHs4h","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eICPzo0kQit","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"egETVD-wvOI","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ez09HcWJzR-","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"eH6PJ9sIkcF","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"e_niZlLrz1a","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["eH6PJ9sIkcF"],"cl":"image"},{"key":"eDmajWrD0r9","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"enPuyIsGwhC","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["eDmajWrD0r9"],"cl":"image"},{"key":"eKjNemm-pq7","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eti-6K07hjR","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eKjNemm-pq7"],"cl":"image"},{"key":"ekH8bEBFt9Q","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eaUTVIKr1Ww","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["ekH8bEBFt9Q"],"cl":"image"},{"key":"eS_SCgcsH4v","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eVoYqY0BmIk","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eS_SCgcsH4v"],"cl":"image"},{"key":"eb6Hk2i7BC0","content":{"children":[]},"type":"section","children":["e2Q-F87JsnK","ehCr650uHsV","eF310eEHhFw","e8rnUDYHs4h","eICPzo0kQit","egETVD-wvOI","ez09HcWJzR-","e_niZlLrz1a","enPuyIsGwhC","eti-6K07hjR","eaUTVIKr1Ww","eVoYqY0BmIk"],"cl":"section"},{"key":"fixed","visibility":{"eb6Hk2i7BC0":{"pXtyTbswykA":"footer","pswY3VeY4uv":"footer","pbnq-8mgkj0":"footer","p4jIhRz8eZD":"footer","pq6MYVR54sz":"footer","pNE7xMmz3Q3":"footer","piykvUZK4gz":"footer","pOJSQp6YkTC":"footer","piWUL2cjEzG":"footer","pMdjRJeTCyv":"footer","p7-YHDrtgJN":"footer","p30ljaYr4yW":"footer","peyj-06G6jz":"footer","pTIkfFL2EL5":"footer","ppfBxzTObAw":"footer","pA6VEuvfPcY":"footer","pf69-Ixlpmj":"footer","p5opy3U4pnj":"footer","pquNjCdELtu":"footer"},"ecY5w_Hg-Jn":{"pXtyTbswykA":"footer","pswY3VeY4uv":"footer","pbnq-8mgkj0":"footer","p4jIhRz8eZD":"footer","pq6MYVR54sz":"footer","pNE7xMmz3Q3":"footer","piykvUZK4gz":"footer","pOJSQp6YkTC":"footer","piWUL2cjEzG":"footer","pMdjRJeTCyv":"footer","p7-YHDrtgJN":"footer","p30ljaYr4yW":"footer","peyj-06G6jz":"footer","pTIkfFL2EL5":"footer","ppfBxzTObAw":"footer","pA6VEuvfPcY":"footer","pf69-Ixlpmj":"footer","p5opy3U4pnj":"footer","pquNjCdELtu":"footer"},"ekyB-SH4k0E":{"pXtyTbswykA":"footer","pswY3VeY4uv":"footer","pbnq-8mgkj0":"footer","p4jIhRz8eZD":"footer","pq6MYVR54sz":"footer","pNE7xMmz3Q3":"footer","piykvUZK4gz":"footer","pOJSQp6YkTC":"footer","piWUL2cjEzG":"footer","pMdjRJeTCyv":"footer","p7-YHDrtgJN":"footer","p30ljaYr4yW":"footer","peyj-06G6jz":"footer","pTIkfFL2EL5":"footer","ppfBxzTObAw":"footer","pA6VEuvfPcY":"footer","pf69-Ixlpmj":"footer","p5opy3U4pnj":"footer","pquNjCdELtu":"footer"},"eAlFOYnloBp":true,"e8JG9iXRLdh":{"perzegYx9CF":true},"eUACoFYtCng":{"ppfBxzTObAw":true}},"children":["eAlFOYnloBp","e8JG9iXRLdh","eUACoFYtCng","ecY5w_Hg-Jn","ekyB-SH4k0E","eb6Hk2i7BC0"]}],"pages":[{"key":"p30ljaYr4yW","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/haj7ye4Rsx.jpg","path":"table-of-contents"},{"key":"p4jIhRz8eZD","title":"Support for Security Teams-Feature","desc":"Security leaders share their tips on building resilience and support for a strong, cohesive and effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N6axnPJj6c.jpg","path":"support-for-security-teams-feature"},{"key":"p5FhRfq_UsY","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/v9SxUJGICs.png","path":"ad-speco"},{"key":"p5opy3U4pnj","title":"Leadership & Management-Column","desc":"Networking online plays an important role in the security profession today. In this column, we investigate three distinct communication styles on LinkedIn. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg","path":"leadership-management-column"},{"key":"p6ZJ6XyKLZe","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HEUgWBk6u5.png","path":"ad-altronix"},{"key":"p7-YHDrtgJN","title":"Securing Public Places-Feature","desc":"Creating a security strategy in public spaces, especially those without a clear perimeter, is a constant challenge for security leaders. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Lo8gyEmEcn.jpg","path":"securing-public-places-feature"},{"key":"pA6VEuvfPcY","title":"Education & Training-Column","desc":"As much as AI can do to supplement cybersecurity measures, one of the most effective ways to stay ahead of evolving hacking trends is collaboration.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bOvMOPraWW.jpg","path":"education-training-column"},{"key":"pCbv80Qw7Pn","title":"AD–Webinar Alert Media","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5L_6Uw169t.png","path":"ad-webinar-alert-media"},{"key":"pI4-PpbVBpo","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-security-enewsletter"},{"key":"pMdjRJeTCyv","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k2XJyW4K7M.jpg","path":"advertising-index"},{"key":"pNE7xMmz3Q3","title":"Security Talk-Column","desc":"Security professionals conducting investigations are charged with gathering credible evidence to determine if, when, where, why and how an incident occurred.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1JIUUIfqgS.jpg","path":"security-talk-column"},{"key":"pOJSQp6YkTC","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pOYkNTzU9oP","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad–house-security-renewal"},{"key":"pPOKDbWdykc","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-security-bookstore"},{"key":"pTIkfFL2EL5","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pXtyTbswykA","title":"Career Intelligence-Column","desc":"In 2024, companies are even more focused on hiring the right senior security executive. Do your research on security leadership interviews to land the role.","cover":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5I77WjM8Kn.svg","path":"careerintelligence-column"},{"key":"pbnq-8mgkj0","title":"Global News & Analysis-Department","desc":"Description: Current local and global events have drastically changed the threat landscape. As company revenue grows, so does the role of chief information security officers.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/2vmxg-weRp.jpg","path":"global-news-analysis-department"},{"key":"pbuPab3Z2le","title":"AD–House Women in Security","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rFPYAmkFbr.png","path":"ad–house-women-in-security"},{"key":"perzegYx9CF","title":"Security January 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aUBUVM64Cs.jpg","path":"","index":true},{"key":"peyj-06G6jz","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pf69-Ixlpmj","title":"Grimaldi Forum-Feature","desc":"Since opening its doors in 2000, the Grimaldi Forum has made the safety of its visitors, its buildings, and the masterpieces on display an absolute priority.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/145JpVMCIX.png","path":"grimaldi-forum-feature"},{"key":"pgjLrbhblQw","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RvxgDtzj7z.png","path":"ad-dks"},{"key":"piWUL2cjEzG","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xZU9d9r3Vf.png","path":"online-contents"},{"key":"piykvUZK4gz","title":"Product Spotlight-Department","desc":"Security magazine highlights mobile and portable security solutions, including alarms, phishing-prevention and communication devices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/VAVx3LNfqP.jpg","path":"product-spotlight-department"},{"key":"ppfBxzTObAw","title":"Special Report-Salary of a CSO","desc":"The 22nd annual Security and Compliance Compensation report, compiled by The Foushée Group, gives industry professionals insight into what their peers are earning.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJSJdrWqFE.jpg","path":"special-report-salary-of-a-cso"},{"key":"pq6MYVR54sz","title":"Cyber Tactics-Column","desc":"Artificial intelligence (AI) is a valuable cybersecurity asset, but it’s not a silver bullet. To best leverage AI, we must consider the security teams of the future.","cover":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/BGATWambsb.svg","path":"cyber-tactics-column"},{"key":"pqh518BFyp4","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bZ8DDzdk9z.png","path":"ad–house-solutions-by-sector"},{"key":"pquNjCdELtu","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OhAT4wQtp4.jpg","path":"staff-listing"},{"key":"pswY3VeY4uv","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pswY3VeY4uv/v/0.jpg","path":"xxxxx-column"},{"key":"puRuoS6rUuG","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad–house continuing-education-(ceu)"},{"key":"pyRvnvPfTiC","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad–house-linkedin"},{"key":"pyyOQqui1qc","title":"AD–xxxx","desc":"","cover":"undefined/image/social/BlFPcxrQFr/pyyOQqui1qc/v/0.jpg","path":"ad-xxxx"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"CbLOZtbjgd":{"meta":{"width":1200,"height":1600,"description":"Product, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CbLOZtbjgd.jpg",1600]]},"Fi8TpQb6KH":{"meta":{"width":6340,"height":3966,"description":"Communication Device, Flash photography, Hand, Sky, Gesture, Gadget, Finger"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Fi8TpQb6KH.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"mDryoM81MQ":{"meta":{"width":400,"height":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","text":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","external-link":"basic","w3tbowgsq-":"pMdFOsZW1t","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","whFspJafhvC":"enfxfhXZ-6","w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/7n0g51ciyhlwpg0bjihcp/SEC_Jan-2024_Full-Issue.pdf?rlkey=rhsz26mdex9jygsscjjx5zzgu&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"perzegYx9CF"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p30ljaYr4yW"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pMdjRJeTCyv"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"perzegYx9CF"},"title":"Security January 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pgjLrbhblQw"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p30ljaYr4yW"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pCbv80Qw7Pn"},"title":"AD–Webinar Alert Media","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pMdjRJeTCyv"},"title":"Advertising Index","key":"wDyMH1DZQj"},{"link":{"mode":0,"page":"p6ZJ6XyKLZe"},"title":"AD–Altronix","key":"hu6uCdSNNK"},{"link":{"mode":0,"page":"piWUL2cjEzG"},"title":"Online Contents","key":"E7Vv1BSIEw"},{"link":{"mode":0,"page":"pNE7xMmz3Q3"},"title":"Security Talk-Column","key":"jWcjjk8kpB"},{"link":{"mode":0,"page":"p5FhRfq_UsY"},"title":"AD–Speco","key":"MITPZEqf6a"},{"link":{"mode":0,"page":"pbnq-8mgkj0"},"title":"Global News & Analysis-Department","key":"jAptF9I3BP"},{"link":{"mode":0,"page":"ppfBxzTObAw"},"title":"Special Report-Salary of a CSO","key":"Wrm5RY8n5v"},{"link":{"mode":0,"page":"pbuPab3Z2le"},"title":"AD–Women in Security","key":"AAqhwKh6OM"},{"link":{"mode":0,"page":"p4jIhRz8eZD"},"title":"Support for Security Teams-Feature","key":"J2_Jsm7ZIF"},{"link":{"mode":0,"page":"pf69-Ixlpmj"},"title":"Grimaldi Forum-Feature","key":"QzLq8lymif"},{"link":{"mode":0,"page":"p7-YHDrtgJN"},"title":"Securing Public Places-Feature","key":"glL5W-cHIB"},{"link":{"mode":0,"page":"pyRvnvPfTiC"},"title":"AD–LinkedIn","key":"w0d-59CXsN"},{"link":{"mode":0,"page":"pXtyTbswykA"},"title":"Career Intelligence-Column","key":"RsdpyagUZp"},{"link":{"mode":0,"page":"pOYkNTzU9oP"},"title":"AD–Security Renewal","key":"G28Xtmdtp6"},{"link":{"mode":0,"page":"p5opy3U4pnj"},"title":"Leadership & Management-Column","key":"tOL6DXvNox"},{"link":{"mode":0,"page":"puRuoS6rUuG"},"title":"AD–Continuing Education (CEU)","key":"n2l5Ua0Rrp"},{"link":{"mode":0,"page":"pq6MYVR54sz"},"title":"Cyber Tactics-Column","key":"dnVckrbleZ"},{"link":{"mode":0,"page":"pqh518BFyp4"},"title":"AD–Solutions by Sector","key":"iNNLGlaKOC"},{"link":{"mode":0,"page":"pA6VEuvfPcY"},"title":"Education & Training-Column","key":"JAx1dPv4UL"},{"link":{"mode":0,"page":"pPOKDbWdykc"},"title":"AD–Security Bookstore","key":"n9sZW2IrZN"},{"link":{"mode":0,"page":"piykvUZK4gz"},"title":"Product Spotlight-Department","key":"P3WxO4sNBp"},{"link":{"mode":0,"page":"pI4-PpbVBpo"},"title":"AD–Security eNewsletter","key":"96OJ_f5N_i"},{"link":{"mode":0,"page":"peyj-06G6jz"},"title":"Classifieds","key":"1jLFvTMwy-"},{"link":{"mode":0,"page":"pquNjCdELtu"},"title":"Staff Listing","key":"cBIFmTMibv"},{"link":{"mode":0,"page":"pTIkfFL2EL5"},"title":"eMagazine Navigation Guide","key":"w7OhfA4ZRM"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p30ljaYr4yW"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}