\u003c/strong>Contributing Writer\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eq6j8BYk1d2","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg","key":"V0bSSCdk_1"}},"type":"image","cl":"image"},{"key":"e4caAq1YQYE","content":{"text":"\u003ch1 >The Essential Pieces for Measuring Security Program Maturity\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eCU5Fv-Cot8","content":{"text":"\u003ch2 >Governance, culture and technology enable security teams to measure their effectiveness and better assess risk.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"epqOmDZuU9O","type":"section","children":["e0MsaK3qOwc","eq6j8BYk1d2","e4caAq1YQYE","eCU5Fv-Cot8"],"cl":"section"},{"key":"esP9NXg2fLY","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg","key":"P-Ga71WnSw"}},"type":"image","cl":"image"},{"key":"eNoJs7tHf6e","content":{"text":"\u003cp >\u003cem >Wipada Wipawin / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eI0pZ9w8cUO","type":"section","children":["esP9NXg2fLY","eNoJs7tHf6e"],"cl":"section"},{"key":"e5TIwNRP8HV","content":{"text":"\u003cp >There are many ways to measure the maturity of a security program. Whether a security leader conducts routine internal reviews or an external stakeholder conducts an assessment of a program, it is important to always keep in mind that the scope and functions of a program are largely dependent on the priorities and needs of the business it is supporting. \u003c/p>\u003cp >While no two security programs are the same, security operations take into account end-to-end risk management processes. Risk, as it’s used here, means the likelihood and impact of a threat event occurring. In simple terms, a mature security program should be able to effectively identify, assess and mitigate risks posed to company assets in a timely manner.\u003c/p>\u003ch5 >1. Identify\u003c/h5>\u003cp >The first step in the risk management lifecycle is to identify a direct or indirect threat posed to the organization it is protecting. To do so, the security function needs to have a clearly documented and approved threat register that outlines the scope of threats that the business is hoping to mitigate against. These can be obvious threats like violence against employees and/or industry-specific threats like toxins entering a water source or pilfering of expensive engineering equipment. \u003c/p>\u003cp >Once a program has a clearly defined scope, it can begin to build out the various avenues leveraged to monitor for and identify threats. Examples of these tools include, but are not limited to, accessible employee hotlines, proactive threat monitoring via intelligence platforms, keyword and social media monitoring, tailored threat identification training for Human Resources representatives, and well-established relationships with local law enforcement and intelligence agencies. \u003c/p>\u003ch5 >2. Assess\u003c/h5>\u003cp >From large to small, security leaders are continuously assessing a wide range of threats posed to an organization. Once a security program is able to effectively identify threats, it is imperative that the security team has the ability to assess the likelihood and impact of those threats occurring in a timely, effective manner. This assessment process is the key to developing sound and risk-based recommendations for leadership on how to manage threats posed to the business.\u003c/p>\u003cp >To properly assess the impact of a threat, security professionals should be equipped with the tools to analyze the intent and capability of a threat actor, determine the effectiveness of the controls in place to mitigate against those threats, the consequence of a threat event occurring, and the recoverability mechanisms in place to respond to an incident should it occur. \u003c/p>\u003cp >In short, a mature security function should be able to answer the following questions when assessing a threat: \u003c/p>\u003cul >\u003cli >\u003cdiv style=\"position:relative\">How likely is it that an indirect or direct threat will occur?\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">If it does occur, do we have the controls in place to prevent it?\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">If not, what is the impact of that event occurring?\u003c/div>\u003c/li>\u003c/ul>\u003ch5 >3. Mitigate\u003c/h5>\u003cp >Once a security team is able to assess the risks posed to an organization, the next step is to mitigate against those risks. In traditional risk management, an organization will consider one of the four T’s: Tolerate, Transfer, Treat or Terminate. Security professionals should have the know-how, support and resources to deploy a risk mitigation strategy quickly and efficiently so as to decrease residual risk to a palatable level.\u003c/p>\u003cp >In some cases, mitigation of a threat may mean simply assigning additional roving guards to a perimeter access point, while in other cases it may mean evacuating a building or ceasing business operations in a particular market. We can think of mitigation tactics as levers a business can pull to decrease the likelihood of a threat event impacting their people, operations and reputation. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e_tyCd669ty","type":"section","children":["e5TIwNRP8HV"],"cl":"section"},{"key":"eKLlGijsDyT","content":{"text":"\u003ch1 >“A mature security program should be able to effectively identify, assess and mitigate risks posed to company assets in a timely manner.”\u003c/h1>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"ehaIbcR1oJV","content":{"src":{"key":"7Iq54aVwp4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","ratio":1}},"type":"image","cl":"image"},{"key":"eHYg5e6LE6a","type":"section","children":["eKLlGijsDyT","ehaIbcR1oJV"],"cl":"section"},{"key":"enHVqjo5yH5","content":{"text":"\u003ch5 >What’s Needed: Security Program Tools\u003c/h5>\u003cp >To maintain all of the above capabilities, a mature security program will require a variety of important foundational tools to operate effectively and efficiently. In particular, a security organization looking to develop or maintain a mature program should aim to equip operators with robust program governance, a top-down security culture supported by senior leadership, and the tools and technology to enhance day-to-day program operations.\u003c/p>\u003ch5 >Governance\u003c/h5>\u003cp >Put simply, governance is the documentation through which security organizations apply structure and direction to their operations in a formal way. Governance suites include policies, frameworks, standards, procedures and templates that define and enable the operating requirements for running a security function. Beyond streamlining security operations, a governance suite is critical to ensure security functions have key risk controls in place to meet legal and regulatory obligations. \u003c/p>\u003ch5 >Culture\u003c/h5>\u003cp >The security culture of an organization is defined as the ideas, customs and social behaviors of a group that influence its security. Security organizations often rely on non-security stakeholders to identify and report threats, conduct routine security activities like site assessments and visitor management activities, and engage cross-functionally to manage complex incidents as they occur.\u003c/p>\u003cp >Mature security programs make active and consistent efforts to increase security awareness through internal security campaigns and to train employees on positive security behaviors while conducting day-to-day business related activities. With a well-established and constantly evolving security culture, security teams can count on vigilant employees to enhance enterprise security and act as an additional line of defense instead of inadvertently increasing or exposing easily exploited vulnerabilities. \u003c/p>\u003ch5 >Tools and Technology \u003c/h5>\u003cp >Finally, without effective tools and technology security practitioners are limited in their ability to maintain any of the risk-management pillars mentioned above. When considering the appropriate tools and technology to support a mature security function, it is important to revisit the scope of the program and tailor solutions to address the most notable security exposures first. \u003c/p>\u003cp >When possible, leaders should ideally target technology solutions that touch on more than one of the tenants mentioned above. Additionally, while complex, highly intricate solutions may seem attractive, it is important not to overlook tools that are easy to use, provide effective workflow management and day-to-day program support, and that integrate or replace existing tools and infrastructure. \u003c/p>\u003cp >Tools that can automate some of the identification, management and mitigation of security threats allow for practitioners to focus on complex problem solving instead of getting overly bogged down in repeatable tasks. \u003c/p>\u003cp >Taking a holistic approach to security program measurement and implementing the necessary foundational tools to identify, assess and mitigate risk can provide security leadership with the information they need to make better decisions about the health of the organization. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e6MkDqim9ws","type":"section","children":["enHVqjo5yH5"],"cl":"section"},{"key":"exbEdZEZqeU","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"eHSQCzwIPss","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eAC_NI05-_g","type":"section","children":["exbEdZEZqeU","eHSQCzwIPss"],"cl":"section"},{"key":"eF2ErNiOccH","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Rebecca Sherouse is the Director of Account Management and Security Advisory at HiveWatch, where she is focused on providing end-to-end lifecycle account management support to users. Previously, Sherouse was a Director of Security Risk Consulting at Control Risks, a leading global security consulting firm. She is particularly interested in the development of technology-led security functions, with an eye towards quantitative risk modeling and data-enabled security solutions. \u003cem >Image courtesy of Sherouse\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"erxsADazEPl","type":"section","children":["eF2ErNiOccH"],"cl":"section"},{"key":"eP7G8P20QWH","content":{"text":"\u003cp >july 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"eTuw7ls-ofu","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"e5gDAuPcfXu","type":"section","children":["eP7G8P20QWH","eTuw7ls-ofu"],"cl":"section"},{"key":"eZUjuot9zm_","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ePnj33ypSiA","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e3oR9cry81g","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eWFQnt8MFYq","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["eZUjuot9zm_","ePnj33ypSiA","e3oR9cry81g"],"cl":"image"},{"key":"e7uaTu-VJt6","type":"section","children":["eWFQnt8MFYq"],"cl":"section"},{"key":"pSGs9njJGRA","children":["euekqjO7gDo","eqlgode6d9o","eA5J4L9-BcW","epqOmDZuU9O","eI0pZ9w8cUO","e_tyCd669ty","eHYg5e6LE6a","e6MkDqim9ws","eAC_NI05-_g","erxsADazEPl","e5gDAuPcfXu","e7uaTu-VJt6"]},{"key":"eq7LjBXiXdG","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eNb5GvoTBpt","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"fixed","visibility":{"eq7LjBXiXdG":{"p_OJP8kqCnX":true},"eNb5GvoTBpt":true,"eycxi8uYWme":{"pzKYfplmdKJ":true,"p72yLCS70H9":true,"p8xLDYziJ1f":true,"pB4usbYJoDb":true,"p83rTaVFLNV":true,"pLEPVKh8S8I":true,"p_OJP8kqCnX":true,"puGIJNhnXjP":true,"pCxlHFUPKsW":true,"pjosQ9gJLTv":true,"pwto40HIeeM":true,"pu9JCLu1NzF":true,"pnq6CE01uKZ":true,"pPdiabi-o1E":true,"pvo15Fa8_X2":true,"pVEtCAHaxQ7":true,"pgzauZwz8Cu":true,"ptbGfR0peAU":true,"pxvbymxg-2h":true,"pNAXUGdvkll":true,"pSGs9njJGRA":true,"pBAHLzmSL25":true,"pT2-6D6qlj-":true,"pvScLuKGBJl":true,"pbB4mbnQLqE":true,"pCDqzbH-OZ7":true,"p-epNQwXHpz":true,"ptNYobrm-Pu":true,"pDkEguofTqL":true,"pwn9LuPdl2r":true,"pcTi9e2XSBN":true,"pRr5R4-Fnzy":true,"pt5h7MH8YJe":true,"pCdZsR0sWvy":true,"pmqVZe9mTL7":true,"pf_SiICrwg7":true,"pun5d9ZLHXI":true,"pQ7xZtvvkvC":true,"pMkxNGI1wgI":true,"pJCtPGfYuq1":true,"pJLWzZA5F_W":true,"pUtDka4iCP9":true,"pAFhOmYt-e6":true,"peDsilR8wMN":true,"paJTP2Xt8VW":true}},"children":["eq7LjBXiXdG","eNb5GvoTBpt"]}],"pages":[{"key":"p-epNQwXHpz","title":"WIS 2023 Cadisha Miceli","desc":"Cadisha Miceli follows her passion for public service in her role as Senior Security Coordinator for the City of Toronto.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-cadisha-miceli"},{"key":"p5FPBlCVnkb","title":"xxxxxx-Column (copy)","cover":"undefined/image/social/uUDEZEONzJ/p5FPBlCVnkb/v/0.jpg","path":"xxxxxx-column-copy"},{"key":"p72yLCS70H9","title":"AD–House Security Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"p83rTaVFLNV","title":"AD–House Solutions by Sector","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_6AMePel79.png","path":"adhouse-solutions-by-sector"},{"key":"p8xLDYziJ1f","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pAFhOmYt-e6","title":"WIS 2023 Kristen Devitt","desc":"Law enforcement veteran Kristen Devitt talks about how her public safety experience informs her role as Regional Director of Security at Kaiser Permanente.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-kristen-devitt"},{"key":"pB4usbYJoDb","title":"Cyber Tactics-Column","desc":"Ariel Weintraub, Head of Enterprise Cyber Security at MassMutual, shares how organizations should upskill cyber talent to shape future leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FteuCakGzn.jpg","path":"cyber-tactics-column"},{"key":"pBAHLzmSL25","title":"AD–Allied Universal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gNMtUuFiC7.png","path":"adallied-universal"},{"key":"pCDqzbH-OZ7","title":"WIS 2023 Karen Delgado","desc":"Karen Delgado reflects on her evolving security career at Empire City Casino by MGM Resorts International.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-karen-delgado"},{"key":"pCdZsR0sWvy","title":"WIS 2023 Marifil Rodriguez","desc":"Marifil Rodriguez, Director of Security for Capital One — Philippines, focuses on teamwork while navigating crises such as the pandemic and national disasters. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-marifil-rodriguez"},{"key":"pCxlHFUPKsW","title":"WIS 2023 xxxxx","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-xxxxx"},{"key":"pDkEguofTqL","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KsXc43uf_s.jpg","path":"staff-listing"},{"key":"pJCtPGfYuq1","title":"AD–xxx","cover":"undefined/image/social/uUDEZEONzJ/pJCtPGfYuq1/v/0.jpg","path":"adxxx"},{"key":"pJLWzZA5F_W","title":"Global News & Analysis-Department","desc":"Apprehending shoplifters while keeping employees safe; Texas legislation protects healthcare workers from workplace violence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0unpCtyQSU.jpg","path":"babushka"},{"key":"pLEPVKh8S8I","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"adhouse-security-enewsletter"},{"key":"pMkxNGI1wgI","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5jA7OMvYrR.jpg","path":"advertising-index"},{"key":"pNAXUGdvkll","title":"WIS 2023 Coral Gottlieb","desc":"Coral Gottlieb, Director of Business Resilience and Safety at Levi’s, highlights crisis management in a post-pandemic world. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-coral-gottlieb"},{"key":"pPdiabi-o1E","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/JRwuJfJj03.png","path":"adspeco"},{"key":"pQ7xZtvvkvC","title":"AD–Webinar Cisco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lQdxg2zXIx.png","path":"adwebinar-cisco"},{"key":"pRr5R4-Fnzy","title":"Security Talk-Column","desc":"Jack Leskovar’s 31-year career in the U.S. Secret Service informs his new role as Director of Security and Risk Management at Edgewood College.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/EB5PdmNHu8.jpg","path":"security-talk-column"},{"key":"pSGs9njJGRA","title":"Education & Training-Column","desc":"Security leaders should employ a combination of governance, culture and technology to measure their security program maturity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg","path":"education--training-column"},{"key":"pT2-6D6qlj-","title":"Leadership & Management-Column","desc":"Security executives may benefit from programs and courses that focus on leadership and work closely with the security industry and profession.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FljE2bnqEV.jpg","path":"leadership--management-column"},{"key":"pUtDka4iCP9","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pVEtCAHaxQ7","title":"Manufacturing & Emergency Planning-Feature","desc":"Creating an effective emergency response plan can help protect workers and the business from physical security threats.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nv43Xa3kL0.jpg","path":"manufacturing-emergency-planning-feature"},{"key":"p_OJP8kqCnX","title":"Women In Security 2023 Intro","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"women-in-security-2023-intro"},{"key":"paJTP2Xt8VW","title":"WIS 2023 Alissa Abdullah","desc":"Alissa “Dr. Jay” Abdullah, SVP and Deputy CSO at MasterCard, emphasizes education to mitigate risk and close the cybersecurity talent gap. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-alissa-abdullah"},{"key":"pbB4mbnQLqE","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jg2bPYhTNZ.png","path":"addks"},{"key":"pcTi9e2XSBN","title":"Security Team Leadership-Feature","desc":"A focus on workplace culture helps security executives build strong security teams and improve departmental collaboration and efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bFElLF9FqB.jpg","path":"security-team-leadership-feature"},{"key":"peDsilR8wMN","title":"AD–House Benchmark Security","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PFokti5LP7.png","path":"adhouse-benchmark-security"},{"key":"pf_SiICrwg7","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nFN3SNAYLD.png","path":"online-contents"},{"key":"pgzauZwz8Cu","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zy1nBrZTlo.jpg","path":"table-of-contents"},{"key":"pjosQ9gJLTv","title":"WIS 2023 Lianne Potter","desc":"Cybersecurity leader Lianne Potter hopes to make an impact on the field through her security culture evangelism and gender equality advocacy.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-lianne-potter"},{"key":"pmqVZe9mTL7","title":"Justifying Technology Spends-Feature","desc":"New security technologies can streamline processes in ways to justify the upfront cost, especially in times of limited staff. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SfswH6Liu-.jpg","path":"justifying-technology-spends-feature"},{"key":"pnq6CE01uKZ","title":"WIS 2023 Jordan Rae Kelly","desc":"Jordan Rae Kelly built a career in the FBI Cyber Division at a critical time for cybersecurity in the United States, securing Americans and American assets.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-jordan-rae-kelly"},{"key":"pt5h7MH8YJe","title":"AD–Webinar Seerist","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/w7Efux-ogt.png","path":"adwebinar-seerist"},{"key":"ptBxTxFVhrh","title":"xxxxx-Edit","cover":"undefined/image/social/undefined/ptBxTxFVhrh/v/0.jpg","path":"xxxxx-edit"},{"key":"ptNYobrm-Pu","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"ptbGfR0peAU","title":"AD–House LinkedIn Follow","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RcKoU0ThJC.png","path":"adhouse-linkedin-follow"},{"key":"pu9JCLu1NzF","title":"Product Spotlight-Department","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OrL6ftPc_K.jpg","path":"product-spotlight-department"},{"key":"puGIJNhnXjP","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pun5d9ZLHXI","title":"Career Intelligence-Column","desc":"As artificial intelligence (AI) technology is integrated into threat intelligence tools, it’s up to security teams to prevent AI-driven disinformation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zuQfb2uytc.jpg","path":"career-intelligence-column"},{"key":"pvScLuKGBJl","title":"Security July 2023","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"","index":true},{"key":"pvo15Fa8_X2","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pwn9LuPdl2r","title":"AD–Webinar Hivewatch","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/w8ZWd6uYPb.png","path":"adwebinar-hivewatch"},{"key":"pwto40HIeeM","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpXeAnE2qP.jpg","path":"admission-500"},{"key":"pxvbymxg-2h","title":"WIS 2023 Adrian Ruiz","desc":"Law enforcement veteran Adrian Ruiz is fueled by her passion for public transit in her role as Director, Safety, Security and Quality Assurance at Valley Metro.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/luucMjb3Nc.jpg","path":"wis-2023-adrian-ruiz"},{"key":"pzKYfplmdKJ","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"adhouse-security-bookstore"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"P-Ga71WnSw":{"meta":{"width":4202,"height":2766,"description":"Gesture"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P-Ga71WnSw.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"V0bSSCdk_1":{"meta":{"width":1526,"height":1362,"description":"Cheek, Smile, Lip, Jaw, Eyelash, Sleeve, Iris, Happy, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0bSSCdk_1.jpg",1526]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"image":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","section":"basic","shape":"basic","external-link":"basic","text":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1c12qdsln-oon":"pjbqXRuSWpE","w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/s8wlssolc4rqoyr/SEC_July-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"WIS_menu","children":[{"link":{"mode":0,"page":"p_OJP8kqCnX"},"title":"Women in Security 2023","key":"VE4WOfGkln"},{"link":{"mode":0,"page":"pxvbymxg-2h"},"title":"Adrian Ruiz","key":"hXF1i1-DAw"},{"link":{"mode":0,"page":"paJTP2Xt8VW"},"title":"Alissa Abdullah","key":"eM-0xOgQYU"},{"link":{"mode":0,"page":"p-epNQwXHpz"},"title":"Cadisha Miceli","key":"lA1OhB6Jd1"},{"link":{"mode":0,"page":"pNAXUGdvkll"},"title":"Coral Gottlieb","key":"DmC1sx9d0v"},{"link":{"mode":0,"page":"pnq6CE01uKZ"},"title":"Jordan Rae Kelly","key":"wz-nn7P7ft"},{"link":{"mode":0,"page":"pCDqzbH-OZ7"},"title":"Karen Delgado","key":"TlXRwi5WdR"},{"link":{"mode":0,"page":"pAFhOmYt-e6"},"title":"Kristen Devitt","key":"8EiHmiLxbe"},{"link":{"mode":0,"page":"pjosQ9gJLTv"},"title":"Lianne Potter","key":"51lBKJINzX"},{"link":{"mode":0,"page":"pCdZsR0sWvy"},"title":"Marifil Rodriguez","key":"eBp3BDz2hQ"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"pvScLuKGBJl"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pgzauZwz8Cu"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pf_SiICrwg7"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"p_OJP8kqCnX"},"title":"Special Report: Women in Security 2023","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pmqVZe9mTL7"},"title":"Justifying Technology Spends","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pVEtCAHaxQ7"},"title":"Manufacturing & Emergency Planning","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pcTi9e2XSBN"},"title":"Security Team Leadership","key":"69pZzkKABv"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pRr5R4-Fnzy"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pun5d9ZLHXI"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pT2-6D6qlj-"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pB4usbYJoDb"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pSGs9njJGRA"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pJLWzZA5F_W"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pu9JCLu1NzF"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"p8xLDYziJ1f"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pMkxNGI1wgI"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pDkEguofTqL"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"puGIJNhnXjP"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pvScLuKGBJl"},"title":"Security July 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pbB4mbnQLqE"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pgzauZwz8Cu"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pPdiabi-o1E"},"title":"AD–Speco","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pf_SiICrwg7"},"title":"Online Contents","key":"Yq8mvHdoAo"},{"link":{"mode":0,"page":"pRr5R4-Fnzy"},"title":"Security Talk-Column","key":"2Vp4hSaRm7"},{"link":{"mode":0,"page":"pBAHLzmSL25"},"title":"AD–Allied Universal","key":"yK5qj4Snyf"},{"link":{"mode":0,"page":"pJLWzZA5F_W"},"title":"Global News & Analysis-Department","key":"oO_IcYgEar"},{"link":{"mode":0,"page":"p_OJP8kqCnX"},"title":"Special Report: Women In Security 2023","key":"ySPmIvlBB4"},{"link":{"mode":0,"page":"pxvbymxg-2h"},"title":"WIS 2023 Adrian Ruiz","key":"4_YvSWkdW4"},{"link":{"mode":0,"page":"paJTP2Xt8VW"},"title":"WIS 2023 Alissa Abdullah","key":"2RCBjubvgc"},{"link":{"mode":0,"page":"pwto40HIeeM"},"title":"AD–Mission 500","key":"pv7OkCp1m4"},{"link":{"mode":0,"page":"p-epNQwXHpz"},"title":"WIS 2023 Cadisha Miceli","key":"NRDAjp93tg"},{"link":{"mode":0,"page":"pNAXUGdvkll"},"title":"WIS 2023 Coral Gottlieb","key":"xEP2Yx_ioO"},{"link":{"mode":0,"page":"pt5h7MH8YJe"},"title":"AD–Webinar Seerist","key":"ELYh5dsHLN"},{"link":{"mode":0,"page":"pnq6CE01uKZ"},"title":"WIS 2023 Jordan Rae Kelly","key":"VQO2YPrDA3"},{"link":{"mode":0,"page":"pCDqzbH-OZ7"},"title":"WIS 2023 Karen Delgado","key":"gHVZBzNpjO"},{"link":{"mode":0,"page":"p83rTaVFLNV"},"title":"AD–Solutions by Sector","key":"hoFco6j2yc"},{"link":{"mode":0,"page":"pAFhOmYt-e6"},"title":"WIS 2023 Kristen Devitt","key":"1rDCBRq5Yp"},{"link":{"mode":0,"page":"pjosQ9gJLTv"},"title":"WIS 2023 Lianne Potter","key":"YPm84b_jX5"},{"link":{"mode":0,"page":"pCdZsR0sWvy"},"title":"WIS 2023 Marifil Rodriguez","key":"hIImDbRieL"},{"link":{"mode":0,"page":"peDsilR8wMN"},"title":"AD–Benchmark Security","key":"yHrRbxJS6O"},{"link":{"mode":0,"page":"pmqVZe9mTL7"},"title":"Justifying Technology Spends-Feature","key":"dlaLgq8BAa"},{"link":{"mode":0,"page":"pQ7xZtvvkvC"},"title":"AD–Webinar Cisco","key":"l4tQlM60XE"},{"link":{"mode":0,"page":"pVEtCAHaxQ7"},"title":"Manufacturing & Emergency Planning-Feature","key":"cc8zJplNvJ"},{"link":{"mode":0,"page":"pLEPVKh8S8I"},"title":"AD–Security eNewsletter","key":"0ocvgu8tJj"},{"link":{"mode":0,"page":"pcTi9e2XSBN"},"title":"Security Team Leadership-Feature","key":"BmgRQuH1ei"},{"link":{"mode":0,"page":"pwn9LuPdl2r"},"title":"AD–Webinar Hivewatch","key":"jcmh4lKTSI"},{"link":{"mode":0,"page":"pun5d9ZLHXI"},"title":"Career Intelligence-Column","key":"HjyiCIbM2U"},{"link":{"mode":0,"page":"pzKYfplmdKJ"},"title":"AD–Security Bookstore","key":"0p8SuqKF_G"},{"link":{"mode":0,"page":"pT2-6D6qlj-"},"title":"Leadership & Management-Column","key":"OWTh-HZlvE"},{"link":{"mode":0,"page":"p72yLCS70H9"},"title":"AD–Security Renewal","key":"4HF2KojDTM"},{"link":{"mode":0,"page":"pB4usbYJoDb"},"title":"Cyber Tactics-Column","key":"2B1qCtY-WF"},{"link":{"mode":0,"page":"ptNYobrm-Pu"},"title":"AD–Brivo Infocenter","key":"2VDkK3T8_N"},{"link":{"mode":0,"page":"pSGs9njJGRA"},"title":"Education & Training-Column","key":"YwlsEBnRtT"},{"link":{"mode":0,"page":"ptbGfR0peAU"},"title":"AD–LinkedIn Follow","key":"XHjl-yuySH"},{"link":{"mode":0,"page":"pu9JCLu1NzF"},"title":"Product Spotlight-Department","key":"AFzYsggv5y"},{"link":{"mode":0,"page":"pUtDka4iCP9"},"title":"AD–BNP Engage","key":"8FW0MohEQY"},{"link":{"mode":0,"page":"p8xLDYziJ1f"},"title":"Classifieds","key":"o5ejLleM04"},{"link":{"mode":0,"page":"pMkxNGI1wgI"},"title":"Advertising Index","key":"L3tvOSPSFL"},{"link":{"mode":0,"page":"pDkEguofTqL"},"title":"Staff Listing","key":"WXDnEnR5vX"},{"link":{"mode":0,"page":"puGIJNhnXjP"},"title":"eMagazine Navigation Guide","key":"c5P41SEytn"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}