Contributing Writer\u003c/h4>","children":[]},"preset":"pGQMJGt39jG","type":"text","cl":"text pGQMJGt39jG"},{"key":"eYgtfyfY-FN","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg","key":"pAnxXSL7x6"},"children":[]},"type":"image","cl":"image"},{"key":"eo_YHYGqmfx","content":{"text":"\u003ch1 >The Crucial Role of Security and Compliance in the Cannabis Industry\u003c/h1>","children":[]},"preset":"pyY1pMQxVIq","type":"text","cl":"text pyY1pMQxVIq"},{"key":"eppEUnSubPM","content":{"text":"\u003ch2 >The expanding cannabis market presents unique opportunities but also comes with challenges in the realms of security and compliance.\u003c/h2>","children":[]},"preset":"pyY1pMQxVIq","type":"text","cl":"text pyY1pMQxVIq"},{"key":"e1Rqt__8tTK","content":{"children":[]},"type":"section","children":["edkJvxTQGvd","eYgtfyfY-FN","eo_YHYGqmfx","eppEUnSubPM"],"cl":"section"},{"key":"eItBleAN85z","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg","key":"5s9rUsq2-G"},"children":[]},"type":"image","cl":"image"},{"key":"ehBN55rrI_Y","content":{"text":"\u003cp >\u003cem >halbergman / E+ via Getty Images\u003c/em>\u003c/p>","children":[]},"preset":"pcXiQUrvRN5","type":"text","cl":"text pcXiQUrvRN5"},{"key":"e6c3GqMxnO_","content":{"children":[]},"type":"section","children":["eItBleAN85z","ehBN55rrI_Y"],"cl":"section"},{"key":"eHE77QXf75x","content":{"text":"\u003cp >The cannabis industry is experiencing exponential growth as more regions legalize its use for both medicinal and recreational purposes. This expanding market presents unique opportunities but also comes with unique challenges in the realms of security and compliance. \u003c/p>\u003cp >Compliance and security in the cannabis industry, while closely related, address different aspects of operational integrity. Compliance focuses on adhering to local and state regulations to ensure legal and safe production and distribution, whereas security involves protecting the physical and digital assets of the business (including inventory, cash and personnel) from theft, diversion and cyber threats.\u003c/p>\u003ch5 >Unique Security Challenges\u003c/h5>\u003cp >Gone are the days of carrying backpacks full of cash to pay licensing fees and other obligations (yes, that really happened), but safety concerns surrounding cash transactions, product transport, and foremost, the safety of staff, remain paramount.\u003c/p>\u003cul >\u003cli >High-value inventory: Cannabis products, both in raw and processed forms, are highly valuable, not just monetarily, but also from a possession perspective. Carry limits are in place so that no one individual has access or control of large amounts of inventory with the intent to sell to minors or undeveloped markets. This makes them attractive targets for theft and diversion to be distributed in what is called the “gray” market.\u003c/li>\u003cli >Cash-intensive operations: Most operators have access to a bank of some sort for their business, but most transactions with consumers take place with cash. This means that security measures must be in place for handling and storing large amounts of cash.\u003c/li>\u003cli >Employee safety: Cannabis businesses are subject to stringent regulatory oversight. These measures have laid the foundation to ensure necessary protocols are in place to protect employees from a variety of pitfalls or situations that exist as they work with cannabis and cash.\u003c/li>\u003cli >Stringent oversight: Regulatory oversight has laid the foundation to ensure compliance and security protocols are in place. While some security measures may seem extreme, such as checking in every person who is accessing limited access facilities, escorting visitors, transport safety measures and more cameras than you can count, they are all necessary when working in the cannabis space.\u003c/li>\u003c/ul>\u003ch5 >Implementing Robust Security Measures\u003c/h5>\u003cp >To address these challenges, cannabis businesses must implement comprehensive security strategies. Key components include physical security, employee training and cybersecurity.\u003c/p>\u003cp >Physical security encompasses surveillance systems, secure storage facilities, and stringent access controls. High-resolution cameras, alarm systems and reinforced vaults are essential to safeguard valuable inventory and cash reserves.\u003c/p>","children":[]},"preset":"px9wGknIVpf","type":"text","cl":"text px9wGknIVpf"},{"key":"eW59SCa_ysc","content":{"children":[]},"type":"section","children":["eHE77QXf75x"],"cl":"section"},{"key":"eolEOFy5wKS","content":{"text":"\u003ch1 >The cannabis industry is at a critical juncture, with enormous potential for growth and innovation. However, the risks associated with security and compliance should not be underestimated.”\u003c/h1>","children":[]},"preset":"pzCBR6rvMFP","type":"text","cl":"text pzCBR6rvMFP"},{"key":"e7Mhqdftd3f","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eHUeCZAq8-q","content":{"children":[]},"type":"section","children":["eolEOFy5wKS","e7Mhqdftd3f"],"cl":"section"},{"key":"eP_fq7xAKSk","content":{"text":"\u003cp >Additional safety measures come into play, even when hiring cannabis employees. Each state has its one set of rules for who can work in cannabis, but strict and repetitive background screens take place for every employee before someone can be trusted to work in cannabis. This helps weed out the bad actors.\u003c/p>\u003cp >Employee training is equally important. Employees must be trained to recognize and respond to security threats. This includes understanding protocols for handling cash, managing inventory and ensuring the integrity of the supply chain. Regular training sessions ensure that all staff are up-to-date on the latest security practices and are equipped to handle potential threats.\u003c/p>\u003cp >In 2024, cybersecurity cannot be overlooked — or overstated. As with any modern business, cannabis companies must protect their digital assets along with environmental control systems that live in the cloud. This involves safeguarding customer data, securing online transactions and preventing cyberattacks or hacking into system databases.\u003c/p>\u003ch5 >The Importance of Compliance\u003c/h5>\u003cp >Compliance in the cannabis industry is multifaceted, involving local and state rules. Key areas of focus include:\u003c/p>\u003cul >\u003cli >\u003cdiv style=\"position:relative\">\u003cstrong >Licensing\u003c/strong>: Obtaining and maintaining the necessary licenses is fundamental to operating a legal cannabis business. This process can be complex and requires meticulous attention to detail. Businesses must navigate an evolving regulatory landscape, submit comprehensive documentation and often undergo rigorous inspections. The cost of non-compliance can be severe, including hefty fines, license suspension or permanent closure.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">\u003cstrong >Product testing and labeling\u003c/strong>: Product testing and labeling are critical components of compliance. Cannabis products must meet stringent safety standards to ensure they are free from contaminants such as pesticides, heavy metals and microbial impurities. Accurate labeling is equally important, providing consumers with essential information about the product's potency, ingredients and usage instructions. This transparency helps build consumer trust and ensures safety for products that hit the store shelves.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">\u003cstrong >Record-keeping\u003c/strong>: Detailed records must be kept for all aspects of the business, from seed to sale. Traceability and accountability become paramount when a product is recalled or needs to be investigated for product safety.\u003c/div>\u003c/li>\u003c/ul>\u003ch5 >Building a Company Culture of Compliance \u003c/h5>\u003cp >Creating a culture within a cannabis organization requires commitment from all levels of the business. Compliance and security are everyone's jobs! Senior management must lead by example, while all employees need to embrace the importance of compliance. Regular training sessions and clear communication of policies are essential. Additionally, this is not a one-time effort but an ongoing process. Businesses must stay abreast of changing regulations and continuously refine their practices — rules can change overnight to be implemented the next day.\u003c/p>\u003ch5 >Partnering with Experts\u003c/h5>\u003cp >Given the complexities of security and compliance, partnering with experts can be invaluable. Security consultants, legal advisors and compliance specialists can provide the insights and support needed to navigate the regulatory landscape and implement effective security measures.\u003c/p>\u003cp >The cannabis industry is at a critical juncture, with enormous potential for growth and innovation. However, the risks associated with security and compliance should not be underestimated. The adage “You're only as strong as your weakest link” is particularly relevant in the cannabis industry. It is critical to build a company-wide culture of compliance and security, ensuring that every member of the organization is aware of their role in maintaining these standards. By prioritizing these aspects, businesses can not only protect their assets and reputation but also build a foundation for long-term success.\u003c/p>","children":[]},"preset":"px9wGknIVpf","type":"text","cl":"text px9wGknIVpf"},{"key":"eZuSRNlURdY","content":{"children":[]},"type":"section","children":["eP_fq7xAKSk"],"cl":"section"},{"key":"ecSP4j-8wl9","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"edX6GeN-grY","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eRBPtGXYSxj","content":{"children":[]},"type":"section","children":["ecSP4j-8wl9","edX6GeN-grY"],"cl":"section"},{"key":"epQ_wwICT1L","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Jennifer Kealy is VP of Finance & Regulatory Affairs at Root & Bloom. \u003cem >Image courtesy of Kealy\u003c/em>\u003c/h1>","children":[]},"preset":"pcS1ri5HZdw","type":"text","cl":"text pcS1ri5HZdw"},{"key":"eI1nyBnDgyB","content":{"children":[]},"type":"section","children":["epQ_wwICT1L"],"cl":"section"},{"key":"e0wbC6vZxsh","content":{"children":[],"link":{"mode":0,"page":"pfZh61kbYCe"}},"type":"external-link","cl":"external-link"},{"key":"eAQ--1yZ7ER","content":{"text":"\u003ch6 >\u003cem >COMING UP NEXT\u003c/em>\u003c/h6>\u003cp >\u003cstrong >Product Spotlight\u003c/strong>\u003c/p>\u003cp >Security magazine highlights physical and cyber access control solutions\u003c/p>","children":[]},"preset":"pW2KkHRgsz","type":"text","actions":["e0wbC6vZxsh"],"cl":"text pW2KkHRgsz"},{"key":"eY3Py3IVKe6","content":{"children":[],"link":{"mode":0,"page":"pc0V9gruqHb"}},"type":"external-link","cl":"external-link"},{"key":"eIViELoZ2C_","content":{"children":[]},"type":"frame","actions":["eY3Py3IVKe6"],"cl":"frame"},{"key":"ed_TdbsL8DB","content":{"shapeId":"angle-double-right-solid","children":[]},"type":"shape","cl":"shape"},{"key":"emIiiGh77Kr","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Ca3uszRiJ.jpg","key":"9Ca3uszRiJ"},"children":[]},"type":"image","cl":"image"},{"key":"eQKT1wscmPb","content":{"children":[]},"type":"section","children":["eAQ--1yZ7ER","eIViELoZ2C_","ed_TdbsL8DB","emIiiGh77Kr"],"cl":"section"},{"key":"pbq29iTLQMI","children":["ejV8myo9EyC","eGOctu62sA0","eglLQtNzj3o","e1Rqt__8tTK","e6c3GqMxnO_","eW59SCa_ysc","eHUeCZAq8-q","eZuSRNlURdY","eRBPtGXYSxj","eI1nyBnDgyB","eQKT1wscmPb"]},{"key":"eJv_dhWB6Kr","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"eM8A1Wv9bSo","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"ejDMJ-B8qEX","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"e0vBojR_9Fc","content":{"children":[],"linkUrl":"www.americas-comms.axis.com/axis_camera_station_secure_entry","adCreative":{"key":"PIPFWE9jc8","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg"},"ioDetailID":579420,"adSize":"Cover Sponsor","showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"July 2024 Sponsored BOX - LOGO","page":"phrGFki1ON7","pageName":"Security July 2024","key":"eo0RB2fdP_R"},"advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["ejDMJ-B8qEX"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"e7NqPzEgJ_U","content":{"text":"\u003cp >july 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"eC8Zt_g3FzJ","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"euUmj29u8PP","content":{"children":[]},"type":"section","children":["e7NqPzEgJ_U","eC8Zt_g3FzJ"],"cl":"section"},{"key":"epFMS4cQwxC","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eI_pMtSff0Q","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ePFS2Oxa2p1","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"e0kRZK4PoTb","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["epFMS4cQwxC","eI_pMtSff0Q","ePFS2Oxa2p1"],"cl":"image"},{"key":"eXN0ktVwOpM","content":{"children":[]},"type":"section","children":["e0kRZK4PoTb"],"cl":"section"},{"key":"eDgOXx28nn1","content":{"text":"\u003cp >\u003cem >Copyright ©2024. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"e7semgBSSN-","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"ev6ptA8eR0d","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eBXrDXmHjdp","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"preset":"pWabAOUihi","type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ekiHTj1FhNY","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"e054QTAF_pU","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"ewfROjqexDE","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"epMFkZZxo0o","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5IfzmhwyyD","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["epMFkZZxo0o"],"cl":"image"},{"key":"ey7F6BbIkOY","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQRQVBz7r1B","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["ey7F6BbIkOY"],"cl":"image"},{"key":"eT0dn3Jy8z5","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"egIt_adH_jN","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eT0dn3Jy8z5"],"cl":"image"},{"key":"etA6tVNjhMY","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eOw4Q_cowmV","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["etA6tVNjhMY"],"cl":"image"},{"key":"ejkBYploFC-","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eJ82-fnhYbz","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["ejkBYploFC-"],"cl":"image"},{"key":"epHxx_j2oUm","content":{"children":[]},"type":"section","children":["eDgOXx28nn1","e7semgBSSN-","ev6ptA8eR0d","eBXrDXmHjdp","ekiHTj1FhNY","e054QTAF_pU","ewfROjqexDE","e5IfzmhwyyD","eQRQVBz7r1B","egIt_adH_jN","eOw4Q_cowmV","eJ82-fnhYbz"],"cl":"section"},{"key":"fixed","visibility":{"eJv_dhWB6Kr":{"p-AURRU4ZpF":true},"epHxx_j2oUm":{"p9S-DYtcC-8":"footer","pftuhxFu6ki":"footer","pZyOads2QBZ":"footer","pE8Es9210DH":"footer","phLNj_-ce-p":"footer","pLS_5YIcig6":"footer","pQf1LmMgVrf":"footer","p-AURRU4ZpF":"footer","pnzdIXH47eq":"footer","pc0V9gruqHb":"footer","pko156JzPmf":"footer","pA8tt8Fhwsn":"footer","pJyDJdZOwnk":"footer","pl6EuUIJa_A":"footer","pU3aGx2CC2h":"footer","pHrqbuqjxSJ":"footer","pVf7gCf64UL":"footer","pk_CPGkcsvw":"footer","pW4jkM5Onhr":"footer","p-TwP_O6miI":"footer","pxRMddP-paw":"footer","pRegyBCF4XM":"footer","pNez1pA2w_X":"footer","pO5QpEK7zrc":"footer","pBkvzv1ASPC":"footer","pbq29iTLQMI":"footer","pSiLcyPMj9S":"footer","pv3gDMlZIZ2":"footer","pFWsnQeYg-e":"footer","pjxvfoOWaai":"footer"},"eM8A1Wv9bSo":true,"eXN0ktVwOpM":{"p9S-DYtcC-8":"footer","pftuhxFu6ki":"footer","pZyOads2QBZ":"footer","pE8Es9210DH":"footer","phLNj_-ce-p":"footer","pLS_5YIcig6":"footer","pQf1LmMgVrf":"footer","p-AURRU4ZpF":"footer","pnzdIXH47eq":"footer","pc0V9gruqHb":"footer","pko156JzPmf":"footer","pA8tt8Fhwsn":"footer","pJyDJdZOwnk":"footer","pl6EuUIJa_A":"footer","pU3aGx2CC2h":"footer","pHrqbuqjxSJ":"footer","pVf7gCf64UL":"footer","pk_CPGkcsvw":"footer","pW4jkM5Onhr":"footer","p-TwP_O6miI":"footer","pxRMddP-paw":"footer","pRegyBCF4XM":"footer","pNez1pA2w_X":"footer","pO5QpEK7zrc":"footer","pBkvzv1ASPC":"footer","pbq29iTLQMI":"footer","pSiLcyPMj9S":"footer","pv3gDMlZIZ2":"footer","pFWsnQeYg-e":"footer","pjxvfoOWaai":"footer"},"euUmj29u8PP":{"p9S-DYtcC-8":"footer","pftuhxFu6ki":"footer","pZyOads2QBZ":"footer","pE8Es9210DH":"footer","phLNj_-ce-p":"footer","pLS_5YIcig6":"footer","pQf1LmMgVrf":"footer","p-AURRU4ZpF":"footer","pnzdIXH47eq":"footer","pc0V9gruqHb":"footer","pko156JzPmf":"footer","pA8tt8Fhwsn":"footer","pJyDJdZOwnk":"footer","pl6EuUIJa_A":"footer","pU3aGx2CC2h":"footer","pHrqbuqjxSJ":"footer","pVf7gCf64UL":"footer","pk_CPGkcsvw":"footer","pW4jkM5Onhr":"footer","p-TwP_O6miI":"footer","pxRMddP-paw":"footer","pRegyBCF4XM":"footer","pNez1pA2w_X":"footer","pO5QpEK7zrc":"footer","pBkvzv1ASPC":"footer","pbq29iTLQMI":"footer","pSiLcyPMj9S":"footer","pv3gDMlZIZ2":"footer","pFWsnQeYg-e":"footer","pjxvfoOWaai":"footer"},"e0vBojR_9Fc":{"phrGFki1ON7":true}},"children":["eJv_dhWB6Kr","eM8A1Wv9bSo","e0vBojR_9Fc","euUmj29u8PP","eXN0ktVwOpM","epHxx_j2oUm"]}],"pages":[{"key":"p-AURRU4ZpF","title":"Women In Security 2024 Intro-Feature","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"women-in-security-2024-intro"},{"key":"p-TwP_O6miI","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pD1aj4xpiK.jpg","path":"staff-listing"},{"key":"p0qntXeu8XD","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"p0uEJDpo_QZ","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"p8pJKINFqHj","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"p9S-DYtcC-8","title":"WIS 2024 Iretioluwa Akerele-Feature","desc":"Dr. Iretioluwa Akerele reflects on how growth and awareness are vital to a cybersecurity career. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-iretioluwa-akerele-feature"},{"key":"pA8tt8Fhwsn","title":"WIS 2024 Christina Alexandropoulou-Feature","desc":"Christina Alexandropoulou follows her passion for the industry as Cluster Manager for Security & Market Safety in South East Europe for Philip Morris International (PMI).","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-christina-alexandropoulou-feature"},{"key":"pBkvzv1ASPC","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pE8Es9210DH","title":"Career Intelligence-Column","desc":"Laying initial groundwork for career success is always a worthwhile investment for security professionals.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/A5jvcc0EyP.jpg","path":"career-intelligence-column"},{"key":"pFWsnQeYg-e","title":"WIS 2024 xxxx xxxxxxx-Feature","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-xxxx-xxxxxxx-feature"},{"key":"pGGCt3TyumZ","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"pHrqbuqjxSJ","title":"WIS 2024 Zinet Kemal-Feature","desc":"Zinet Kemal, Cloud Security Engineer at Best Buy, emphasizes the importance of online safety.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-zinet-kemal-feature"},{"key":"pJITCN8eoNY","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nuCInPi8i9.png","path":"ad–house-security-500"},{"key":"pJyDJdZOwnk","title":"WIS 2024 Confidence Staveley-Feature","desc":"Confidence Staveley’s security career centers inclusion and education, aiming to increase the number of women in the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-confidence-staveley-feature"},{"key":"pLS_5YIcig6","title":"WIS 2024 Ava Turner Leone-Feature","desc":"Ava Leone Turner keeps her curiosity alive in her role as Supply Chain Security Manager at quantum computing company IonQ.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-ava-turner-leone-feature"},{"key":"pNez1pA2w_X","title":"Upskilling the Security Workforce-Feature","desc":"The tech talent gap is a long-lamented challenge across all corners of the security landscape. The pace of technological change, and the ability of agile adversaries to exploit it, calls for a totally new approach to talent.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DT5IEHyY0D.jpg","path":"upskilling-the-security-workforce-feature"},{"key":"pO5QpEK7zrc","title":"WIS 2024 Anjanette Herbert-Feature","desc":"Anjanette Hebert recalls all of the emergency preparation and response required following Hurricane Katrina. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-anjanette-herbert-feature"},{"key":"pQf1LmMgVrf","title":"Cyber Tactics-Column","desc":"As the digital landscape continues to evolve, the importance of digital trust will only continue to grow.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kslGAbhb4M.jpg","path":"cyber-tactics-column"},{"key":"pRFs0pU6gJv","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pvvdv79RE0.png","path":"ad-dks"},{"key":"pRegyBCF4XM","title":"WIS 2024 Quratulann Jamshed-Feature","desc":"Quratulann “Annie” Jamshed discusses the role that curiosity plays in building a cybersecurity career. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-quratulann-jamshed-feature"},{"key":"pSiLcyPMj9S","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/n1Pn6GwdMn.png","path":"online-contents"},{"key":"pU3aGx2CC2h","title":"WIS 2024 Candice Frost-Feature","desc":"Candice Frost discusses how military experience and mentorship can enhance a career in security. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-candice-frost-feature"},{"key":"pVHlWMXVvqX","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ixwI0iGzjK.png","path":"ad-house-brivo-infocenter"},{"key":"pVf7gCf64UL","title":"Access Control-Feature","desc":"As access control technology continues to evolve, security leaders should pay attention to top trends and the opportunities they present.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/caVlVJCs7u.jpg","path":"access-control-feature"},{"key":"pW4jkM5Onhr","title":"WIS 2024 Claire Campbell-Feature","desc":"Claire Campbell, Chief Security Officer at Moneycorp, discusses her career as a security professional.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"wis-2024-claire-campbell-feature"},{"key":"pZyOads2QBZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nGMwJNoZLI.jpg","path":"table-of-contents"},{"key":"pbq29iTLQMI","title":"Education & Training-Column","desc":"The expanding cannabis market presents unique opportunities but also comes with challenges in the realms of security and compliance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg","path":"education-training-column"},{"key":"pc0V9gruqHb","title":"Product Spotlight-Department","desc":"Security magazine highlights physical and cyber access control solutions. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Ca3uszRiJ.jpg","path":"product-spotlight-department"},{"key":"pdVfbIgjzg7","title":"AD–xxxx","desc":"","cover":"/image/social/2WQdEPoq7p/pdVfbIgjzg7/v/0.jpg","path":"ad-xxxx"},{"key":"peVd9iSXA9-","title":"AD–House Benchmark Report","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ByRs7pdtKY.png","path":"ad-house-benchmark-report"},{"key":"pftuhxFu6ki","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pg0v29tlEyF","title":"AD–Webinar Hunters","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/txedcXRVMh.png","path":"adxxxx-copy2"},{"key":"phLNj_-ce-p","title":"Leadership & Management-Column","desc":"Retaining team cohesion and trust is easier said than done and takes extraordinary leaders to carry out.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ifnvr3Hd6y.jpg","path":"leadership-management-column"},{"key":"phrGFki1ON7","title":"Security July 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IpO1UniFgk.jpg","path":"","index":true},{"key":"pjxvfoOWaai","title":"Workplace Violence Prevention-Feature","desc":"Recently implemented workplace violence laws means security leaders need to be ready to follow the guidelines. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sS3WEUi4SA.jpg","path":"workplace-violence-prevention-feature"},{"key":"pk_CPGkcsvw","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"pko156JzPmf","title":"Global News & Analysis-Department","desc":"Artificial intelligence and identity management; Prominent cyber risks in 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Az-tjgFHo0.jpg","path":"global-news-analysis-department"},{"key":"pl6EuUIJa_A","title":"xxxxx-Column","desc":"","cover":"/image/social/2WQdEPoq7p/pl6EuUIJa_A/v/0.jpg","path":"xxxxx-column"},{"key":"plBGR9qkt3C","title":"AD–Speco","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lZJdp6pPmO.png","path":"adxxxx-copy3"},{"key":"pls6DQfxoXj","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"},{"key":"pnzdIXH47eq","title":"xxxxxx-Feature","desc":"","cover":"/image/social/2WQdEPoq7p/pnzdIXH47eq/v/0.jpg","path":"xxxxxx-feature"},{"key":"pu6a7n4u7U5","title":"AD–GSX","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QZzU32OoPs.png","path":"adxxxx-copy0"},{"key":"puezJ1hwyg4","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad-house-solutions-by-sector"},{"key":"pv3gDMlZIZ2","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IJTnYgp-ZZ.jpg","path":"advertising-index"},{"key":"pxRMddP-paw","title":"Security Talk-Column","desc":"Lynn Dohm, Executive Director of nonprofit organization WiCyS discusses the importance of inclusion when solving the cybersecurity workforce gap.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-IZ5cqrl-A.jpg","path":"security-talk-column"}],"shapes":{"angle-double-right-solid":[448,512,"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z"],"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"5s9rUsq2-G":{"meta":{"width":3600,"height":2400,"description":"Plant, Vegetation"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5s9rUsq2-G.jpg",2560]]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"9Ca3uszRiJ":{"meta":{"width":600,"height":320,"description":"Blue, World, Azure, Lighting, Architecture, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Ca3uszRiJ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Ca3uszRiJ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9Ca3uszRiJ.jpg",600]]},"PIPFWE9jc8":{"meta":{"width":1200,"height":1600,"description":"Output device, Audio equipment, Product, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PIPFWE9jc8.jpg",1600]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pAnxXSL7x6":{"meta":{"width":2316,"height":2510,"description":"Flash photography, Smile, Lip, Eyebrow, Eyelash, Neck, Jaw, Happy, Iris, Gesture"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pAnxXSL7x6.jpg",2510]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"variables":[],"pkg":{"wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","frame":"basic"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/9zr3h783oijz7ag/SEC_July-2024_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"title":"WIS_2024_Menu","children":[{"children":[],"link":{"mode":0,"page":"p-AURRU4ZpF"},"title":"Women In Security 2024 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0,"page":"p9S-DYtcC-8"},"title":"Dr. Iretioluwa Akerele","key":"RzKEdEtBXZ"},{"link":{"mode":0,"page":"pA8tt8Fhwsn"},"title":"Christina Alexandropoulou","key":"ZxVUQtWThg"},{"link":{"mode":0,"page":"pW4jkM5Onhr"},"title":"Claire Campbell ","key":"W0kRrD5aqi"},{"link":{"mode":0,"page":"pU3aGx2CC2h"},"title":"Candice Frost ","key":"utF9ZnFiRu"},{"link":{"mode":0,"page":"pO5QpEK7zrc"},"title":"Anjanette Herbert ","key":"QVmYmDtBfh"},{"link":{"mode":0,"page":"pRegyBCF4XM"},"title":"Quratulann Jamshed ","key":"SoIJhJ5YYj"},{"link":{"mode":0,"page":"pHrqbuqjxSJ"},"title":"Zinet Kemal ","key":"XCEUE2uE4T"},{"link":{"mode":0,"page":"pLS_5YIcig6"},"title":"Ava Turner Leone ","key":"8Uu_LetAPY"},{"link":{"mode":0,"page":"pJyDJdZOwnk"},"title":"Confidence Staveley ","key":"l1iEBxUdFp"}],"key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"phrGFki1ON7"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pZyOads2QBZ"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pv3gDMlZIZ2"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Main menu","children":[{"link":{"mode":0,"page":"phrGFki1ON7"},"title":"Security July 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pRFs0pU6gJv"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pZyOads2QBZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"puezJ1hwyg4"},"title":"AD–Solutions by Sector","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pv3gDMlZIZ2"},"title":"Advertising Index","key":"ww7KIiiWrW"},{"link":{"mode":0,"page":"pls6DQfxoXj"},"title":"AD–Continuing Education (CEU)","key":"1xbZren6Iw"},{"link":{"mode":0,"page":"pSiLcyPMj9S"},"title":"Online Contents","key":"-LZgOjzQMZ"},{"link":{"mode":0,"page":"pxRMddP-paw"},"title":"Security Talk-Column","key":"Zgt1rpNMAn"},{"link":{"mode":0,"page":"peVd9iSXA9-"},"title":"AD–Benchmark Report","key":"2noIWmpDr-"},{"link":{"mode":0,"page":"pko156JzPmf"},"title":"Global News & Analysis-Department","key":"T_5YH555U3"},{"link":{"mode":0,"page":"p-AURRU4ZpF"},"title":"Women In Security 2024 Intro-Feature","key":"aaFF7HXDYr"},{"link":{"mode":0,"page":"p9S-DYtcC-8"},"title":"WIS 2024 Iretioluwa Akerele-Feature","key":"TPkj4Rz1_I"},{"link":{"mode":0,"page":"pA8tt8Fhwsn"},"title":"WIS 2024 Christina Alexandropoulou-Feature","key":"DWefSupzRl"},{"link":{"mode":0,"page":"plBGR9qkt3C"},"title":"AD–Speco","key":"PzLfgoxX5c"},{"link":{"mode":0,"page":"pW4jkM5Onhr"},"title":"WIS 2024 Claire Campbell-Feature","key":"-hmGYb6OCr"},{"link":{"mode":0,"page":"pU3aGx2CC2h"},"title":"WIS 2024 Candice Frost-Feature","key":"8O7-8nL5AP"},{"link":{"mode":0,"page":"pu6a7n4u7U5"},"title":"AD–GSX","key":"KAwqMKugVE"},{"link":{"mode":0,"page":"pO5QpEK7zrc"},"title":"WIS 2024 Anjanette Herbert-Feature","key":"Cf7h-somes"},{"link":{"mode":0,"page":"pRegyBCF4XM"},"title":"WIS 2024 Quratulann Jamshed-Feature","key":"PLo9pxuWeR"},{"link":{"mode":0,"page":"p0qntXeu8XD"},"title":"AD–Security eNewsletter","key":"10S5oa697Y"},{"link":{"mode":0,"page":"pHrqbuqjxSJ"},"title":"WIS 2024 Zinet Kemal-Feature","key":"JexFXt2iJ7"},{"link":{"mode":0,"page":"pLS_5YIcig6"},"title":"WIS 2024 Ava Turner Leone-Feature","key":"CnkY1WIHty"},{"link":{"mode":0,"page":"pJyDJdZOwnk"},"title":"WIS 2024 Confidence Staveley-Feature","key":"BsdWPWt4WV"},{"link":{"mode":0,"page":"pNez1pA2w_X"},"title":"Upskilling the Security Workforce-Feature","key":"JFk3QAlz2b"},{"link":{"mode":0,"page":"pg0v29tlEyF"},"title":"AD–Webinar Hunters","key":"svNHE3Vljp"},{"link":{"mode":0,"page":"pjxvfoOWaai"},"title":"Workplace Violence Prevention-Feature","key":"osReDkgIg6"},{"link":{"mode":0,"page":"pVf7gCf64UL"},"title":"Access Control-Feature","key":"pdYtMbGJEl"},{"link":{"mode":0,"page":"pVHlWMXVvqX"},"title":"AD–Brivo Infocenter","key":"APTnvW8Fer"},{"link":{"mode":0,"page":"pE8Es9210DH"},"title":"Career Intelligence-Column","key":"PxRiMrNndz"},{"link":{"mode":0,"page":"p0uEJDpo_QZ"},"title":"AD–Security Renewal","key":"PwD_81Rlr5"},{"link":{"mode":0,"page":"phLNj_-ce-p"},"title":"Leadership & Management-Column","key":"6LK8z7W3ro"},{"link":{"mode":0,"page":"p8pJKINFqHj"},"title":"AD–LinkedIn","key":"tmKwU_a0AI"},{"link":{"mode":0,"page":"pQf1LmMgVrf"},"title":"Cyber Tactics-Column","key":"uHy9vXBeG5"},{"link":{"mode":0,"page":"pJITCN8eoNY"},"title":"AD–House Security 500","key":"QZhU_CA6Fe"},{"link":{"mode":0,"page":"pbq29iTLQMI"},"title":"Education & Training-Column","key":"_LrsIC74uO"},{"link":{"mode":0,"page":"pc0V9gruqHb"},"title":"Product Spotlight-Department","key":"VQcgIW7F9f"},{"link":{"mode":0,"page":"pBkvzv1ASPC"},"title":"Classifieds","key":"uVbL68XAp8"},{"link":{"mode":0,"page":"p-TwP_O6miI"},"title":"Staff Listing","key":"vrh7Bhq49H"},{"link":{"mode":0,"page":"pk_CPGkcsvw"},"title":"eMagazine Navigation Guide","key":"UC5r5d6ZzQ"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pZyOads2QBZ"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}