Linn F. Freedman is a Partner and Data Privacy + Cybersecurity Team Chair at Robinson + Cole. \u003cem >Bio image courtesy of Freedman\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"ekRkHOLChct","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cz6yV_Sie6.jpg","key":"cz6yV_Sie6"}},"type":"image","cl":"image"},{"key":"edsK_E3RMXx","type":"section","children":["eNyMx2yOsI2","ekRkHOLChct"],"cl":"section"},{"key":"eSE-7LE4MzF","content":{"text":"\u003cp >june 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"evD-RXvBlMT","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eDgrdijRcWZ","type":"section","children":["eSE-7LE4MzF","evD-RXvBlMT"],"cl":"section"},{"key":"eFMZhdE2pxh","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eMoEkRy5PSF","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"evYURx6nzBc","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ep4cfNBJ000","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["eFMZhdE2pxh","eMoEkRy5PSF","evYURx6nzBc"],"cl":"image"},{"key":"eU2fJweGh3A","type":"section","children":["ep4cfNBJ000"],"cl":"section"},{"key":"p3KiApdoPyw","children":["eESI_OYV3-F","eKFH7xL5CEI","e-EwP8EEUMf","ebLWXhrlIMq","eyBj4Wnwkcg","e73GY2lR6UV","eqytC9HbFce","eeVdCsRWVOn","e-uK2mUsUEk","edsK_E3RMXx","eDgrdijRcWZ","eU2fJweGh3A"]},{"key":"ewqyiakC4FT","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eCXJ867GmWm","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"ewpmM1zFIeA","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"ewqyiakC4FT":{"pX0vpBC7TrT":true},"ewpmM1zFIeA":{"p6Uq-AmEsf1":true},"eFN6UCJyAuJ":{"pX0vpBC7TrT":true},"eCXJ867GmWm":{"pV87s8cPo6g":true,"pueg8jnWJKR":true,"pKCFUA06pBL":true,"pZ4AT9nKyYP":true,"po8hyM764ln":true,"p0ZT9KjU1eO":true,"pq86xhhyl2I":true,"p24KDFr45PS":true,"pxR-QouVCVR":true,"pfwxSrLVLd1":true,"pe5O0q9MVjp":true,"p7mIOqp4Ddh":true,"panSF1a5lB-":true,"pg0umaQwDuj":true,"p3KiApdoPyw":true,"p5YIP4-GIPq":true,"pxVwxdlFgJH":true,"phGE7FVrgKy":true,"pgz7vv8aobf":true,"pH3oFpSBeBI":true,"p0HzYGIqFze":true,"pV5NSD8IzFn":true,"pLJVzDvWI9X":true,"ppoP_6ULwNV":true,"ptFoxj6bBx1":true,"pERVbJ76PH_":true,"pj38aq1edTh":true,"pS0cDC2keDw":true,"pKpXW4lM7iY":true,"pKP4Ump8YQK":true,"p6Uq-AmEsf1":true}},"children":["ewqyiakC4FT","eCXJ867GmWm","ewpmM1zFIeA"]}],"pages":[{"key":"p0HzYGIqFze","title":"Global News & Analysis-Department","desc":"How the U.S. government is taking steps to protect employees in the healthcare sector; how cybercriminals can utilize AI to crack employee passwords. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/67c_SQ5QuL.jpg","path":"global-news-analysis-department"},{"key":"p0ZT9KjU1eO","title":"AD–xxx","cover":"undefined/image/social/H4yuPKAwiL/p0ZT9KjU1eO/v/0.jpg","path":"adxxx"},{"key":"p24KDFr45PS","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"p3KiApdoPyw","title":"Digital Risk Management-Feature","desc":"Enhancing a digital risk management program starts with enterprise leadership. Cybersecurity leaders can get buy-in through strong incident response programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg","path":"digital-risk-management-feature"},{"key":"p5YIP4-GIPq","title":"Product Spotlight-Department","desc":"Security magazine highlights mobile and touchless security solutions for access control and identity management.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DPn_-1rqMv.jpg","path":"product-spotlight-department"},{"key":"p6Uq-AmEsf1","title":"Supply Chain Security-Special Report","desc":"Security executives who combine security culture, compliance and risk assessments can reduce the impact of security threats to enterprise supply chains.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GzHzWT-nOK.png","path":"supply-chain-security-special-report"},{"key":"p7mIOqp4Ddh","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ilZ-FwQPRg.jpg","path":"admission-500"},{"key":"pERVbJ76PH_","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1J-95tzJS6.png","path":"online-contents"},{"key":"pH3oFpSBeBI","title":"Visitor Management-Feature","desc":"Visitor management systems can help organizations of all sizes by enhancing security, improving efficiency and increasing accountability.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/f3neqYFn1A.jpg","path":"visitor-management-feature"},{"key":"pKCFUA06pBL","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pKP4Ump8YQK","title":"AD–House Security Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pKpXW4lM7iY","title":"AD–Webinar Bosch","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lEWWrbvpEo.png","path":"adwebinar-bosch"},{"key":"pLJVzDvWI9X","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KsXc43uf_s.jpg","path":"staff-listing"},{"key":"pS0cDC2keDw","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"adhouse-security-bookstore"},{"key":"pV5NSD8IzFn","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pV87s8cPo6g","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sli30OtmaD.png","path":"addks"},{"key":"pX0vpBC7TrT","title":"Security June 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GzHzWT-nOK.png","path":"","index":true},{"key":"pXbAFmlfu8X","title":"xxxxxx-Column","cover":"undefined/image/social/H4yuPKAwiL/pXbAFmlfu8X/v/0.jpg","path":"xxxxxx-column"},{"key":"pZ4AT9nKyYP","title":"Education & Training-Column","desc":"With the growing conversation around school safety, building security solutions within higher education requires detailed planning and routine assessments. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bxyye4hXXt.jpg","path":"education--training-column"},{"key":"panSF1a5lB-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pe5O0q9MVjp","title":"Career Intelligence-Column","desc":"Security professionals aiming to advance their careers have many educational opportunities available to them, including degree programs, certifications & more. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0AAnTCPbUv.jpg","path":"career-intelligence-column"},{"key":"pfwxSrLVLd1","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6J_0KxQznt.jpg","path":"table-of-contents"},{"key":"pg0umaQwDuj","title":"AD–House Solutions by Sector","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_6AMePel79.png","path":"adhouse-solutions-by-sector"},{"key":"pgz7vv8aobf","title":"AD–Webinar AXIS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u9dgd8eS8C.png","path":"adwebinar-axis"},{"key":"phGE7FVrgKy","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1u1q-aG872.jpg","path":"advertising-index"},{"key":"pj38aq1edTh","title":"Security Talk-Column","desc":"Security leaders can prepare for business travel by working with stakeholders on travel risk management and tracking and mitigating emerging threats.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/VdeR6f1QIp.jpg","path":"security-talk-column"},{"key":"po8hyM764ln","title":"AD–House Benchmark Security","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PFokti5LP7.png","path":"adhouse-benchmark-security"},{"key":"ppoP_6ULwNV","title":"AD–Webinar Resolver","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yK6T9up1rK.png","path":"adwebinar-resolver"},{"key":"pq86xhhyl2I","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"ptFoxj6bBx1","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"adhouse-security-enewsletter"},{"key":"pueg8jnWJKR","title":"AD–House Refer a Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"adhouse-refer-a-friend"},{"key":"pxR-QouVCVR","title":"Leadership & Management-Column","desc":"Executive education courses can help security leaders better align their functions with the business, explore leadership tactics and enhance crisis management.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zOodtq-a4t.jpg","path":"leadership--management-column"},{"key":"pxVwxdlFgJH","title":"Outsourcing Security-Feature","desc":"When it comes to outsourcing security guard services, security leaders should develop a plan to encourage retention and invest in their team.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LgfZ4s37CJ.jpg","path":"outsourcing-security-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"cz6yV_Sie6":{"meta":{"width":525,"height":475,"description":"Hair, Face, Smile, Head, Chin, Eyebrow, Eye, Jaw"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cz6yV_Sie6.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cz6yV_Sie6.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cz6yV_Sie6.jpg",525]]},"phm9yhFwxj":{"meta":{"width":6720,"height":4480},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg",2560]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"image":"basic","section":"basic","external-link":"basic","text":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"Dn2RMg1yFZ":{"children":[{"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"},{"link":{"mode":0},"title":"Untitled menu item","key":"5TOIOtR8i5"}],"title":"Main menu","key":"Dn2RMg1yFZ"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/kqzxbe4c8qblct6/SEC_June-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pX0vpBC7TrT"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pfwxSrLVLd1"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pERVbJ76PH_"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"p6Uq-AmEsf1"},"title":"Supply Chain Security-Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pxVwxdlFgJH"},"title":"Outsourcing Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pH3oFpSBeBI"},"title":"Visitor Management","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"p3KiApdoPyw"},"title":"Digital Risk Management","key":"1XJJo4tx36"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pj38aq1edTh"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pe5O0q9MVjp"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pxR-QouVCVR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pZ4AT9nKyYP"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"p0HzYGIqFze"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"p5YIP4-GIPq"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"panSF1a5lB-"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"phGE7FVrgKy"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pLJVzDvWI9X"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"p24KDFr45PS"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pX0vpBC7TrT"},"title":"Security June 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pV87s8cPo6g"},"title":"AD–DKS","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pfwxSrLVLd1"},"title":"Table of Contents","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p7mIOqp4Ddh"},"title":"AD–Mission 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pERVbJ76PH_"},"title":"Online Contents","key":"n7WdEiVVb2"},{"link":{"mode":0,"page":"pj38aq1edTh"},"title":"Security Talk-Column","key":"LOJt2EOm1E"},{"link":{"mode":0,"page":"ppoP_6ULwNV"},"title":"AD–Webinar Resolver","key":"Ejv6zrA3HO"},{"link":{"mode":0,"page":"p0HzYGIqFze"},"title":"Global News & Analysis-Department","key":"pfGso8YUIh"},{"link":{"mode":0,"page":"p6Uq-AmEsf1"},"title":"Supply Chain Security-Special Report","key":"ndWVSKFzDW"},{"link":{"mode":0,"page":"po8hyM764ln"},"title":"AD–Benchmark Security","key":"MKe3RLtkYR"},{"link":{"mode":0,"page":"pxVwxdlFgJH"},"title":"Outsourcing Security-Feature","key":"GaWcaJTOew"},{"link":{"mode":0,"page":"pKpXW4lM7iY"},"title":"AD–Webinar Bosch","key":"eyy6Exchs9"},{"link":{"mode":0,"page":"pH3oFpSBeBI"},"title":"Visitor Management-Feature","key":"v2ICVIBWi2"},{"link":{"mode":0,"page":"pg0umaQwDuj"},"title":"AD–Solutions by Sector","key":"19QbLVJ7_T"},{"link":{"mode":0,"page":"p3KiApdoPyw"},"title":"Digital Risk Management-Feature","key":"Mvq0Y7XQCl"},{"link":{"mode":0,"page":"pgz7vv8aobf"},"title":"AD–Webinar AXIS","key":"rPujG61TXK"},{"link":{"mode":0,"page":"pe5O0q9MVjp"},"title":"Career Intelligence-Column","key":"1Uxyk7jeIa"},{"link":{"mode":0,"page":"ptFoxj6bBx1"},"title":"AD–Security eNewsletter","key":"PrEefSLv4k"},{"link":{"mode":0,"page":"pxR-QouVCVR"},"title":"Leadership & Management-Column","key":"uCER0eCDzY"},{"link":{"mode":0,"page":"pKP4Ump8YQK"},"title":"AD–Security Renewal","key":"VWWh61q25F"},{"link":{"mode":0,"page":"pZ4AT9nKyYP"},"title":"Education & Training-Column","key":"0zr3ZUEjCr"},{"link":{"mode":0,"page":"pV5NSD8IzFn"},"title":"AD–BNP Engage","key":"3gUIFpLW9p"},{"link":{"mode":0,"page":"pS0cDC2keDw"},"title":"AD–Security Bookstore","key":"OUoYs7P_-D"},{"link":{"mode":0,"page":"p5YIP4-GIPq"},"title":"Product Spotlight-Department","key":"QtD6NVnqJy"},{"link":{"mode":0,"page":"pq86xhhyl2I"},"title":"AD–Brivo Infocenter","key":"_MaseN3lVy"},{"link":{"mode":0,"page":"pueg8jnWJKR"},"title":"AD–Refer a Friend","key":"NqhsUh76Xx"},{"link":{"mode":0,"page":"panSF1a5lB-"},"title":"Classifieds","key":"-_X9KFD9xy"},{"link":{"mode":0,"page":"phGE7FVrgKy"},"title":"Advertising Index","key":"aXA2It5RHQ"},{"link":{"mode":0,"page":"pLJVzDvWI9X"},"title":"Staff Listing","key":"jWaWO5KmiJ"},{"link":{"mode":0,"page":"p24KDFr45PS"},"title":"eMagazine Navigation Guide","key":"zl1W-QGEaA"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]}}