\u003c/strong>Contributing Writer\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eA1qMj7S9MS","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg","key":"k8JAsGqe3c"}},"type":"image","cl":"image"},{"key":"eD-vIcLSYnb","content":{"text":"\u003ch1 >Assessments and Comprehensive Security Planning in Higher Education \u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eSEodpi-lJx","content":{"text":"\u003ch2 >Security leaders in higher education should create adaptable security plans to manage potential risks. \u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ezPkM04cbU3","type":"section","children":["eCkJXszsRvN","eA1qMj7S9MS","eD-vIcLSYnb","eSEodpi-lJx"],"cl":"section"},{"key":"eClScAGhcAv","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg","key":"9YTgKi1b0z"}},"type":"image","cl":"image"},{"key":"ek4mPKwd4R0","content":{"text":"\u003cp >\u003cem >Monkeybusinessimages / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eqMYlh4e4Tf","type":"section","children":["eClScAGhcAv","ek4mPKwd4R0"],"cl":"section"},{"key":"e8MGnL3Fdsg","content":{"text":"\u003cp >Comprehensive security programming within an organization requires a continuous cycle of assessment, planning and improvement to address emerging risk and sustain a proactive security posture. This statement may seem obvious to most security professionals, however, the practice of annually assessing security programs within many higher education environments remains sporadic, and assessments are often only triggered after an alarming event has occurred. \u003c/p>\u003cp >To establish and operate a successful security program, security leaders should use a comprehensive approach in reviewing the previous academic year’s high-profile incidents and crime statistics; update departmental policies, procedures and training; maintain existing or deploy new physical security assets; and realign individual and organizational responsibilities to various personnel and departments. \u003c/p>\u003cp >Yes, organizational audits and assessments are tedious, time-consuming and require energy often exhausted from the previous academic or fiscal year’s activities. However, they are free (if conducted internally) and there is no better time than the end of the term or fiscal year to reflect on the challenges and related opportunities that have bubbled their way to the surface. \u003c/p>\u003cp >In order to help streamline the process, security professionals can follow three simple steps and areas of focus to better plan and inform improvements to security programming over the summer, ensuring a more proactive security posture when the fall term begins. \u003c/p>\u003ch5 >Step 1: Simple Assessment Methodology\u003c/h5>\u003cp >The assessment process should include a wide range of organizational stakeholders and sources of information. Form a small security assessment task force or utilize the existing safety committee to divide and conquer the following tasks: \u003c/p>\u003cul >\u003cli >\u003cdiv style=\"position:relative\">Conduct a physical survey of key areas across all campus buildings and property. Use a crime prevention through environmental design (CPTED) lens.\u003c/div>\u003c/li>\u003cli >Interview or survey administrators, faculty, staff and students. Solicit feedback any and every way possible to better understand the community’s experience and perceptions of the existing security program.\u003c/li>\u003cli >Dust off emergency operation plans, procedure guides and training exercises from the past year. Where are the gaps? What challenges did the exercise debrief identify?\u003c/li>\u003cli >Dig into incident reports and conduct cases. Did the security program learn anything new? What trends did the team identify last term? Don’t wait for September to start the stat review. There is no better time than now! \u003c/li>\u003c/ul>\u003ch5 >Step 2: Create an Organized List of Findings\u003c/h5>\u003cp >The findings section is the result of the tasks referenced in the methodology section. Compile all the assessment information and review it with the team. \u003c/p>\u003cp >Security programming within an academic setting is a delicate balance of preparation and response to environment-specific risks. Security planning efforts are more successful when they are focused and consistent with the organizational culture and mission. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"exy71BUIqLz","type":"section","children":["e8MGnL3Fdsg"],"cl":"section"},{"key":"exNSbjI8QB2","content":{"text":"\u003ch1 >“Security programming within an academic setting is a delicate balance of preparation and response to environment-specific risks.”\u003c/h1>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"e_XNZly8nwN","content":{"src":{"key":"7Iq54aVwp4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","ratio":1}},"type":"image","cl":"image"},{"key":"eGbT1ADBFOS","type":"section","children":["exNSbjI8QB2","e_XNZly8nwN"],"cl":"section"},{"key":"eZ2iHNg8R62","content":{"text":"\u003cp >Once the annual assessment is complete, work to determine the organization’s current level of preparedness based on the premise that effective programming requires organizations to understand and identify their risks. When identifying risks related to security programming, one approach is to organize program assessment findings under the consideration of the following critical elements: \u003c/p>\u003cul >\u003cli >Professional management and staffing of the security functions that serve the organization should be supported and trained appropriately.\u003c/li>\u003cli >Organizational policies, procedures and practices that address specific needs should be well-written, adhered to and routinely audited.\u003c/li>\u003cli >Physical security technology and equipment should be designed and deployed based on an assessment of need and be properly utilized, monitored, updated and maintained.\u003c/li>\u003cli >Community training and participation in security programming efforts should be interactive and conducted on a regular basis.\u003c/li>\u003cli >Accurate reporting and compliance requirements should be met, published if required, and reviewed methodically. \u003c/li>\u003cli >Emergency operations planning and procedures should be routinely tested, updated and disseminated to organizational stakeholders.\u003c/li>\u003c/ul>\u003ch5 >Step 3: Mitigate the Findings With Prioritized Recommendations\u003c/h5>\u003cp >Naturally, the final step is to mitigate the findings with a set of prioritized recommendations. There is no need to create a finely calibrated heat map or design a fancy algorithm. Recommendations just need to be reasonable and achievable action items aimed to mitigate the risks identified in the assessment process. The objective of the recommendations section is to begin the process of prioritizing resources needed and to identify an estimated timeframe in which the implementation of these resources should be considered. The application and integration of these elements varies at every organization based on risks identified, the risk tolerance of the administration and members of the community to various threats (real or perceived) and finally available resources and capabilities. \u003c/p>\u003cp >The recommendations section allows security professionals to have a focused conversation with their department and community stakeholders regarding the status of the organization’s security program and the action items needed to improve. Recommendations simply assist the organization in determining the security needs of the community.\u003c/p>\u003ch5 >Evolve the Campus Security Program\u003c/h5>\u003cp >To summarize, safety, security, emergency management and crime prevention programming within organizations requires dynamic methods. As organizational functions and activities change and facility conditions are modified or expanded, so must an organization’s security posture. Therefore, security process management, physical security technology, equipment, policies, procedures and training should be routinely reviewed and updated to reflect changes in the environment and the expectations of community members. Establishing an annual assessment and planning process over the summer is an effective exercise in maintaining a proactive comprehensive security program.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eXSf5M6MJYA","type":"section","children":["eZ2iHNg8R62"],"cl":"section"},{"key":"ePDJXz7qDVL","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"enxHQavUQYR","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eRBNJkLNU58","type":"section","children":["ePDJXz7qDVL","enxHQavUQYR"],"cl":"section"},{"key":"ewWL3BApL28","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Jesse Cashman is the Director of Auxiliary Services at Carleton College. Cashman has worked in higher education security for two decades, beginning as a public safety officer in 2003. Cashman is also the owner of Campus Safety Consulting, LLC. \u003cem >Bio image courtesy of Cashman\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eYPxc3q4oB_","type":"section","children":["ewWL3BApL28"],"cl":"section"},{"key":"eju8I6HH8Og","content":{"text":"\u003cp >june 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"e-qAiLXMrcM","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eO59YM39LWx","type":"section","children":["eju8I6HH8Og","e-qAiLXMrcM"],"cl":"section"},{"key":"ehJSttjFsx6","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e4gxJoQz_eO","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"egMNmrPl0YE","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ewsZNI_DLaz","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["ehJSttjFsx6","e4gxJoQz_eO","egMNmrPl0YE"],"cl":"image"},{"key":"eswRbCsS3p1","type":"section","children":["ewsZNI_DLaz"],"cl":"section"},{"key":"pZ4AT9nKyYP","children":["eUa4RZGe2NP","euOfoFmOen4","ef_Pqy1I7Dw","ezPkM04cbU3","eqMYlh4e4Tf","exy71BUIqLz","eGbT1ADBFOS","eXSf5M6MJYA","eRBNJkLNU58","eYPxc3q4oB_","eO59YM39LWx","eswRbCsS3p1"]},{"key":"ewqyiakC4FT","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eCXJ867GmWm","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"ewpmM1zFIeA","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"ewqyiakC4FT":{"pX0vpBC7TrT":true},"ewpmM1zFIeA":{"p6Uq-AmEsf1":true},"eFN6UCJyAuJ":{"pX0vpBC7TrT":true},"eCXJ867GmWm":{"pV87s8cPo6g":true,"pueg8jnWJKR":true,"pKCFUA06pBL":true,"pZ4AT9nKyYP":true,"po8hyM764ln":true,"p0ZT9KjU1eO":true,"pq86xhhyl2I":true,"p24KDFr45PS":true,"pxR-QouVCVR":true,"pfwxSrLVLd1":true,"pe5O0q9MVjp":true,"p7mIOqp4Ddh":true,"panSF1a5lB-":true,"pg0umaQwDuj":true,"p3KiApdoPyw":true,"p5YIP4-GIPq":true,"pxVwxdlFgJH":true,"phGE7FVrgKy":true,"pgz7vv8aobf":true,"pH3oFpSBeBI":true,"p0HzYGIqFze":true,"pV5NSD8IzFn":true,"pLJVzDvWI9X":true,"ppoP_6ULwNV":true,"ptFoxj6bBx1":true,"pERVbJ76PH_":true,"pj38aq1edTh":true,"pS0cDC2keDw":true,"pKpXW4lM7iY":true,"pKP4Ump8YQK":true,"p6Uq-AmEsf1":true}},"children":["ewqyiakC4FT","eCXJ867GmWm","ewpmM1zFIeA"]}],"pages":[{"key":"p0HzYGIqFze","title":"Global News & Analysis-Department","desc":"How the U.S. government is taking steps to protect employees in the healthcare sector; how cybercriminals can utilize AI to crack employee passwords. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/67c_SQ5QuL.jpg","path":"global-news-analysis-department"},{"key":"p0ZT9KjU1eO","title":"AD–xxx","cover":"undefined/image/social/H4yuPKAwiL/p0ZT9KjU1eO/v/0.jpg","path":"adxxx"},{"key":"p24KDFr45PS","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"p3KiApdoPyw","title":"Digital Risk Management-Feature","desc":"Enhancing a digital risk management program starts with enterprise leadership. Cybersecurity leaders can get buy-in through strong incident response programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/phm9yhFwxj.jpg","path":"digital-risk-management-feature"},{"key":"p5YIP4-GIPq","title":"Product Spotlight-Department","desc":"Security magazine highlights mobile and touchless security solutions for access control and identity management.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DPn_-1rqMv.jpg","path":"product-spotlight-department"},{"key":"p6Uq-AmEsf1","title":"Supply Chain Security-Special Report","desc":"Security executives who combine security culture, compliance and risk assessments can reduce the impact of security threats to enterprise supply chains.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GzHzWT-nOK.png","path":"supply-chain-security-special-report"},{"key":"p7mIOqp4Ddh","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ilZ-FwQPRg.jpg","path":"admission-500"},{"key":"pERVbJ76PH_","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1J-95tzJS6.png","path":"online-contents"},{"key":"pH3oFpSBeBI","title":"Visitor Management-Feature","desc":"Visitor management systems can help organizations of all sizes by enhancing security, improving efficiency and increasing accountability.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/f3neqYFn1A.jpg","path":"visitor-management-feature"},{"key":"pKCFUA06pBL","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pKP4Ump8YQK","title":"AD–House Security Renewal","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pKpXW4lM7iY","title":"AD–Webinar Bosch","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lEWWrbvpEo.png","path":"adwebinar-bosch"},{"key":"pLJVzDvWI9X","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KsXc43uf_s.jpg","path":"staff-listing"},{"key":"pS0cDC2keDw","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"adhouse-security-bookstore"},{"key":"pV5NSD8IzFn","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pV87s8cPo6g","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sli30OtmaD.png","path":"addks"},{"key":"pX0vpBC7TrT","title":"Security June 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GzHzWT-nOK.png","path":"","index":true},{"key":"pXbAFmlfu8X","title":"xxxxxx-Column","cover":"undefined/image/social/H4yuPKAwiL/pXbAFmlfu8X/v/0.jpg","path":"xxxxxx-column"},{"key":"pZ4AT9nKyYP","title":"Education & Training-Column","desc":"With the growing conversation around school safety, building security solutions within higher education requires detailed planning and routine assessments. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bxyye4hXXt.jpg","path":"education--training-column"},{"key":"panSF1a5lB-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pe5O0q9MVjp","title":"Career Intelligence-Column","desc":"Security professionals aiming to advance their careers have many educational opportunities available to them, including degree programs, certifications & more. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0AAnTCPbUv.jpg","path":"career-intelligence-column"},{"key":"pfwxSrLVLd1","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6J_0KxQznt.jpg","path":"table-of-contents"},{"key":"pg0umaQwDuj","title":"AD–House Solutions by Sector","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_6AMePel79.png","path":"adhouse-solutions-by-sector"},{"key":"pgz7vv8aobf","title":"AD–Webinar AXIS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u9dgd8eS8C.png","path":"adwebinar-axis"},{"key":"phGE7FVrgKy","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1u1q-aG872.jpg","path":"advertising-index"},{"key":"pj38aq1edTh","title":"Security Talk-Column","desc":"Security leaders can prepare for business travel by working with stakeholders on travel risk management and tracking and mitigating emerging threats.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/VdeR6f1QIp.jpg","path":"security-talk-column"},{"key":"po8hyM764ln","title":"AD–House Benchmark Security","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PFokti5LP7.png","path":"adhouse-benchmark-security"},{"key":"ppoP_6ULwNV","title":"AD–Webinar Resolver","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yK6T9up1rK.png","path":"adwebinar-resolver"},{"key":"pq86xhhyl2I","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"ptFoxj6bBx1","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"adhouse-security-enewsletter"},{"key":"pueg8jnWJKR","title":"AD–House Refer a Friend","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"adhouse-refer-a-friend"},{"key":"pxR-QouVCVR","title":"Leadership & Management-Column","desc":"Executive education courses can help security leaders better align their functions with the business, explore leadership tactics and enhance crisis management.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zOodtq-a4t.jpg","path":"leadership--management-column"},{"key":"pxVwxdlFgJH","title":"Outsourcing Security-Feature","desc":"When it comes to outsourcing security guard services, security leaders should develop a plan to encourage retention and invest in their team.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LgfZ4s37CJ.jpg","path":"outsourcing-security-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"9YTgKi1b0z":{"meta":{"width":3000,"height":2000,"description":"Footwear, Shoe, Smile, Plant, Fashion, Standing, Tree, Style, Happy, Leisure"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9YTgKi1b0z.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"k8JAsGqe3c":{"meta":{"width":1002,"height":1137,"description":"Dress shirt, Facial hair, Forehead, Smile, Beard, Jaw, Sleeve, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k8JAsGqe3c.jpg",1137]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"image":"basic","section":"basic","external-link":"basic","text":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w7Ty9ifjBD":"pEIMfUpQ6oy","wl9gVIiyFe":"p7bqre2y"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"Dn2RMg1yFZ":{"children":[{"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"},{"link":{"mode":0},"title":"Untitled menu item","key":"5TOIOtR8i5"}],"title":"Main menu","key":"Dn2RMg1yFZ"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/kqzxbe4c8qblct6/SEC_June-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu","children":[{"link":{"mode":0,"page":"pX0vpBC7TrT"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pfwxSrLVLd1"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pERVbJ76PH_"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"p6Uq-AmEsf1"},"title":"Supply Chain Security-Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pxVwxdlFgJH"},"title":"Outsourcing Security","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"pH3oFpSBeBI"},"title":"Visitor Management","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"p3KiApdoPyw"},"title":"Digital Risk Management","key":"1XJJo4tx36"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pj38aq1edTh"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pe5O0q9MVjp"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pxR-QouVCVR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pZ4AT9nKyYP"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"p0HzYGIqFze"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"p5YIP4-GIPq"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"panSF1a5lB-"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"phGE7FVrgKy"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pLJVzDvWI9X"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"p24KDFr45PS"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"pX0vpBC7TrT"},"title":"Security June 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pV87s8cPo6g"},"title":"AD–DKS","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pfwxSrLVLd1"},"title":"Table of Contents","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p7mIOqp4Ddh"},"title":"AD–Mission 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pERVbJ76PH_"},"title":"Online Contents","key":"n7WdEiVVb2"},{"link":{"mode":0,"page":"pj38aq1edTh"},"title":"Security Talk-Column","key":"LOJt2EOm1E"},{"link":{"mode":0,"page":"ppoP_6ULwNV"},"title":"AD–Webinar Resolver","key":"Ejv6zrA3HO"},{"link":{"mode":0,"page":"p0HzYGIqFze"},"title":"Global News & Analysis-Department","key":"pfGso8YUIh"},{"link":{"mode":0,"page":"p6Uq-AmEsf1"},"title":"Supply Chain Security-Special Report","key":"ndWVSKFzDW"},{"link":{"mode":0,"page":"po8hyM764ln"},"title":"AD–Benchmark Security","key":"MKe3RLtkYR"},{"link":{"mode":0,"page":"pxVwxdlFgJH"},"title":"Outsourcing Security-Feature","key":"GaWcaJTOew"},{"link":{"mode":0,"page":"pKpXW4lM7iY"},"title":"AD–Webinar Bosch","key":"eyy6Exchs9"},{"link":{"mode":0,"page":"pH3oFpSBeBI"},"title":"Visitor Management-Feature","key":"v2ICVIBWi2"},{"link":{"mode":0,"page":"pg0umaQwDuj"},"title":"AD–Solutions by Sector","key":"19QbLVJ7_T"},{"link":{"mode":0,"page":"p3KiApdoPyw"},"title":"Digital Risk Management-Feature","key":"Mvq0Y7XQCl"},{"link":{"mode":0,"page":"pgz7vv8aobf"},"title":"AD–Webinar AXIS","key":"rPujG61TXK"},{"link":{"mode":0,"page":"pe5O0q9MVjp"},"title":"Career Intelligence-Column","key":"1Uxyk7jeIa"},{"link":{"mode":0,"page":"ptFoxj6bBx1"},"title":"AD–Security eNewsletter","key":"PrEefSLv4k"},{"link":{"mode":0,"page":"pxR-QouVCVR"},"title":"Leadership & Management-Column","key":"uCER0eCDzY"},{"link":{"mode":0,"page":"pKP4Ump8YQK"},"title":"AD–Security Renewal","key":"VWWh61q25F"},{"link":{"mode":0,"page":"pZ4AT9nKyYP"},"title":"Education & Training-Column","key":"0zr3ZUEjCr"},{"link":{"mode":0,"page":"pV5NSD8IzFn"},"title":"AD–BNP Engage","key":"3gUIFpLW9p"},{"link":{"mode":0,"page":"pS0cDC2keDw"},"title":"AD–Security Bookstore","key":"OUoYs7P_-D"},{"link":{"mode":0,"page":"p5YIP4-GIPq"},"title":"Product Spotlight-Department","key":"QtD6NVnqJy"},{"link":{"mode":0,"page":"pq86xhhyl2I"},"title":"AD–Brivo Infocenter","key":"_MaseN3lVy"},{"link":{"mode":0,"page":"pueg8jnWJKR"},"title":"AD–Refer a Friend","key":"NqhsUh76Xx"},{"link":{"mode":0,"page":"panSF1a5lB-"},"title":"Classifieds","key":"-_X9KFD9xy"},{"link":{"mode":0,"page":"phGE7FVrgKy"},"title":"Advertising Index","key":"aXA2It5RHQ"},{"link":{"mode":0,"page":"pLJVzDvWI9X"},"title":"Staff Listing","key":"jWaWO5KmiJ"},{"link":{"mode":0,"page":"p24KDFr45PS"},"title":"eMagazine Navigation Guide","key":"zl1W-QGEaA"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]}}