\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"e3cnkt16q1h","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"eHAeTmOv3w_","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"preset":"pWabAOUihi","type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"eca7pzdvMxA","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"ewbN4Yl5mV1","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"e4fmg0iniql","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"eBOMVvfUL26","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"erOgI_jWpDQ","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["eBOMVvfUL26"],"cl":"image"},{"key":"emreMCf_-pL","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eW-CVaFRD-m","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["emreMCf_-pL"],"cl":"image"},{"key":"eZHNYOtxu5l","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"e3VLuIt8axQ","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eZHNYOtxu5l"],"cl":"image"},{"key":"eX1nu73ehVB","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eS6V0PHYeEB","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["eX1nu73ehVB"],"cl":"image"},{"key":"ehistoKcs50","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"eekw0DDPMFG","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["ehistoKcs50"],"cl":"image"},{"key":"eeZ0FB0HG4B","content":{"children":[]},"type":"section","children":["e_sqdf_kdrz","eTl5eaKpy95","e3cnkt16q1h","eHAeTmOv3w_","eca7pzdvMxA","ewbN4Yl5mV1","e4fmg0iniql","erOgI_jWpDQ","eW-CVaFRD-m","e3VLuIt8axQ","eS6V0PHYeEB","eekw0DDPMFG"],"cl":"section"},{"key":"eLyNzeDjX8h","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eBmRoBmELeA","content":{"children":[],"linkUrl":"https://www.axis.com/en-us/solutions/healthcare/wearable-solutions-for-healthcare","ioDetailID":579419,"adCreative":{"key":"hwQUYcF2Qs","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg"},"showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"June - Sponsored BOX - LOGO","page":"p0wkMBzufzJ","pageName":"Security June 2024","key":"ens4SsOz4Hj"},"adSize":"Cover Sponsor","advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["eLyNzeDjX8h"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"fixed","visibility":{"epuuHvh0UJO":true,"eQSqJ23XEbf":{"pveAlhalwRo":true},"eFdLySqT48i":{"pjRLomSvHL2":"footer","p7eff0frBVR":"footer","psIeADCCvnm":"footer","pMaMYEcOJ__":"footer","pyokujrW0ih":"footer","pRoqYAAwkLm":"footer","pM9TU_XmKli":"footer","pw9lB91VRDS":"footer","pjkjDLurJZt":"footer","p6bW7IJpm_J":"footer","p51HWyO93HJ":"footer","plb-I5L4DTl":"footer","phGz6QMgL9D":"footer","pG5WTugKcvW":"footer","p3g3yZqOMly":"footer","p6TPvfXEhzO":"footer","p05xfoVuowk":"footer","pveAlhalwRo":"footer","pDSmjCmcZ4a":"footer"},"eZ0jk1OeD3a":{"pjRLomSvHL2":"footer","p7eff0frBVR":"footer","psIeADCCvnm":"footer","pMaMYEcOJ__":"footer","pyokujrW0ih":"footer","pRoqYAAwkLm":"footer","pM9TU_XmKli":"footer","pw9lB91VRDS":"footer","pjkjDLurJZt":"footer","p6bW7IJpm_J":"footer","p51HWyO93HJ":"footer","plb-I5L4DTl":"footer","phGz6QMgL9D":"footer","pG5WTugKcvW":"footer","p3g3yZqOMly":"footer","p6TPvfXEhzO":"footer","p05xfoVuowk":"footer","pveAlhalwRo":"footer","pDSmjCmcZ4a":"footer"},"eBmRoBmELeA":{"p0wkMBzufzJ":true},"eeZ0FB0HG4B":{"pjRLomSvHL2":"footer","p7eff0frBVR":"footer","psIeADCCvnm":"footer","pMaMYEcOJ__":"footer","pyokujrW0ih":"footer","pRoqYAAwkLm":"footer","pM9TU_XmKli":"footer","pw9lB91VRDS":"footer","pjkjDLurJZt":"footer","p6bW7IJpm_J":"footer","p51HWyO93HJ":"footer","plb-I5L4DTl":"footer","phGz6QMgL9D":"footer","pG5WTugKcvW":"footer","p3g3yZqOMly":"footer","p6TPvfXEhzO":"footer","p05xfoVuowk":"footer","pveAlhalwRo":"footer","pDSmjCmcZ4a":"footer"}},"children":["eQSqJ23XEbf","epuuHvh0UJO","eZ0jk1OeD3a","eFdLySqT48i","eeZ0FB0HG4B","eBmRoBmELeA"]}],"pages":[{"key":"p-U1MiVYLbo","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"},{"key":"p05xfoVuowk","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"p0wkMBzufzJ","title":"Security June 2024","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/R9sE_rCBTS.jpg","path":"","index":true},{"key":"p3g3yZqOMly","title":"Leadership & Management-Column","desc":"Tips to help security leaders navigate endless Internet lists about leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h_pq3_cGUL.jpg","path":"leadership-management-column"},{"key":"p51HWyO93HJ","title":"Weapons Detection in Healthcare-Feature","desc":"Security leader notes examples of intricate dance between security screeners, hospital entrants, and technology utilized at healthcare facilities.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Hwsqr6wVQg.jpg","path":"weapons-detection-in-healthcare-feature"},{"key":"p5WLAGPKiKQ","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"p6TPvfXEhzO","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RlhIx85ZSp.jpg","path":"table-of-contents"},{"key":"p6bW7IJpm_J","title":"Career Intelligence-Column","desc":"Security professionals angling for top jobs in the industry often focus on the role of Chief Security Officer. Is that the best job search strategy?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/cBqSt5qkKV.jpg","path":"career-intelligence-column"},{"key":"p7eff0frBVR","title":"Education & Training-Column","desc":"Transitioning security careers can be difficult, but there are several skills that can be transferred between positions","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/TZewthML2s.jpg","path":"education-training-column"},{"key":"p8e0Vi_rmzI","title":"AD–MCA","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Z8Pz118DPg.png","path":"ad-mca"},{"key":"pCLStpLylwF","title":"AD–Webinar Resolver ","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNHL_4ExTc.png","path":"ad-webinar-resolver"},{"key":"pDOth3or8Bq","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/JWeXHPjxAG.png","path":"ad-dks"},{"key":"pDSmjCmcZ4a","title":"Reputational Defense-Feature","desc":"Company events — big or small — are important when considering how to protect brand image. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3mlMAgd0VN.jpg","path":"reputational-defense-feature"},{"key":"pEvALcTe4eg","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ixwI0iGzjK.png","path":"adxxxx-copy4"},{"key":"pG5WTugKcvW","title":"Security Talk-Column","desc":"From leadership advice to explorations of emerging security threats, guests on The Security Podcasts share career stories for the good of the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZR0bKlx_Vk.jpg","path":"security-talk-column"},{"key":"pJ7snjTHTIX","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pM9TU_XmKli","title":"Global News & Analysis-Department","desc":"SAP vulnerabilities are targeted by cybercriminals; Cybersecurity professionals are missing critical alerts","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_WtFsVpbIT.jpg","path":"global-news-analysis-department"},{"key":"pMaMYEcOJ__","title":"xxxxxx-Feature","desc":"","cover":"undefined/image/social/W564kevhO5/pMaMYEcOJ__/v/0.jpg","path":"xxxxxx-feature"},{"key":"pRoqYAAwkLm","title":"xxxxx-Column","desc":"","cover":"undefined/image/social/CgTiSBCXHi/pRoqYAAwkLm/v/0.jpg","path":"xxxxx-column"},{"key":"pTMBmKC43md","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/EiNjW8ue0k.png","path":"ad-amarok"},{"key":"pWOrrofnDGd","title":"AD–xxxx","desc":"","cover":"undefined/image/social/W564kevhO5/pWOrrofnDGd/v/0.jpg","path":"ad-xxxx"},{"key":"pZ-yISA7ZoP","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad-house-onsolve-infocenter"},{"key":"p_9Fo-CGzqp","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"phGz6QMgL9D","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5CCy9XvAOz.png","path":"online-contents"},{"key":"pjRLomSvHL2","title":"Cyber Tactics-Column","desc":"AI has become a ubiquitous topic in boardrooms and among C-suite leaders across a range of professional disciplines — including in the security community.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0veWeCJJ2p.jpg","path":"cyber-tactics-column"},{"key":"pjkjDLurJZt","title":"Product Spotlight-Department","desc":"Security magazine highlights a few products that help keep critical systems safe from attack.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yenzaD66MX.jpg","path":"product-spotlight-department"},{"key":"pjttU5bf55D","title":"AD–House Benchmark Report","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ByRs7pdtKY.png","path":"ad-house-benchmark-report"},{"key":"plb-I5L4DTl","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"ppeYQCumLVu","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide"},{"key":"psIeADCCvnm","title":"How AI Affects & Aids Physical Security-Feature","desc":"AI is a valuable surveillance tool that is changing how organizations secure their physical infrastructure.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J77QFZdLtA.jpg","path":"how-ai-affects-aids-physical-security-feature"},{"key":"pveAlhalwRo","title":"Special Report-Securing Hospitals/Healthcare Systems","desc":"Security leaders discuss navigating security challenges at hospitals and healthcare facilities.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/R9sE_rCBTS.jpg","path":"special-report-securing-hospitals-healthcare-systems"},{"key":"pw9lB91VRDS","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x6fKheDzAN.jpg","path":"advertising-index"},{"key":"pyhDV5EcxKH","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pyokujrW0ih","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pD1aj4xpiK.jpg","path":"staff-listing"},{"key":"pyylKHD_Wmb","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad-house-solutions-by-sector"}],"shapes":{},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"hwQUYcF2Qs":{"meta":{"width":1200,"height":1600,"description":"White coat, Health care, Workwear, Sleeve, Collar, Stethoscope, Smile"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hwQUYcF2Qs.jpg",1600]]},"i1WQbwsse0":{"meta":{"width":1200,"height":1600,"description":"Font, Red"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/i1WQbwsse0.jpg",1600]]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"variables":[],"pkg":{"wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","w1br1l0lsu-u06":"pgxSSDpDPRe","wpSs3hF4JIq":"XbbrSxSJp"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/q2qni0zhp8o88vwftt92l/SEC_June-2024_Full-Issue.pdf?rlkey=isr9ebkriszx5tk63j4rhkzlp&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"p0wkMBzufzJ"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"p6TPvfXEhzO"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pw9lB91VRDS"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p0wkMBzufzJ"},"title":"Security June 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pDOth3or8Bq"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"p6TPvfXEhzO"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pjttU5bf55D"},"title":"AD–Benchmark Report","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pw9lB91VRDS"},"title":"Advertising Index","key":"rDugmU5IYq"},{"link":{"mode":0,"page":"pyylKHD_Wmb"},"title":"AD–Solutions by Sector","key":"cdtuAFZK6E"},{"link":{"mode":0,"page":"phGz6QMgL9D"},"title":"Online Contents","key":"k3mRqlwCYG"},{"link":{"mode":0,"page":"pG5WTugKcvW"},"title":"Security Talk-Column","key":"hs_shDSVmD"},{"link":{"mode":0,"page":"pM9TU_XmKli"},"title":"Global News & Analysis-Department","key":"6aA__edi0h"},{"link":{"mode":0,"page":"pveAlhalwRo"},"title":"Special Report-Securing Hospitals/Healthcare Systems","key":"-S2hA4Ecb7"},{"link":{"mode":0,"page":"p8e0Vi_rmzI"},"title":"AD–MCA","key":"Kj3SlBphkb"},{"link":{"mode":0,"page":"pDSmjCmcZ4a"},"title":"Reputational Defense-Feature","key":"Wt886qTxPt"},{"link":{"mode":0,"page":"psIeADCCvnm"},"title":"How AI Affects & Aids Physical Security-Feature","key":"nZpbQt-XEo"},{"link":{"mode":0,"page":"p5WLAGPKiKQ"},"title":"AD–Security eNewsletter","key":"OBw8aBAyLc"},{"link":{"mode":0,"page":"p51HWyO93HJ"},"title":"Weapons Detection in Healthcare-Feature","key":"4umPIh-Zx-"},{"link":{"mode":0,"page":"pZ-yISA7ZoP"},"title":"AD–OnSolve Infocenter","key":"u8p-mWM-xx"},{"link":{"mode":0,"page":"p6bW7IJpm_J"},"title":"Career Intelligence-Column","key":"sZm1wHKPOB"},{"link":{"mode":0,"page":"pJ7snjTHTIX"},"title":"AD–Security Renewal","key":"20sntfFYx8"},{"link":{"mode":0,"page":"p3g3yZqOMly"},"title":"Leadership & Management-Column","key":"sFuKB96iqA"},{"link":{"mode":0,"page":"pyhDV5EcxKH"},"title":"AD–LinkedIn","key":"BR426fGgNK"},{"link":{"mode":0,"page":"pjRLomSvHL2"},"title":"Cyber Tactics-Column","key":"D7VSJwwHF5"},{"link":{"mode":0,"page":"p-U1MiVYLbo"},"title":"AD–Continuing Education (CEU)","key":"I3CmHlx1UH"},{"link":{"mode":0,"page":"pEvALcTe4eg"},"title":"AD–Brivo Infocenter","key":"nlLMVnxdXw"},{"link":{"mode":0,"page":"p7eff0frBVR"},"title":"Education & Training-Column","key":"OoOcT2-wxN"},{"link":{"mode":0,"page":"pTMBmKC43md"},"title":"AD–Amarok","key":"sK8Bbb_uji"},{"link":{"mode":0,"page":"pjkjDLurJZt"},"title":"Product Spotlight-Department","key":"3hyPWKir42"},{"link":{"mode":0,"page":"pCLStpLylwF"},"title":"AD–Webinar Resolver ","key":"EfFGnXRny6"},{"link":{"mode":0,"page":"p_9Fo-CGzqp"},"title":"AD–Security Bookstore","key":"qe8uELHeFy"},{"link":{"mode":0,"page":"plb-I5L4DTl"},"title":"Classifieds","key":"Y5YKLnpS81"},{"link":{"mode":0,"page":"pyokujrW0ih"},"title":"Staff Listing","key":"IcaB72UjfX"},{"link":{"mode":0,"page":"ppeYQCumLVu"},"title":"eMagazine Navigation Guide","key":"FShiSCJixF"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"p6TPvfXEhzO"},"title":"Table of Contents","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}