Contributing Writer\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"emKZVoB7ouc","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg","key":"eCv8uPcqMD","ratio":1}},"type":"image","cl":"image"},{"key":"eTHQqfS3INJ","content":{"text":"\u003ch1 >Reflections on 35 Years in the Trenches\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eye9HcFRqvt","content":{"text":"\u003ch2 >To stay ahead of our adversaries, cybersecurity leaders must continually innovate and prioritize proactive security.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eLD7W8Uvtho","type":"section","children":["e3SRPYtBG4H","emKZVoB7ouc","eTHQqfS3INJ","eye9HcFRqvt"],"cl":"section"},{"key":"e8ZoD01kGLc","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","key":"nITzDTTY-I"}},"type":"image","cl":"image"},{"key":"e9SdDLGU-8E","content":{"text":"\u003cp >\u003cem >your_photo / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"egZEiI3Ycme","type":"section","children":["e8ZoD01kGLc","e9SdDLGU-8E"],"cl":"section"},{"key":"ebam5ISkacb","content":{"text":"\u003cp >“May you live in interesting times” is a proverb that has resonated in my life over the last four decades as both a curse and blessing. \u003c/p>\u003cp >No small part of that valuation is attributable to the pace at which technology innovations have been advanced and now contribute to the quality and challenges of the lives we lead. Those advances came at a cost, none more notable than the degradation of the boundaries that traditionally defined our world and around which we constructed and imputed meaning to the environments churning around us. The associated porosity that attended that degradation has been exacerbated by the rise of the Internet of Things (IoT), in which our adversaries have discovered new and almost innumerable attack vectors through which to strike at our interests. \u003c/p>\u003cp >Our response to those attacks always aspired to be proactively preventative, but more times than not found itself stymied in the world of the reactive. Rather than being a guardrail at the top of the cliff, we found ourselves serving as an ambulance at the bottom. The associated costs of those efforts were not inconsequential and over time exacted such a toll on our businesses that we came to be perceived as a distasteful cost of doing business, reflected in complex structures often characterized as “defense in depth.” Those of us who sold into these structures appreciated them for what they really were: “expense in depth,” made necessary by a failure of signature-based anti-virus solutions deployed high in the kill chain. \u003c/p>\u003cp >With the rise of machine-learning-supported artificial intelligence (AI), deployed in the form of revolutionary endpoint protection and delivered at a price point that could achieve compliance while challenging old paradigms of defense, we saw the perception of our industry morph into that of being appreciated now as an indispensable and inextricable aspect of advancing the business. It’s that journey, that metamorphosis and its implications, that a good portion of my columns have explored over these last four years. \u003c/p>\u003cp >Our sense of being stuck in a never-ending cycle of whack-a-mole, reminiscent of the movie Groundhog Day, has potentially come to an end, including those unnecessary yet persistent instances of ransomware that claim the headlines of our day — if only more of us would step up and embrace the validated prowess of these new solutions. Too often those actions are interpreted as a foray down a “road less traveled.” In my career, taking that risk has been richly and consistently rewarded. \u003c/p>\u003cp >Even in the face of such strides, we know our adversaries will not stand by as we take the battle to them — too much money is at stake to acquiesce. They will continue to innovate. If we fail to sustain our cadence by taking steps like embracing structures of converged physical and cybersecurity operations, nation-states will strike at the gaps. Sustaining that effort has at times been sobering, particularly when punctuated by the realization that “no success at work will compensate for failure in our homes” — another proverb; that we can’t cut our way to profitability; and that we must, notwithstanding a persistent insider threat, trust and support our warfighters. \u003c/p>\u003cp >And after all we can do, our efforts will be for naught if we allow self-deception to creep in and undermine all that we might have otherwise achieved. Too much is at stake to allow that to happen. Thanks for your companionship on the journey. Best wishes to you on the road ahead. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"ea8tLFk0xS1","type":"section","children":["ebam5ISkacb"],"cl":"section"},{"key":"eBSh8Vkopjg","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"eNTWs-He_3p","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"e-j0pgwnrxu","type":"section","children":["eBSh8Vkopjg","eNTWs-He_3p"],"cl":"section"},{"key":"e6Fl-xyLdf0","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />John McClurg served as Sr. Vice President and CISO at BlackBerry and previously held executive roles at Dell and Honeywell International. \u003cem >Columnist image courtesy of McClurg\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eWhde6Vxhkd","type":"section","children":["e6Fl-xyLdf0"],"cl":"section"},{"key":"eSeWhuFx8nZ","content":{"text":"\u003cp >march 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"ejYqmkheJ_S","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eMNHboXZPiW","type":"section","children":["eSeWhuFx8nZ","ejYqmkheJ_S"],"cl":"section"},{"key":"eyOlA0oUMqP","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eoXfQgIK057","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"etrjZGMWtMc","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"erTJwod_hzi","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["eyOlA0oUMqP","eoXfQgIK057","etrjZGMWtMc"],"cl":"image"},{"key":"eAg5D5WLAQH","type":"section","children":["erTJwod_hzi"],"cl":"section"},{"key":"pp3S447P3OH","children":["ezwjkbDNEK2","e9AtJFJfWjW","ekpS80wwiJe","eLD7W8Uvtho","egZEiI3Ycme","ea8tLFk0xS1","e-j0pgwnrxu","eWhde6Vxhkd","eMNHboXZPiW","eAg5D5WLAQH"]},{"key":"e_gDSWqLEo8","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eYhHwUv7C9G","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eTfnbt8g_Bj","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eYhHwUv7C9G":{"p2PRQ71dUR7":true,"pX8aOVpqHUG":true,"p9i0i8fBUJ8":true,"pfz5Sg455xU":true,"pDPCkYaKJiq":true,"pqVh85UFnhE":true,"pSaIoZ9Kyq8":true,"porX_SIZaEp":true,"pa5wPIVBQRL":true,"pnzFZ1cz5Yj":true,"plC8l8L64C7":true,"pp3S447P3OH":true,"pLt8XwmTl-X":true,"pGroKxzZGp6":true,"pB2wvyC3UeR":true,"pDWswozfddp":true,"pR4UJ-Ztiep":true,"pDV8mn8RFpK":true,"pmc_Eu7sE6-":true,"pEZiyfEOOey":true,"ptukQRcDD5Z":true,"pOs0ODBgsNY":true,"pOw_nGM-knc":true,"pCTA-ASUFUi":true,"paWAAivYHNd":true,"pk3kMk5x6yq":true,"p0C1oLhV-Ae":true,"pxcabbMOjkJ":true,"prSp2Ko_9lr":true,"pkwvKNMyH6L":true,"pfimDDVCwdL":true,"pNmgV9gs6cB":true,"p17ezwuZZkC":true,"po1P-wxlC9P":true,"pH3wlKfa0ep":true,"p6viHNWz8BG":true,"pAWcQbsrxbh":true,"p3YFaBVvPc1":true,"pNOsvZZe2Ok":true,"pxqiRNG8snX":true,"pxalSH_TNon":true,"pwWXTqaaexY":true,"pR4lETRfxAS":true},"e_gDSWqLEo8":{"p-YiEaTfF9Y":true},"eTfnbt8g_Bj":{"pDV8mn8RFpK":true}},"children":["e_gDSWqLEo8","eYhHwUv7C9G","eTfnbt8g_Bj"]}],"pages":[{"key":"p-YiEaTfF9Y","title":"Security March 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"","index":true},{"key":"p0C1oLhV-Ae","title":"AD–Securitas","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T_jTUS4liL.png","path":"adsecuritas"},{"key":"p17ezwuZZkC","title":"TCL Ariel Weintraub-Feature","desc":"Ariel Weintraub, CISO at MassMutual, has spent her career building robust cybersecurity programs and recruiting diverse talent into the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hxRMeJbFI-.png","path":"tcl-ariel-weintraub-feature"},{"key":"p2PRQ71dUR7","title":"AD–Hanwha","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tIdPLVGBf5.png","path":"adhanwha"},{"key":"p3YFaBVvPc1","title":"AD–xxx","cover":"undefined/image/social/undefined/p3YFaBVvPc1/v/0.jpg","path":"adxxx"},{"key":"p6viHNWz8BG","title":"TCL Alex Holden-Feature","desc":"Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZfXZKHhKI8.png","path":"tcl-alex-holden-feature"},{"key":"p9i0i8fBUJ8","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HXBHrtEmw2.png","path":"adspeco"},{"key":"pAWcQbsrxbh","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0jY1-kXuQ4.jpg","path":"advertising-index"},{"key":"pB2wvyC3UeR","title":"TCL James Edgar-Feature","desc":"James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GOUvrsTMLq.png","path":"tcl-james-edgar-feature"},{"key":"pBr2jINXDfq","title":"xxxx-Column (copy)","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"xxxx-column-copy"},{"key":"pCTA-ASUFUi","title":"AD–Traka Assa Abloy","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Nl_PCcjSbn.png","path":"adtraka-assa-abloy"},{"key":"pDPCkYaKJiq","title":"TCL Jadee Hanson-Feature","desc":"Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Wb2AjnSZRb.png","path":"tcl-jadee-hanson-feature"},{"key":"pDV8mn8RFpK","title":"Special Report TCL Intro-Feature","desc":"Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"special-report-tcl-intro-feature"},{"key":"pDWswozfddp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uOfLeTQviu.jpg","path":"table-of-contents"},{"key":"pEZiyfEOOey","title":"AD–House NCS4","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RwBwIb9bO_.png","path":"adhouse-ncs4"},{"key":"pGroKxzZGp6","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pH3wlKfa0ep","title":"Product Spotlight-Department","desc":"From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Hlj3Ox7Ix.jpg","path":"product-spotlight-department"},{"key":"pLt8XwmTl-X","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pNOsvZZe2Ok","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hI5Ac7yda.jpg","path":"adhouse-security-enewsletter"},{"key":"pNmgV9gs6cB","title":"AD–HES (Assa Abloy)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HK7zWSwE_.png","path":"adhes-assa-abloy"},{"key":"pOs0ODBgsNY","title":"Emerging Threats-Feature","desc":"Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AHTM-UyTbV.jpg","path":"emerging-threats-feature"},{"key":"pOw_nGM-knc","title":"Stadium Security Technology-Feature","desc":"Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4LoCzEoFdq.jpg","path":"stadium-security-technology-feature"},{"key":"pR4UJ-Ztiep","title":"Security Talk-Column","desc":"Enterprise security leaders must prioritize business resilience in times of economic uncertainty.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","path":"security-talk-column"},{"key":"pR4lETRfxAS","title":"AD–House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HFg9DYVY-.png","path":"adhouse-security-benchmark"},{"key":"pSaIoZ9Kyq8","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"pX8aOVpqHUG","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pa5wPIVBQRL","title":"AD–House ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XJb444awVf.png","path":"adhouse-isc-west"},{"key":"paWAAivYHNd","title":"Hybrid-Cloud Access Control-Feature","desc":"Hybrid-cloud access control can help security functions position themselves as a business enabler, helping to streamline operations and increase efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","path":"hybrid-cloud-access-control-feature"},{"key":"pfimDDVCwdL","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qBQd0U4J72.png","path":"addks"},{"key":"pfz5Sg455xU","title":"Career Intelligence-Column","desc":"Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iMGx6hvSfA.jpg","path":"career-intelligence-column"},{"key":"pk3kMk5x6yq","title":"AD–Control Risks (Seerist)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTfzBT6XpY.png","path":"adcontrol-risks-seerist"},{"key":"pkwvKNMyH6L","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"plC8l8L64C7","title":"Leadership & Management-Column","desc":"Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bwHrWkgZIm.jpg","path":"leadership-management-column"},{"key":"pmc_Eu7sE6-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pnzFZ1cz5Yj","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DEGjFLP7ZR.png","path":"adhouse-solutions-by-sector"},{"key":"po1P-wxlC9P","title":"TCL Phillimon Zongo-Feature","desc":"Phillimon Zongo, CEO and Co-Founder at the Cyber Leadership Institute, emphasizes information sharing and mentorship through his cybersecurity leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4xzfXvJe2C.png","path":"tcl-phillimon-zongo-feature"},{"key":"porX_SIZaEp","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pp3S447P3OH","title":"Cyber Tactics-Column","desc":"Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"cyber-tactics-column"},{"key":"pqVh85UFnhE","title":"Global News-Department","desc":"Analyze enterprise security incident levels in 2022; corporate data transparency & privacy; and how enterprise organizations leverage video surveillance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S7mxcCFWe9.jpg","path":"global-news-department"},{"key":"prSp2Ko_9lr","title":"Education & Training-Column","desc":"By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","path":"education-training-column"},{"key":"ptukQRcDD5Z","title":"AD–House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lfIDmmyuBb.png","path":"adhouse-most-influential"},{"key":"pwWXTqaaexY","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZjuVaRgK3x.jpg","path":"adhouse-security-bookstore"},{"key":"pxalSH_TNon","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HFPR-RFvzQ.png","path":"online-contents"},{"key":"pxcabbMOjkJ","title":"TCL Pam Nigro-Feature","desc":"Pam Nigro, VP, Security at Medecision, emphasizes the importance of building security in at the ground level of enterprise networks.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1bBsg-0aPu.png","path":"tcl-pam-nigro-feature"},{"key":"pxqiRNG8snX","title":"TCL Hardeep Mehrotara-Feature","desc":"Hardeep Mehrotara uses his cybersecurity acumen to bolster the cybersecurity posture of the property management sector, defense industry and Canada as a whole.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJ9V5brwvR.png","path":"tcl-hardeep-mehrotara-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"eCv8uPcqMD":{"meta":{"width":400,"description":"Forehead, Cheek, Eyebrow, Sleeve, Collar","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eCv8uPcqMD.jpg",400]]},"nITzDTTY-I":{"meta":{"width":3000,"height":2250,"description":"Azure, Font, Aqua"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg",2560]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"text":"basic","section":"basic","image":"basic","external-link":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/yhxtxowonhbdtm5/SEC_March-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Top Cybersecurity Leaders - Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology","key":"BkG_iV_mkW"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"Security March 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pfimDDVCwdL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pa5wPIVBQRL"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"G9ZMTlEFKf"},{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk-Column","key":"xu85h9SaLn"},{"link":{"mode":0,"page":"p9i0i8fBUJ8"},"title":"AD–Speco","key":"JuT_39tH4P"},{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis-Department","key":"qZsrwPOosb"},{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Special Report TCL Intro-Feature","key":"rUP4jIq43E"},{"link":{"mode":0,"page":"pB2wvyC3UeR"},"title":"TCL James Edgar-Feature","key":"ZHs0yc_0G6"},{"link":{"mode":0,"page":"pDPCkYaKJiq"},"title":"TCL Jadee Hanson-Feature","key":"l2URhDkocr"},{"link":{"mode":0,"page":"p2PRQ71dUR7"},"title":"AD–Hanwha","key":"eehLw_YuS1"},{"link":{"mode":0,"page":"p6viHNWz8BG"},"title":"TCL Alex Holden-Feature","key":"i8TfW9jBSn"},{"link":{"mode":0,"page":"pxqiRNG8snX"},"title":"TCL Hardeep Mehrotara-Feature","key":"CIOE0D3p4-"},{"link":{"mode":0,"page":"pk3kMk5x6yq"},"title":"AD–Control Risks (Seerist)","key":"UH4laR9aFO"},{"link":{"mode":0,"page":"pxcabbMOjkJ"},"title":"TCL Pam Nigro-Feature","key":"3feIGuv3Xy"},{"link":{"mode":0,"page":"pNmgV9gs6cB"},"title":"AD–HES (Assa Abloy)","key":"zYY-GJdff4"},{"link":{"mode":0,"page":"p17ezwuZZkC"},"title":"TCL Ariel Weintraub-Feature","key":"tvUTDO0NYn"},{"link":{"mode":0,"page":"p0C1oLhV-Ae"},"title":"AD–Securitas","key":"RYAkE1Qb6Q"},{"link":{"mode":0,"page":"po1P-wxlC9P"},"title":"TCL Phillimon Zongo-Feature","key":"SMXE0bYHUM"},{"link":{"mode":0,"page":"pCTA-ASUFUi"},"title":"AD–Traka Assa Abloy","key":"taUtddOeTV"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats-Feature","key":"z609bpDd_Z"},{"link":{"mode":0,"page":"pR4lETRfxAS"},"title":"AD–Security Benchmark","key":"WNw_rJif4r"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control-Feature","key":"F13J8jcEPV"},{"link":{"mode":0,"page":"pnzFZ1cz5Yj"},"title":"AD–Solutions by Sector","key":"DQ_PQtYb8m"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology-Feature","key":"0nS8P-wmOM"},{"link":{"mode":0,"page":"pEZiyfEOOey"},"title":"AD–NCS4","key":"AOfs5TYuAY"},{"link":{"mode":0,"page":"ptukQRcDD5Z"},"title":"AD–Security Most Influential","key":"CJWsop0s9a"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence-Column","key":"q2nq0gC1-6"},{"link":{"mode":0,"page":"pNOsvZZe2Ok"},"title":"AD–Security eNewsletter","key":"7kOWmJdXrm"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management-Column","key":"l8qDRfqsLs"},{"link":{"mode":0,"page":"porX_SIZaEp"},"title":"AD–Security Renewal","key":"xLhPZKbPEG"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics-Column","key":"grGxEvPwGM"},{"link":{"mode":0,"page":"pwWXTqaaexY"},"title":"AD–Security Bookstore","key":"AJLpajKbTO"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training-Column","key":"dLp_K9NDm9"},{"link":{"mode":0,"page":"pGroKxzZGp6"},"title":"AD–BNP Engage","key":"eYVuxO1-4D"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight-Department","key":"M-M0Tww8DC"},{"link":{"mode":0,"page":"pLt8XwmTl-X"},"title":"AD–Brivo Infocenter","key":"DvJnQ_nOPw"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classifieds","key":"pKCOFaymC8"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"inGVVYKmrc"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"IpWU2Dw7qf"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"V0oX-P43Ip"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}