and Tom Patterson\u003c/strong>\u003cbr />Contributing Writers\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"ezc0fhkyrz7","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tCjILPtt5p.jpg","key":"tCjILPtt5p"}},"type":"image","cl":"image"},{"key":"eVSFcM_C5Gg","content":{"text":"\u003ch1 >Building Trust With Reputational Defense\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eKXRvRGW9M7","content":{"text":"\u003ch2 >By evaluating the risks of enterprise information and reputation across the new business and technical realities of today, security leaders can more successfully manage and govern their businesses.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ey1GgxY10H9","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg","key":"ZKTZmuY9H_"}},"type":"image","cl":"image"},{"key":"ePifssUCf6L","type":"section","children":["ep6qVTCdzbX","ezc0fhkyrz7","eVSFcM_C5Gg","eKXRvRGW9M7","ey1GgxY10H9"],"cl":"section"},{"key":"eRTY26fDYj3","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","key":"tRFogIBKIC"}},"type":"image","cl":"image"},{"key":"ehJM3H1QhS_","content":{"text":"\u003cp >\u003cem >ljubaphoto / E+ via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eSH2CWhKuY0","type":"section","children":["eRTY26fDYj3","ehJM3H1QhS_"],"cl":"section"},{"key":"eItY5Qck_M4","content":{"text":"\u003cp >There’s a saying in the national security business that you must build trust \u003cem >before\u003c/em> you need it. The type of adversarial situations that we have faced throughout our careers have required us knowing whom to trust for timely understanding of ground truth. Having built trusted relationships with the right people in the right places in advance of an incident has meant the difference between life and death. Trust is the coin of the realm when defending queen and country. This same trust requirement is proving true in corporate security around the world today. As corporations spend lifetimes building their reputations, they cannot afford to allow preventable security incidents to destroy it. This trust truism is why board rooms around the world are now focusing on reputational security as a critical component of their business plans.\u003c/p>\u003cp >Board rooms are fast filling with members and committees that understand that risk to corporate reputation is as important as every other aspect of the bottom line. Critical questions are being asked of CEOs and CISOs about what is now possible in the area of reputational defense, and what the company is doing to protect itself.\u003cstrong > \u003c/strong>Today’s realities have presented bad actors with the incentive and opportunity to increase their focus on reputational crimes and, given the ever-increasing sophistication of threats and enterprise reliance on technology, business must adapt. \u003c/p>\u003ch5 >What’s the Bad Guy’s Motivation?\u003c/h5>\u003cp >Money is still at the root of most evil. Today, however, bad actors have realized there’s also money to be made in attacking a company’s reputation. From betting on a falling stock price, to foiling a corporate takeover, to the most common of 2022 attacks — ransomware — companies are dealing with a new and more sophisticated threat landscape. \u003c/p>\u003ch5 >What’s the Cyber Harm to Companies Today?\u003c/h5>\u003cp >Over the last decade, data breaches have surged, exposing sensitive information, and undermining customer confidence, which is potentially devastating, especially for smaller businesses. Companies, now more than ever, need to know how to keep their data secure while maintaining a seamless and productive work environment. On the back of these trends, new protocols are emerging to provide additional layers of defense to corporate communications. \u003c/p>\u003cp >The Ponemon Institute’s just released "\u003ca target=\"_blank\" href=\"https://newsroom.ibm.com/2022-07-27-IBM-Report-Consumers-Pay-the-Price-as-Data-Breach-Costs-Reach-All-Time-High\">Cost of Data Breach Report 2022\u003c/a>" surveyed 550 companies’ security professionals and C-suite, finding that the average cost of a data breach in the U.S. is a staggering $9.4 million, with 83% of these companies admitting to suffering more than one breach. Business email compromise (BEC) is quickly becoming the biggest problem in cybercrime and has resulted in the loss of an eye-watering \u003ca target=\"_blank\" href=\"https://www.zdnet.com/article/your-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology/?ftag=TRE-03-10aaa6b&bhid=%7B%24external_id%7D&mid=%7B%24MESSAGE_ID%7D&cid=%7B%24contact_id%7D\">$43 billion\u003c/a> to businesses in the last few years. So, it’s somewhat perplexing that only \u003ca target=\"_blank\" href=\"https://upcity.com/experts/small-business-cybersecurity-survey/\">50% of U.S. businesses\u003c/a> have a cybersecurity plan in place.\u003c/p>\u003cp >Take the case of \u003ca target=\"_blank\" href=\"https://www.latimes.com/business/story/2022-07-27/ransomware-attack-entrepreneur-victim-recovery\">Fran Finnegan\u003c/a>. It took his business an entire year to recover from a ransomware attack which encrypted his operational software and all his data. He also suffered a stroke midway through that year-long nightmare, which he attributes to the stress he was under.\u003c/p>\u003cp >When it comes to the potential for reputational risk, smaller businesses may be targeted because they haven’t invested in their security in the way that larger corporations have. Many small business owners think they can’t afford high end cybersecurity defense to protect their business and their customers, for example. \u003c/p>\u003ch5 >What are Companies Doing to Defend Their Reputations?\u003c/h5>\u003cp >As business processes continue to evolve to leverage efficient cloud computing, distributed workplaces and mobile technologies, the defensive security capabilities available to companies has equally evolved. Expanding on the U.S. Government’s Cybersecurity and Infrastructure Security Agency (CISA) guidance, companies can look at their reputational defense in four key segments:\u003c/p>\u003col >\u003cli >Reduce the likelihood of a damaging security incident by \u003cstrong >investing in defenses\u003c/strong>, including education, multifactor authentication and use of trusted partners.\u003c/li>\u003cli >Take steps in advance to \u003cstrong >quickly detect\u003c/strong> cyberattacks or security incidents, with active monitoring that looks for any anomalous behaviors.\u003c/li>\u003cli >Take steps in advance to be prepared to \u003cstrong >respond to an attack\u003c/strong>, with a well-practiced incident response playbook that involves all components of your business and trusted third parties.\u003c/li>\u003cli >Build \u003cstrong >operational resilience\u003c/strong> into your business plans, with technical and personnel redundancy, hardened cores for critical processes, trusted backups, and secured and encrypted communications for key personnel and services. \u003c/li>\u003c/ol>\u003ch5 >What are Companies Still Missing in Their Reputational Defense?\u003c/h5>\u003cp >In this new post-COVID world, companies are struggling with how to keep their organizations and their data secure while maintaining a seamless and productive work environment. \u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"emN91-VRjuG","type":"section","children":["eItY5Qck_M4"],"cl":"section"},{"key":"eGUIcmRKmVA","content":{"text":"\u003ch1 >"As business processes continue to evolve to leverage efficient cloud computing, distributed workplaces and mobile technologies, the defensive security capabilities available to companies has equally evolved."\u003c/h1>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eXo0p-RQAwQ","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","key":"7Iq54aVwp4","ratio":1}},"type":"image","cl":"image"},{"key":"ehDMHTvZiWm","type":"section","children":["eGUIcmRKmVA","eXo0p-RQAwQ"],"cl":"section"},{"key":"ee16lRXZBRP","content":{"text":"\u003cp >But business and personal data are now more available to criminals, and people share increasing amounts of our information among colleagues, partners, clients and the supply chain. It has long been best practice for businesses to ensure all their team protects data\u003cem > internally\u003c/em>, but these changing business practices have now opened up new attack vectors through extensive use of video conferences, meetings, messaging and remote working systems. With a better understanding of the risks and the adoption of secure platforms, it is possible and vital to prevent unwanted eyes prying on information because a breach can have a devastating impact.\u003c/p>\u003cp >Here are three things that companies can add to their data defenses:\u003c/p>\u003col >\u003cli >\u003cdiv style=\"position:relative\">\u003cstrong >Consolidate vendors and use a unified business communications platform. \u003c/strong>\u003ca target=\"_blank\" href=\"https://www.gartner.com/en/newsroom/press-releases/2022-06-21-gartner-unveils-the-top-eight-cybersecurity-predictio\">Gartner\u003c/a>\u003cem > \u003c/em>predicts that by 2025, 80% of companies will consolidate their communications platforms to reduce the risk of security vulnerability. Switching from one communications platform to another in your workday increases the risk of attack. Choose a platform that includes all of the company’s needs — file sharing, messaging, meetings and calls. Reducing the number of platforms will reduce the risk of intrusion by hackers.\u003c/div>\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">\u003cstrong >Aim for true end-to-end encryption for messaging, meetings, video conferences and calls. \u003c/strong>Think\u003cstrong > \u003c/strong>about what employees discuss and share in messaging and meetings these days: future earnings, legal issues, sensitive HR actions, strategy, crisis response — all sensitive matters where timing, access and messaging are critical. Think about how the organization is sending that information around from office to home to coffee shop and back, across secure and insecure networks, in ways that can be intercepted. Safeguard that information by using end-to-end encryption on proven, security-minded platforms. The current best practice is to use a system with Messaging Layer Security (MLS), which encrypts messages end-to-end, and changes keys with every individual message, adding additional layers of security.\u003c/div>\u003c/li>\u003cli >\u003cstrong >Prevent “steal now decrypt later” with quantum resilient technology. \u003c/strong>There is an understandable misconception that the threat of adversarial use of quantum computing is just for governments to worry about. But it has the potential to affect everyone and every business. Everyone has secrets, intellectual property and sensitive information that is the cornerstone of their business or life, and everyone is vulnerable when it gets out. For this reason alone, companies can protect themselves with post-quantum encryption technology.\u003c/li>\u003cli >\u003cstrong >Use multi-factor authentication (MFA). \u003c/strong>MFA protects data and assets by improving the security of the authentication process with identify verification, by requiring at least two methods of authentication, reducing the threat of your company’s assets getting into the wrong hands. \u003c/li>\u003c/ol>\u003ch5 >What are Good Next Steps?\u003c/h5>\u003cp >By evaluating the risks of enterprise information and reputation across the new business and technical realities of today, security leaders can more successfully manage and govern their businesses. \u003c/p>\u003cp >Remember that in addition to the oftentimes insurmountable financial loss to a company following a security incident, it can take years to rebuild a company’s reputation and organizations face a real risk of losing customers to their competitors. It’s critical that companies move to understand their new reputational risk, and work effectively to mitigate it.\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"euz4zTaGpu3","type":"section","children":["ee16lRXZBRP"],"cl":"section"},{"key":"eP0ktklEU1v","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"eumKbJvZT2B","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"e5NoAAnBbkX","type":"section","children":["eP0ktklEU1v","eumKbJvZT2B"],"cl":"section"},{"key":"eENUdYrZLwj","content":{"text":"\u003ch1 >\u003cstrong >About the AUTHORS\u003c/strong>\u003cbr />John Parkinson is a former UK police chief constable and counter-terrorism lead. He is President of \u003ca target=\"_blank\" href=\"https://www.mercuryworkspace.com/about.html\">Secured Communications\u003c/a> and leads the company’s operations in the UK and Europe. Parkinson served with the police for over 33 years and led one of the largest forces in the UK. He also performed the role of UK Senior National Coordinator for Counter Terrorism, in which he was based at London’s New Scotland Yard. He was awarded the OBE for services to Policing and Counter Terrorism in 2011. \u003cem >Bio image courtesy of Parkinson\u003c/em>\u003c/h1>\u003ch1 >Tom Patterson is a top advisor on cyber and critical infrastructure security issues to companies, governments and the international community. He is currently a Senior Fellow at Auburn’s McCrary Institute for Cyber and Critical Infrastructure Security, a regular lecturer at Wharton’s SIFMA Executive Education program, and the founder of \u003ca target=\"_blank\" href=\"https://infrastructureforward.com/\">Infrastructure>Forward\u003c/a>, a business accelerator supporting the use of AI, Quantum, and Communications technologies in defense of critical infrastructure. He has served on three public company boards and advised the FBI, Homeland, and the White House on security issues. \u003cem >Bio image courtesy of Patterson\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eH9dVlov0Ge","type":"section","children":["eENUdYrZLwj"],"cl":"section"},{"key":"ehzVqJed9lD","content":{"text":"\u003cp >march 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"e4euwhv1UiA","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"ee3Udd2yFTd","type":"section","children":["ehzVqJed9lD","e4euwhv1UiA"],"cl":"section"},{"key":"ek3vOrgvb1g","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eH8hH1jtagA","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"euaSWN47iMk","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eCQ3ZPkUAdY","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null}},"type":"image","actions":["ek3vOrgvb1g","eH8hH1jtagA","euaSWN47iMk"],"cl":"image"},{"key":"eWofRoF4gLL","type":"section","children":["eCQ3ZPkUAdY"],"cl":"section"},{"key":"prSp2Ko_9lr","children":["elpdf5M1zSo","eaeZ1-TN5Tf","ephjqlW3I26","ePifssUCf6L","eSH2CWhKuY0","emN91-VRjuG","ehDMHTvZiWm","euz4zTaGpu3","e5NoAAnBbkX","eH9dVlov0Ge","ee3Udd2yFTd","eWofRoF4gLL"]},{"key":"e_gDSWqLEo8","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eYhHwUv7C9G","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eTfnbt8g_Bj","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eYhHwUv7C9G":{"p2PRQ71dUR7":true,"pX8aOVpqHUG":true,"p9i0i8fBUJ8":true,"pfz5Sg455xU":true,"pDPCkYaKJiq":true,"pqVh85UFnhE":true,"pSaIoZ9Kyq8":true,"porX_SIZaEp":true,"pa5wPIVBQRL":true,"pnzFZ1cz5Yj":true,"plC8l8L64C7":true,"pp3S447P3OH":true,"pLt8XwmTl-X":true,"pGroKxzZGp6":true,"pB2wvyC3UeR":true,"pDWswozfddp":true,"pR4UJ-Ztiep":true,"pDV8mn8RFpK":true,"pmc_Eu7sE6-":true,"pEZiyfEOOey":true,"ptukQRcDD5Z":true,"pOs0ODBgsNY":true,"pOw_nGM-knc":true,"pCTA-ASUFUi":true,"paWAAivYHNd":true,"pk3kMk5x6yq":true,"p0C1oLhV-Ae":true,"pxcabbMOjkJ":true,"prSp2Ko_9lr":true,"pkwvKNMyH6L":true,"pfimDDVCwdL":true,"pNmgV9gs6cB":true,"p17ezwuZZkC":true,"po1P-wxlC9P":true,"pH3wlKfa0ep":true,"p6viHNWz8BG":true,"pAWcQbsrxbh":true,"p3YFaBVvPc1":true,"pNOsvZZe2Ok":true,"pxqiRNG8snX":true,"pxalSH_TNon":true,"pwWXTqaaexY":true,"pR4lETRfxAS":true},"e_gDSWqLEo8":{"p-YiEaTfF9Y":true},"eTfnbt8g_Bj":{"pDV8mn8RFpK":true}},"children":["e_gDSWqLEo8","eYhHwUv7C9G","eTfnbt8g_Bj"]}],"pages":[{"key":"p-YiEaTfF9Y","title":"Security March 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"","index":true},{"key":"p0C1oLhV-Ae","title":"AD–Securitas","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T_jTUS4liL.png","path":"adsecuritas"},{"key":"p17ezwuZZkC","title":"TCL Ariel Weintraub-Feature","desc":"Ariel Weintraub, CISO at MassMutual, has spent her career building robust cybersecurity programs and recruiting diverse talent into the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hxRMeJbFI-.png","path":"tcl-ariel-weintraub-feature"},{"key":"p2PRQ71dUR7","title":"AD–Hanwha","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tIdPLVGBf5.png","path":"adhanwha"},{"key":"p3YFaBVvPc1","title":"AD–xxx","cover":"undefined/image/social/undefined/p3YFaBVvPc1/v/0.jpg","path":"adxxx"},{"key":"p6viHNWz8BG","title":"TCL Alex Holden-Feature","desc":"Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZfXZKHhKI8.png","path":"tcl-alex-holden-feature"},{"key":"p9i0i8fBUJ8","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HXBHrtEmw2.png","path":"adspeco"},{"key":"pAWcQbsrxbh","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0jY1-kXuQ4.jpg","path":"advertising-index"},{"key":"pB2wvyC3UeR","title":"TCL James Edgar-Feature","desc":"James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GOUvrsTMLq.png","path":"tcl-james-edgar-feature"},{"key":"pBr2jINXDfq","title":"xxxx-Column (copy)","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"xxxx-column-copy"},{"key":"pCTA-ASUFUi","title":"AD–Traka Assa Abloy","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Nl_PCcjSbn.png","path":"adtraka-assa-abloy"},{"key":"pDPCkYaKJiq","title":"TCL Jadee Hanson-Feature","desc":"Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Wb2AjnSZRb.png","path":"tcl-jadee-hanson-feature"},{"key":"pDV8mn8RFpK","title":"Special Report TCL Intro-Feature","desc":"Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"special-report-tcl-intro-feature"},{"key":"pDWswozfddp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uOfLeTQviu.jpg","path":"table-of-contents"},{"key":"pEZiyfEOOey","title":"AD–House NCS4","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RwBwIb9bO_.png","path":"adhouse-ncs4"},{"key":"pGroKxzZGp6","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pH3wlKfa0ep","title":"Product Spotlight-Department","desc":"From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Hlj3Ox7Ix.jpg","path":"product-spotlight-department"},{"key":"pLt8XwmTl-X","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pNOsvZZe2Ok","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hI5Ac7yda.jpg","path":"adhouse-security-enewsletter"},{"key":"pNmgV9gs6cB","title":"AD–HES (Assa Abloy)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HK7zWSwE_.png","path":"adhes-assa-abloy"},{"key":"pOs0ODBgsNY","title":"Emerging Threats-Feature","desc":"Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AHTM-UyTbV.jpg","path":"emerging-threats-feature"},{"key":"pOw_nGM-knc","title":"Stadium Security Technology-Feature","desc":"Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4LoCzEoFdq.jpg","path":"stadium-security-technology-feature"},{"key":"pR4UJ-Ztiep","title":"Security Talk-Column","desc":"Enterprise security leaders must prioritize business resilience in times of economic uncertainty.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","path":"security-talk-column"},{"key":"pR4lETRfxAS","title":"AD–House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HFg9DYVY-.png","path":"adhouse-security-benchmark"},{"key":"pSaIoZ9Kyq8","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"pX8aOVpqHUG","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pa5wPIVBQRL","title":"AD–House ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XJb444awVf.png","path":"adhouse-isc-west"},{"key":"paWAAivYHNd","title":"Hybrid-Cloud Access Control-Feature","desc":"Hybrid-cloud access control can help security functions position themselves as a business enabler, helping to streamline operations and increase efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","path":"hybrid-cloud-access-control-feature"},{"key":"pfimDDVCwdL","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qBQd0U4J72.png","path":"addks"},{"key":"pfz5Sg455xU","title":"Career Intelligence-Column","desc":"Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iMGx6hvSfA.jpg","path":"career-intelligence-column"},{"key":"pk3kMk5x6yq","title":"AD–Control Risks (Seerist)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTfzBT6XpY.png","path":"adcontrol-risks-seerist"},{"key":"pkwvKNMyH6L","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"plC8l8L64C7","title":"Leadership & Management-Column","desc":"Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bwHrWkgZIm.jpg","path":"leadership-management-column"},{"key":"pmc_Eu7sE6-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pnzFZ1cz5Yj","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DEGjFLP7ZR.png","path":"adhouse-solutions-by-sector"},{"key":"po1P-wxlC9P","title":"TCL Phillimon Zongo-Feature","desc":"Phillimon Zongo, CEO and Co-Founder at the Cyber Leadership Institute, emphasizes information sharing and mentorship through his cybersecurity leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4xzfXvJe2C.png","path":"tcl-phillimon-zongo-feature"},{"key":"porX_SIZaEp","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pp3S447P3OH","title":"Cyber Tactics-Column","desc":"Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"cyber-tactics-column"},{"key":"pqVh85UFnhE","title":"Global News-Department","desc":"Analyze enterprise security incident levels in 2022; corporate data transparency & privacy; and how enterprise organizations leverage video surveillance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S7mxcCFWe9.jpg","path":"global-news-department"},{"key":"prSp2Ko_9lr","title":"Education & Training-Column","desc":"By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","path":"education-training-column"},{"key":"ptukQRcDD5Z","title":"AD–House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lfIDmmyuBb.png","path":"adhouse-most-influential"},{"key":"pwWXTqaaexY","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZjuVaRgK3x.jpg","path":"adhouse-security-bookstore"},{"key":"pxalSH_TNon","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HFPR-RFvzQ.png","path":"online-contents"},{"key":"pxcabbMOjkJ","title":"TCL Pam Nigro-Feature","desc":"Pam Nigro, VP, Security at Medecision, emphasizes the importance of building security in at the ground level of enterprise networks.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1bBsg-0aPu.png","path":"tcl-pam-nigro-feature"},{"key":"pxqiRNG8snX","title":"TCL Hardeep Mehrotara-Feature","desc":"Hardeep Mehrotara uses his cybersecurity acumen to bolster the cybersecurity posture of the property management sector, defense industry and Canada as a whole.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJ9V5brwvR.png","path":"tcl-hardeep-mehrotara-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZKTZmuY9H_":{"meta":{"width":1116,"height":1036,"description":"Dress shirt, Forehead, Smile, Sleeve, Gesture, Collar, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZKTZmuY9H_.jpg",1116]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tCjILPtt5p":{"meta":{"width":682,"height":612,"description":"Dress shirt, Smile, Sleeve, Collar, Suit"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tCjILPtt5p.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tCjILPtt5p.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tCjILPtt5p.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tCjILPtt5p.jpg",682]]},"tRFogIBKIC":{"meta":{"width":3000,"height":2000,"description":"Flash photography, Joint, Hand, Shoulder, Window, Dress, Fashion, Textile, Sleeve, Waist"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg",2560]]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"text":"basic","section":"basic","image":"basic","external-link":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/yhxtxowonhbdtm5/SEC_March-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Top Cybersecurity Leaders - Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology","key":"BkG_iV_mkW"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"Security March 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pfimDDVCwdL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pa5wPIVBQRL"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"G9ZMTlEFKf"},{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk-Column","key":"xu85h9SaLn"},{"link":{"mode":0,"page":"p9i0i8fBUJ8"},"title":"AD–Speco","key":"JuT_39tH4P"},{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis-Department","key":"qZsrwPOosb"},{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Special Report TCL Intro-Feature","key":"rUP4jIq43E"},{"link":{"mode":0,"page":"pB2wvyC3UeR"},"title":"TCL James Edgar-Feature","key":"ZHs0yc_0G6"},{"link":{"mode":0,"page":"pDPCkYaKJiq"},"title":"TCL Jadee Hanson-Feature","key":"l2URhDkocr"},{"link":{"mode":0,"page":"p2PRQ71dUR7"},"title":"AD–Hanwha","key":"eehLw_YuS1"},{"link":{"mode":0,"page":"p6viHNWz8BG"},"title":"TCL Alex Holden-Feature","key":"i8TfW9jBSn"},{"link":{"mode":0,"page":"pxqiRNG8snX"},"title":"TCL Hardeep Mehrotara-Feature","key":"CIOE0D3p4-"},{"link":{"mode":0,"page":"pk3kMk5x6yq"},"title":"AD–Control Risks (Seerist)","key":"UH4laR9aFO"},{"link":{"mode":0,"page":"pxcabbMOjkJ"},"title":"TCL Pam Nigro-Feature","key":"3feIGuv3Xy"},{"link":{"mode":0,"page":"pNmgV9gs6cB"},"title":"AD–HES (Assa Abloy)","key":"zYY-GJdff4"},{"link":{"mode":0,"page":"p17ezwuZZkC"},"title":"TCL Ariel Weintraub-Feature","key":"tvUTDO0NYn"},{"link":{"mode":0,"page":"p0C1oLhV-Ae"},"title":"AD–Securitas","key":"RYAkE1Qb6Q"},{"link":{"mode":0,"page":"po1P-wxlC9P"},"title":"TCL Phillimon Zongo-Feature","key":"SMXE0bYHUM"},{"link":{"mode":0,"page":"pCTA-ASUFUi"},"title":"AD–Traka Assa Abloy","key":"taUtddOeTV"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats-Feature","key":"z609bpDd_Z"},{"link":{"mode":0,"page":"pR4lETRfxAS"},"title":"AD–Security Benchmark","key":"WNw_rJif4r"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control-Feature","key":"F13J8jcEPV"},{"link":{"mode":0,"page":"pnzFZ1cz5Yj"},"title":"AD–Solutions by Sector","key":"DQ_PQtYb8m"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology-Feature","key":"0nS8P-wmOM"},{"link":{"mode":0,"page":"pEZiyfEOOey"},"title":"AD–NCS4","key":"AOfs5TYuAY"},{"link":{"mode":0,"page":"ptukQRcDD5Z"},"title":"AD–Security Most Influential","key":"CJWsop0s9a"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence-Column","key":"q2nq0gC1-6"},{"link":{"mode":0,"page":"pNOsvZZe2Ok"},"title":"AD–Security eNewsletter","key":"7kOWmJdXrm"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management-Column","key":"l8qDRfqsLs"},{"link":{"mode":0,"page":"porX_SIZaEp"},"title":"AD–Security Renewal","key":"xLhPZKbPEG"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics-Column","key":"grGxEvPwGM"},{"link":{"mode":0,"page":"pwWXTqaaexY"},"title":"AD–Security Bookstore","key":"AJLpajKbTO"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training-Column","key":"dLp_K9NDm9"},{"link":{"mode":0,"page":"pGroKxzZGp6"},"title":"AD–BNP Engage","key":"eYVuxO1-4D"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight-Department","key":"M-M0Tww8DC"},{"link":{"mode":0,"page":"pLt8XwmTl-X"},"title":"AD–Brivo Infocenter","key":"DvJnQ_nOPw"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classifieds","key":"pKCOFaymC8"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"inGVVYKmrc"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"IpWU2Dw7qf"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"V0oX-P43Ip"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}