Sebastiaan van Ineveld is Product Marketing Manager Access Control at Genetec, Inc. van Ineveld joined Genetec in 2022 and leads the product marketing team for access control, driving strategic marketing initiatives and go-to-market strategies. He is passionate about technology trends and has over 12 years of experience in marketing and communications in technology industries across various regions. He holds a Master’s degree in International Marketing Communications from The Hague University (Netherlands). \u003cem >Image courtesy of van Ineveld\u003c/em>\u003c/h1>"},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"edL68aQKrAD","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg","key":"YpaOY4j_1F"}},"type":"image","cl":"image"},{"key":"exzoehIUTAB","type":"section","children":["egimHmUzu7V","edL68aQKrAD"],"cl":"section"},{"key":"ewysaDKld4J","content":{"text":"\u003cp >march 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"ef84IhKp3D7","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eZMCU-yMWoG","type":"section","children":["ewysaDKld4J","ef84IhKp3D7"],"cl":"section"},{"key":"echn-LPxJ7V","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ejOIKsaLfBI","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e_Y7D0hVfJk","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"etsMPdHwEa4","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","key":"pwAptEAolq","ratio":null}},"type":"image","actions":["echn-LPxJ7V","ejOIKsaLfBI","e_Y7D0hVfJk"],"cl":"image"},{"key":"edk7SlWiKI7","type":"section","children":["etsMPdHwEa4"],"cl":"section"},{"key":"paWAAivYHNd","children":["ezHJiaK1t00","eQjYgYH4jGO","eTvFDYEm834","eaLyVgWMDnb","et6Ny8Lt0Wf","enknazOj2np","er6NQh0AFHc","eNCfMh9GgXi","eE73lD7qaeL","eiuWiXvuJLN","enbyhLBL2dX","e0ZnX-UmJ95","exzoehIUTAB","eZMCU-yMWoG","edk7SlWiKI7"]},{"key":"e_gDSWqLEo8","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eYhHwUv7C9G","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eTfnbt8g_Bj","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eYhHwUv7C9G":{"p2PRQ71dUR7":true,"pX8aOVpqHUG":true,"p9i0i8fBUJ8":true,"pfz5Sg455xU":true,"pDPCkYaKJiq":true,"pqVh85UFnhE":true,"pSaIoZ9Kyq8":true,"porX_SIZaEp":true,"pa5wPIVBQRL":true,"pnzFZ1cz5Yj":true,"plC8l8L64C7":true,"pp3S447P3OH":true,"pLt8XwmTl-X":true,"pGroKxzZGp6":true,"pB2wvyC3UeR":true,"pDWswozfddp":true,"pR4UJ-Ztiep":true,"pDV8mn8RFpK":true,"pmc_Eu7sE6-":true,"pEZiyfEOOey":true,"ptukQRcDD5Z":true,"pOs0ODBgsNY":true,"pOw_nGM-knc":true,"pCTA-ASUFUi":true,"paWAAivYHNd":true,"pk3kMk5x6yq":true,"p0C1oLhV-Ae":true,"pxcabbMOjkJ":true,"prSp2Ko_9lr":true,"pkwvKNMyH6L":true,"pfimDDVCwdL":true,"pNmgV9gs6cB":true,"p17ezwuZZkC":true,"po1P-wxlC9P":true,"pH3wlKfa0ep":true,"p6viHNWz8BG":true,"pAWcQbsrxbh":true,"p3YFaBVvPc1":true,"pNOsvZZe2Ok":true,"pxqiRNG8snX":true,"pxalSH_TNon":true,"pwWXTqaaexY":true,"pR4lETRfxAS":true},"e_gDSWqLEo8":{"p-YiEaTfF9Y":true},"eTfnbt8g_Bj":{"pDV8mn8RFpK":true}},"children":["e_gDSWqLEo8","eYhHwUv7C9G","eTfnbt8g_Bj"]}],"pages":[{"key":"p-YiEaTfF9Y","title":"Security March 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"","index":true},{"key":"p0C1oLhV-Ae","title":"AD–Securitas","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T_jTUS4liL.png","path":"adsecuritas"},{"key":"p17ezwuZZkC","title":"TCL Ariel Weintraub-Feature","desc":"Ariel Weintraub, CISO at MassMutual, has spent her career building robust cybersecurity programs and recruiting diverse talent into the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hxRMeJbFI-.png","path":"tcl-ariel-weintraub-feature"},{"key":"p2PRQ71dUR7","title":"AD–Hanwha","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tIdPLVGBf5.png","path":"adhanwha"},{"key":"p3YFaBVvPc1","title":"AD–xxx","cover":"undefined/image/social/undefined/p3YFaBVvPc1/v/0.jpg","path":"adxxx"},{"key":"p6viHNWz8BG","title":"TCL Alex Holden-Feature","desc":"Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZfXZKHhKI8.png","path":"tcl-alex-holden-feature"},{"key":"p9i0i8fBUJ8","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HXBHrtEmw2.png","path":"adspeco"},{"key":"pAWcQbsrxbh","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0jY1-kXuQ4.jpg","path":"advertising-index"},{"key":"pB2wvyC3UeR","title":"TCL James Edgar-Feature","desc":"James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GOUvrsTMLq.png","path":"tcl-james-edgar-feature"},{"key":"pBr2jINXDfq","title":"xxxx-Column (copy)","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"xxxx-column-copy"},{"key":"pCTA-ASUFUi","title":"AD–Traka Assa Abloy","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Nl_PCcjSbn.png","path":"adtraka-assa-abloy"},{"key":"pDPCkYaKJiq","title":"TCL Jadee Hanson-Feature","desc":"Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Wb2AjnSZRb.png","path":"tcl-jadee-hanson-feature"},{"key":"pDV8mn8RFpK","title":"Special Report TCL Intro-Feature","desc":"Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"special-report-tcl-intro-feature"},{"key":"pDWswozfddp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uOfLeTQviu.jpg","path":"table-of-contents"},{"key":"pEZiyfEOOey","title":"AD–House NCS4","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RwBwIb9bO_.png","path":"adhouse-ncs4"},{"key":"pGroKxzZGp6","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pH3wlKfa0ep","title":"Product Spotlight-Department","desc":"From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Hlj3Ox7Ix.jpg","path":"product-spotlight-department"},{"key":"pLt8XwmTl-X","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pNOsvZZe2Ok","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hI5Ac7yda.jpg","path":"adhouse-security-enewsletter"},{"key":"pNmgV9gs6cB","title":"AD–HES (Assa Abloy)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HK7zWSwE_.png","path":"adhes-assa-abloy"},{"key":"pOs0ODBgsNY","title":"Emerging Threats-Feature","desc":"Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AHTM-UyTbV.jpg","path":"emerging-threats-feature"},{"key":"pOw_nGM-knc","title":"Stadium Security Technology-Feature","desc":"Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4LoCzEoFdq.jpg","path":"stadium-security-technology-feature"},{"key":"pR4UJ-Ztiep","title":"Security Talk-Column","desc":"Enterprise security leaders must prioritize business resilience in times of economic uncertainty.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","path":"security-talk-column"},{"key":"pR4lETRfxAS","title":"AD–House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HFg9DYVY-.png","path":"adhouse-security-benchmark"},{"key":"pSaIoZ9Kyq8","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"pX8aOVpqHUG","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pa5wPIVBQRL","title":"AD–House ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XJb444awVf.png","path":"adhouse-isc-west"},{"key":"paWAAivYHNd","title":"Hybrid-Cloud Access Control-Feature","desc":"Hybrid-cloud access control can help security functions position themselves as a business enabler, helping to streamline operations and increase efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","path":"hybrid-cloud-access-control-feature"},{"key":"pfimDDVCwdL","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qBQd0U4J72.png","path":"addks"},{"key":"pfz5Sg455xU","title":"Career Intelligence-Column","desc":"Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iMGx6hvSfA.jpg","path":"career-intelligence-column"},{"key":"pk3kMk5x6yq","title":"AD–Control Risks (Seerist)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTfzBT6XpY.png","path":"adcontrol-risks-seerist"},{"key":"pkwvKNMyH6L","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"plC8l8L64C7","title":"Leadership & Management-Column","desc":"Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bwHrWkgZIm.jpg","path":"leadership-management-column"},{"key":"pmc_Eu7sE6-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pnzFZ1cz5Yj","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DEGjFLP7ZR.png","path":"adhouse-solutions-by-sector"},{"key":"po1P-wxlC9P","title":"TCL Phillimon Zongo-Feature","desc":"Phillimon Zongo, CEO and Co-Founder at the Cyber Leadership Institute, emphasizes information sharing and mentorship through his cybersecurity leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4xzfXvJe2C.png","path":"tcl-phillimon-zongo-feature"},{"key":"porX_SIZaEp","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pp3S447P3OH","title":"Cyber Tactics-Column","desc":"Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"cyber-tactics-column"},{"key":"pqVh85UFnhE","title":"Global News-Department","desc":"Analyze enterprise security incident levels in 2022; corporate data transparency & privacy; and how enterprise organizations leverage video surveillance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S7mxcCFWe9.jpg","path":"global-news-department"},{"key":"prSp2Ko_9lr","title":"Education & Training-Column","desc":"By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","path":"education-training-column"},{"key":"ptukQRcDD5Z","title":"AD–House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lfIDmmyuBb.png","path":"adhouse-most-influential"},{"key":"pwWXTqaaexY","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZjuVaRgK3x.jpg","path":"adhouse-security-bookstore"},{"key":"pxalSH_TNon","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HFPR-RFvzQ.png","path":"online-contents"},{"key":"pxcabbMOjkJ","title":"TCL Pam Nigro-Feature","desc":"Pam Nigro, VP, Security at Medecision, emphasizes the importance of building security in at the ground level of enterprise networks.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1bBsg-0aPu.png","path":"tcl-pam-nigro-feature"},{"key":"pxqiRNG8snX","title":"TCL Hardeep Mehrotara-Feature","desc":"Hardeep Mehrotara uses his cybersecurity acumen to bolster the cybersecurity posture of the property management sector, defense industry and Canada as a whole.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJ9V5brwvR.png","path":"tcl-hardeep-mehrotara-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"KKS9YdC1Kl":{"meta":{"width":1100,"height":700,"description":"Office chair, Computer desk, Output device, Automotive design, Table, Furniture, Product"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KKS9YdC1Kl.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KKS9YdC1Kl.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KKS9YdC1Kl.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KKS9YdC1Kl.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KKS9YdC1Kl.jpg",1100]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Ydd5sFFb10":{"meta":{"width":3000,"height":2000,"description":"Dress shirt, Hand, Arm, Sleeve, Gesture, Finger, Collar, Thumb"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg",2560]]},"YpaOY4j_1F":{"meta":{"width":2061,"height":2577,"description":"Forehead, Smile, Chin, Sleeve, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/YpaOY4j_1F.jpg",2560]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]}},"pkg":{"text":"basic","section":"basic","image":"basic","external-link":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","shape":"basic","wTnDfofkley":"XbbrSxSJp","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/yhxtxowonhbdtm5/SEC_March-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Top Cybersecurity Leaders - Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology","key":"BkG_iV_mkW"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"Security March 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pfimDDVCwdL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pa5wPIVBQRL"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"G9ZMTlEFKf"},{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk-Column","key":"xu85h9SaLn"},{"link":{"mode":0,"page":"p9i0i8fBUJ8"},"title":"AD–Speco","key":"JuT_39tH4P"},{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis-Department","key":"qZsrwPOosb"},{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Special Report TCL Intro-Feature","key":"rUP4jIq43E"},{"link":{"mode":0,"page":"pB2wvyC3UeR"},"title":"TCL James Edgar-Feature","key":"ZHs0yc_0G6"},{"link":{"mode":0,"page":"pDPCkYaKJiq"},"title":"TCL Jadee Hanson-Feature","key":"l2URhDkocr"},{"link":{"mode":0,"page":"p2PRQ71dUR7"},"title":"AD–Hanwha","key":"eehLw_YuS1"},{"link":{"mode":0,"page":"p6viHNWz8BG"},"title":"TCL Alex Holden-Feature","key":"i8TfW9jBSn"},{"link":{"mode":0,"page":"pxqiRNG8snX"},"title":"TCL Hardeep Mehrotara-Feature","key":"CIOE0D3p4-"},{"link":{"mode":0,"page":"pk3kMk5x6yq"},"title":"AD–Control Risks (Seerist)","key":"UH4laR9aFO"},{"link":{"mode":0,"page":"pxcabbMOjkJ"},"title":"TCL Pam Nigro-Feature","key":"3feIGuv3Xy"},{"link":{"mode":0,"page":"pNmgV9gs6cB"},"title":"AD–HES (Assa Abloy)","key":"zYY-GJdff4"},{"link":{"mode":0,"page":"p17ezwuZZkC"},"title":"TCL Ariel Weintraub-Feature","key":"tvUTDO0NYn"},{"link":{"mode":0,"page":"p0C1oLhV-Ae"},"title":"AD–Securitas","key":"RYAkE1Qb6Q"},{"link":{"mode":0,"page":"po1P-wxlC9P"},"title":"TCL Phillimon Zongo-Feature","key":"SMXE0bYHUM"},{"link":{"mode":0,"page":"pCTA-ASUFUi"},"title":"AD–Traka Assa Abloy","key":"taUtddOeTV"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats-Feature","key":"z609bpDd_Z"},{"link":{"mode":0,"page":"pR4lETRfxAS"},"title":"AD–Security Benchmark","key":"WNw_rJif4r"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control-Feature","key":"F13J8jcEPV"},{"link":{"mode":0,"page":"pnzFZ1cz5Yj"},"title":"AD–Solutions by Sector","key":"DQ_PQtYb8m"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology-Feature","key":"0nS8P-wmOM"},{"link":{"mode":0,"page":"pEZiyfEOOey"},"title":"AD–NCS4","key":"AOfs5TYuAY"},{"link":{"mode":0,"page":"ptukQRcDD5Z"},"title":"AD–Security Most Influential","key":"CJWsop0s9a"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence-Column","key":"q2nq0gC1-6"},{"link":{"mode":0,"page":"pNOsvZZe2Ok"},"title":"AD–Security eNewsletter","key":"7kOWmJdXrm"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management-Column","key":"l8qDRfqsLs"},{"link":{"mode":0,"page":"porX_SIZaEp"},"title":"AD–Security Renewal","key":"xLhPZKbPEG"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics-Column","key":"grGxEvPwGM"},{"link":{"mode":0,"page":"pwWXTqaaexY"},"title":"AD–Security Bookstore","key":"AJLpajKbTO"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training-Column","key":"dLp_K9NDm9"},{"link":{"mode":0,"page":"pGroKxzZGp6"},"title":"AD–BNP Engage","key":"eYVuxO1-4D"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight-Department","key":"M-M0Tww8DC"},{"link":{"mode":0,"page":"pLt8XwmTl-X"},"title":"AD–Brivo Infocenter","key":"DvJnQ_nOPw"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classifieds","key":"pKCOFaymC8"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"inGVVYKmrc"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"IpWU2Dw7qf"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"V0oX-P43Ip"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}