Editor in Chief\u003c/h4>"},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eub9KzKVMME","content":{"src":{"key":"54nd1t6Yeu","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","ratio":1.025236593059937}},"type":"image","cl":"image"},{"key":"eooA7r3EMxZ","content":{"text":"\u003ch1 >The Role of Security in Times of Economic Uncertainty\u003c/h1>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ea8KvlhLZM4","content":{"text":"\u003ch2 >Chief security officers must work to align the security function with business goals, especially in inflationary and recessionary periods.\u003c/h2>"},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eFGniENGT-9","type":"section","children":["eJ_Vh7ExR-U","eub9KzKVMME","eooA7r3EMxZ","ea8KvlhLZM4"],"cl":"section"},{"key":"e-B-mVUzYCP","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","key":"MTT0CFuZRX"}},"type":"image","cl":"image"},{"key":"ew1ss_F0-mF","content":{"text":"\u003cp >\u003cem >Darren415 / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"egeYMWqYtnD","type":"section","children":["e-B-mVUzYCP","ew1ss_F0-mF"],"cl":"section"},{"key":"eCVDFyzemZ4","content":{"text":"\u003cp >Inflation has been a topic of conversation across boardrooms and security functions over the past months, with U.S. inflation \u003ca target=\"_blank\" href=\"https://www.nytimes.com/2022/10/13/business/economy/high-inflation.html\">accelerating\u003c/a> at levels not seen in the country since the early 1980s.\u003c/p>\u003cp >Although current signs point to the possibility for the U.S. to \u003ca target=\"_blank\" href=\"https://apnews.com/article/december-2022-inflation-report-72bb938a443ab0500bd72d23f62214ad\">avoid a recession\u003c/a>, inflation will continue to impact organizations across the country. Security leaders should take the opportunity to look at their own programs and determine how best to support safety and business resilience in uncertain times.\u003c/p>\u003cp >Alan Saquella, seasoned corporate security executive and Professor in the College of Business, Security and Intelligence at Embry-Riddle Aeronautical University, supported Cox Communications and its security function during the 2008 recession, which fell during his 16-year career as a security director at the telecommunications firm. He says there’s no time like the present for chief security officers (CSOs) to future-proof their enterprise security programs. “We shouldn’t wait until there’s a recession to start thinking about how are we going to retain our budgets and keep our people, information and brand safe during these times.”\u003c/p>\u003cp >Saquella outlines five steps security leaders can take to support their organizations during inflationary and recessionary periods.\u003c/p>\u003ch5 >1. Align Security to Business Goals\u003c/h5>\u003cp >Saquella says that the first step to securing an organization in times of economic uncertainty involves aligning the security program to the business. “In enterprise security, we’re there to protect the entity, and the entity sells a product or service. We have to make sure our model works with their budget,” he says. \u003c/p>\u003cp >To achieve this, CSOs need to focus on risk prioritization and cost reduction, according to Saquella. Aside from continually looking for ways to reduce security cost and add business value, it’s important for CSOs to “engage with your business partners across the enterprise and determine what risks are most concerning to the organization. Those are the ones you’re going to want to continue to protect.” In cases where shrinking budgets catalyze security cuts, it’s the security executive’s job to spread risk and protect high-priority operations. “In other words, it may be something as simple as raising your deductible insurance and spreading some of that risk to your contractors,” says Saquella.\u003c/p>\u003ch5 >2. Practice Business Acumen as a CSO\u003c/h5>\u003cp >In tandem with aligning security to the business, CSOs should “take advantage of the opportunity to portray an image of a business leader,” says Saquella. “When you are at top of the rung in security, you’re not a security person anymore — you are a business person.”\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"eP3Ov3KGXdU","type":"section","children":["eCVDFyzemZ4"],"cl":"section"},{"key":"erLL9Swl1oM","content":{"text":"\u003ch1 >“We shouldn’t wait until there’s a recession to start thinking about how are we going to retain our budgets and keep our people, information and brand safe during these times.” \u003c/h1>\u003ch2 >— Alan Saquella, Corporate Security Leader & Instructor of Global Security and Intelligence at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. \u003c/h2>"},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eLrLnovCm6_","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","key":"7Iq54aVwp4","ratio":1}},"type":"image","cl":"image"},{"key":"eZn2-Zdo9xM","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg","key":"xBtMTffP-e"}},"type":"image","cl":"image"},{"key":"e6osYT_FvsK","type":"section","children":["erLL9Swl1oM","eLrLnovCm6_","eZn2-Zdo9xM"],"cl":"section"},{"key":"exv42R4drEN","content":{"text":"\u003cp >\u003cem >Image courtesy of Saquella\u003c/em>\u003c/p>"},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eYVf7uatSHR","type":"section","children":["exv42R4drEN"],"cl":"section"},{"key":"eIkBAkc3ReI","content":{"text":"\u003cp >That leadership transformation requires CSOs to market security and build internal relationships with the C-suite and internal stakeholders. “You should be seen as a business partner,” says Saquella. “This is the time to be highly visible with leaders.” By taking part in operational and financial meetings, security executives can signal to organizational leadership that they’re involved in more than just the safety of the organization, but the continuity of the business as well.\u003c/p>\u003ch5 >3. Maximize Security Strategies and Technology\u003c/h5>\u003cp >Another step for CSOs to consider in times of economic uncertainty is reducing redundancies and maximizing the reach of security strategies and technology. “During expansion times, security has a lot of overlapping systems to duplicate protection. At uncertain economic points, we may need to reduce security system overlap, whether it be on the physical security side, investigations side or even the cyber side,” says Saquella.\u003c/p>\u003cp >Reducing redundancies without compromising safety relies on security executives aligning security with the risk landscape of the business. Times of economic uncertainty can also lead to innovation in the security field, says Saquella. From new ways to \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98138-transforming-security-from-cost-center-to-value-add\" target=\"_blank\">leverage security as a value add\u003c/a> to leveraging technology to expand the reach of human security officers, security leaders have a number of opportunities for continued safety even when budgets shrink. For example, Saquella points to digital visitor management, where a single security officer monitors robotic or automated check-in stations across an organization, reducing guard cost and maintaining security. \u003c/p>\u003ch5 >4. Work With Security Partners\u003c/h5>\u003cp >When it comes to security partnerships, times of economic uncertainty present opportunities for security leaders to strengthen internal and external relationships to bolster security and support business resilience. Saquella says that revisiting contracts with vendors can help reduce security technology spending while signaling trust to security systems partners. By leveling and negotiating with vendors, CSOs can continue relationships with organizations throughout recessions. “That creates a lot of trust, if we’re able to come through this recession together,” says Saquella. “They’re going see that the CSO really does treat them as a business partner."\u003c/p>\u003cp >Security executives should also look to partnerships with internal departments to boost enterprise safety. The Human Resources (HR) department presents a number of safety partnership opportunities, especially in times of economic uncertainty. If employee stress levels rise due to the constraints of an inflation or recession, HR teams can help mitigate potential workplace violence by offering counseling and partnering with security to serve as a visible support system, says Saquella.\u003c/p>\u003ch5 >5. Bolster Insider Risk Programs\u003c/h5>\u003cp >Layoffs are an unfortunate reality of economic uncertainty. If employees plan to leave an organization with enterprise intellectual property, it’s important for enterprise security leaders to enact insider risk mitigation protocols. “Start working very closely with your cyber teams to look for those signs that something’s going on inside the company,” recommends Saquella. Monitor for data exfiltration, unusual file access and uncommon network access times. “If you don’t have a policy in place for insider risk, that needs to be developed from a security perspective,” says Saquella. “You have to make sure that information is not downloaded and taken outside — this happens before an employee leaves the organization.”\u003c/p>\u003cp >Times of economic uncertainty present challenges across organizations, from insider risk to elevated physical security threat levels. Faced with these security risks and potentially shrinking budgets, it’s important for security leaders to treat cuts as a business decision, says Saquella. “When you go through and have to make some adjustments, do it with a business mindset. Then, you’ll be seen as a much more important, viable business partner.”\u003c/p>"},"type":"text","cl":"text px9wGknIVpf"},{"key":"e0MGEx_F33Y","type":"section","children":["eIkBAkc3ReI"],"cl":"section"},{"key":"eE-NcShwiFo","content":{"src":"6n17seTnEB"},"type":"image","cl":"image"},{"key":"eTEtkvcFEPv","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors"},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eGdz2rOlZIb","type":"section","children":["eE-NcShwiFo","eTEtkvcFEPv"],"cl":"section"},{"key":"euDA_woEH8L","content":{"text":"\u003cp >march 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"e7PvWWI8VSl","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eWPaQOx18O3","type":"section","children":["euDA_woEH8L","e7PvWWI8VSl"],"cl":"section"},{"key":"euQDyNOtyFs","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eFYmZ3W1vCG","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ehednMzcZkQ","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ewNufsJ2ID0","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","key":"pwAptEAolq","ratio":null}},"type":"image","actions":["euQDyNOtyFs","eFYmZ3W1vCG","ehednMzcZkQ"],"cl":"image"},{"key":"euSaD8mpFBZ","type":"section","children":["ewNufsJ2ID0"],"cl":"section"},{"key":"pR4UJ-Ztiep","children":["eF-k_sU0Di2","e074t6K31jn","eYqOaRiBuut","eFGniENGT-9","egeYMWqYtnD","eP3Ov3KGXdU","e6osYT_FvsK","eYVf7uatSHR","e0MGEx_F33Y","eGdz2rOlZIb","eWPaQOx18O3","euSaD8mpFBZ"]},{"key":"e_gDSWqLEo8","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eYhHwUv7C9G","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eTfnbt8g_Bj","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eYhHwUv7C9G":{"p2PRQ71dUR7":true,"pX8aOVpqHUG":true,"p9i0i8fBUJ8":true,"pfz5Sg455xU":true,"pDPCkYaKJiq":true,"pqVh85UFnhE":true,"pSaIoZ9Kyq8":true,"porX_SIZaEp":true,"pa5wPIVBQRL":true,"pnzFZ1cz5Yj":true,"plC8l8L64C7":true,"pp3S447P3OH":true,"pLt8XwmTl-X":true,"pGroKxzZGp6":true,"pB2wvyC3UeR":true,"pDWswozfddp":true,"pR4UJ-Ztiep":true,"pDV8mn8RFpK":true,"pmc_Eu7sE6-":true,"pEZiyfEOOey":true,"ptukQRcDD5Z":true,"pOs0ODBgsNY":true,"pOw_nGM-knc":true,"pCTA-ASUFUi":true,"paWAAivYHNd":true,"pk3kMk5x6yq":true,"p0C1oLhV-Ae":true,"pxcabbMOjkJ":true,"prSp2Ko_9lr":true,"pkwvKNMyH6L":true,"pfimDDVCwdL":true,"pNmgV9gs6cB":true,"p17ezwuZZkC":true,"po1P-wxlC9P":true,"pH3wlKfa0ep":true,"p6viHNWz8BG":true,"pAWcQbsrxbh":true,"p3YFaBVvPc1":true,"pNOsvZZe2Ok":true,"pxqiRNG8snX":true,"pxalSH_TNon":true,"pwWXTqaaexY":true,"pR4lETRfxAS":true},"e_gDSWqLEo8":{"p-YiEaTfF9Y":true},"eTfnbt8g_Bj":{"pDV8mn8RFpK":true}},"children":["e_gDSWqLEo8","eYhHwUv7C9G","eTfnbt8g_Bj"]}],"pages":[{"key":"p-YiEaTfF9Y","title":"Security March 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"","index":true},{"key":"p0C1oLhV-Ae","title":"AD–Securitas","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T_jTUS4liL.png","path":"adsecuritas"},{"key":"p17ezwuZZkC","title":"TCL Ariel Weintraub-Feature","desc":"Ariel Weintraub, CISO at MassMutual, has spent her career building robust cybersecurity programs and recruiting diverse talent into the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hxRMeJbFI-.png","path":"tcl-ariel-weintraub-feature"},{"key":"p2PRQ71dUR7","title":"AD–Hanwha","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tIdPLVGBf5.png","path":"adhanwha"},{"key":"p3YFaBVvPc1","title":"AD–xxx","cover":"undefined/image/social/undefined/p3YFaBVvPc1/v/0.jpg","path":"adxxx"},{"key":"p6viHNWz8BG","title":"TCL Alex Holden-Feature","desc":"Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZfXZKHhKI8.png","path":"tcl-alex-holden-feature"},{"key":"p9i0i8fBUJ8","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HXBHrtEmw2.png","path":"adspeco"},{"key":"pAWcQbsrxbh","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0jY1-kXuQ4.jpg","path":"advertising-index"},{"key":"pB2wvyC3UeR","title":"TCL James Edgar-Feature","desc":"James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GOUvrsTMLq.png","path":"tcl-james-edgar-feature"},{"key":"pBr2jINXDfq","title":"xxxx-Column (copy)","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"xxxx-column-copy"},{"key":"pCTA-ASUFUi","title":"AD–Traka Assa Abloy","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Nl_PCcjSbn.png","path":"adtraka-assa-abloy"},{"key":"pDPCkYaKJiq","title":"TCL Jadee Hanson-Feature","desc":"Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Wb2AjnSZRb.png","path":"tcl-jadee-hanson-feature"},{"key":"pDV8mn8RFpK","title":"Special Report TCL Intro-Feature","desc":"Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"special-report-tcl-intro-feature"},{"key":"pDWswozfddp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uOfLeTQviu.jpg","path":"table-of-contents"},{"key":"pEZiyfEOOey","title":"AD–House NCS4","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RwBwIb9bO_.png","path":"adhouse-ncs4"},{"key":"pGroKxzZGp6","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pH3wlKfa0ep","title":"Product Spotlight-Department","desc":"From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Hlj3Ox7Ix.jpg","path":"product-spotlight-department"},{"key":"pLt8XwmTl-X","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pNOsvZZe2Ok","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hI5Ac7yda.jpg","path":"adhouse-security-enewsletter"},{"key":"pNmgV9gs6cB","title":"AD–HES (Assa Abloy)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HK7zWSwE_.png","path":"adhes-assa-abloy"},{"key":"pOs0ODBgsNY","title":"Emerging Threats-Feature","desc":"Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AHTM-UyTbV.jpg","path":"emerging-threats-feature"},{"key":"pOw_nGM-knc","title":"Stadium Security Technology-Feature","desc":"Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4LoCzEoFdq.jpg","path":"stadium-security-technology-feature"},{"key":"pR4UJ-Ztiep","title":"Security Talk-Column","desc":"Enterprise security leaders must prioritize business resilience in times of economic uncertainty.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","path":"security-talk-column"},{"key":"pR4lETRfxAS","title":"AD–House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HFg9DYVY-.png","path":"adhouse-security-benchmark"},{"key":"pSaIoZ9Kyq8","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"pX8aOVpqHUG","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pa5wPIVBQRL","title":"AD–House ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XJb444awVf.png","path":"adhouse-isc-west"},{"key":"paWAAivYHNd","title":"Hybrid-Cloud Access Control-Feature","desc":"Hybrid-cloud access control can help security functions position themselves as a business enabler, helping to streamline operations and increase efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","path":"hybrid-cloud-access-control-feature"},{"key":"pfimDDVCwdL","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qBQd0U4J72.png","path":"addks"},{"key":"pfz5Sg455xU","title":"Career Intelligence-Column","desc":"Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iMGx6hvSfA.jpg","path":"career-intelligence-column"},{"key":"pk3kMk5x6yq","title":"AD–Control Risks (Seerist)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTfzBT6XpY.png","path":"adcontrol-risks-seerist"},{"key":"pkwvKNMyH6L","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"plC8l8L64C7","title":"Leadership & Management-Column","desc":"Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bwHrWkgZIm.jpg","path":"leadership-management-column"},{"key":"pmc_Eu7sE6-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pnzFZ1cz5Yj","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DEGjFLP7ZR.png","path":"adhouse-solutions-by-sector"},{"key":"po1P-wxlC9P","title":"TCL Phillimon Zongo-Feature","desc":"Phillimon Zongo, CEO and Co-Founder at the Cyber Leadership Institute, emphasizes information sharing and mentorship through his cybersecurity leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4xzfXvJe2C.png","path":"tcl-phillimon-zongo-feature"},{"key":"porX_SIZaEp","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pp3S447P3OH","title":"Cyber Tactics-Column","desc":"Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"cyber-tactics-column"},{"key":"pqVh85UFnhE","title":"Global News-Department","desc":"Analyze enterprise security incident levels in 2022; corporate data transparency & privacy; and how enterprise organizations leverage video surveillance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S7mxcCFWe9.jpg","path":"global-news-department"},{"key":"prSp2Ko_9lr","title":"Education & Training-Column","desc":"By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","path":"education-training-column"},{"key":"ptukQRcDD5Z","title":"AD–House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lfIDmmyuBb.png","path":"adhouse-most-influential"},{"key":"pwWXTqaaexY","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZjuVaRgK3x.jpg","path":"adhouse-security-bookstore"},{"key":"pxalSH_TNon","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HFPR-RFvzQ.png","path":"online-contents"},{"key":"pxcabbMOjkJ","title":"TCL Pam Nigro-Feature","desc":"Pam Nigro, VP, Security at Medecision, emphasizes the importance of building security in at the ground level of enterprise networks.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1bBsg-0aPu.png","path":"tcl-pam-nigro-feature"},{"key":"pxqiRNG8snX","title":"TCL Hardeep Mehrotara-Feature","desc":"Hardeep Mehrotara uses his cybersecurity acumen to bolster the cybersecurity posture of the property management sector, defense industry and Canada as a whole.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJ9V5brwvR.png","path":"tcl-hardeep-mehrotara-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"54nd1t6Yeu":{"meta":{"width":325,"description":"Forehead, Nose, Cheek, Smile, Lip, Jaw, Happy, Gesture, Iris","height":317},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",325]]},"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"7Iq54aVwp4":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7Iq54aVwp4.svg","srcset":[]},"MTT0CFuZRX":{"meta":{"width":3456,"height":2304,"description":"World, Publication, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xBtMTffP-e":{"meta":{"width":2400,"height":3600,"description":"Dress shirt, Forehead, Smile, Chin, Eyebrow, Tie, Beard, Gesture, Collar, Suit"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xBtMTffP-e.jpg",2560]]}},"pkg":{"text":"basic","section":"basic","image":"basic","external-link":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","frame":"basic","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/yhxtxowonhbdtm5/SEC_March-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Top Cybersecurity Leaders - Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology","key":"BkG_iV_mkW"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"Security March 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pfimDDVCwdL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pa5wPIVBQRL"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"G9ZMTlEFKf"},{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk-Column","key":"xu85h9SaLn"},{"link":{"mode":0,"page":"p9i0i8fBUJ8"},"title":"AD–Speco","key":"JuT_39tH4P"},{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis-Department","key":"qZsrwPOosb"},{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Special Report TCL Intro-Feature","key":"rUP4jIq43E"},{"link":{"mode":0,"page":"pB2wvyC3UeR"},"title":"TCL James Edgar-Feature","key":"ZHs0yc_0G6"},{"link":{"mode":0,"page":"pDPCkYaKJiq"},"title":"TCL Jadee Hanson-Feature","key":"l2URhDkocr"},{"link":{"mode":0,"page":"p2PRQ71dUR7"},"title":"AD–Hanwha","key":"eehLw_YuS1"},{"link":{"mode":0,"page":"p6viHNWz8BG"},"title":"TCL Alex Holden-Feature","key":"i8TfW9jBSn"},{"link":{"mode":0,"page":"pxqiRNG8snX"},"title":"TCL Hardeep Mehrotara-Feature","key":"CIOE0D3p4-"},{"link":{"mode":0,"page":"pk3kMk5x6yq"},"title":"AD–Control Risks (Seerist)","key":"UH4laR9aFO"},{"link":{"mode":0,"page":"pxcabbMOjkJ"},"title":"TCL Pam Nigro-Feature","key":"3feIGuv3Xy"},{"link":{"mode":0,"page":"pNmgV9gs6cB"},"title":"AD–HES (Assa Abloy)","key":"zYY-GJdff4"},{"link":{"mode":0,"page":"p17ezwuZZkC"},"title":"TCL Ariel Weintraub-Feature","key":"tvUTDO0NYn"},{"link":{"mode":0,"page":"p0C1oLhV-Ae"},"title":"AD–Securitas","key":"RYAkE1Qb6Q"},{"link":{"mode":0,"page":"po1P-wxlC9P"},"title":"TCL Phillimon Zongo-Feature","key":"SMXE0bYHUM"},{"link":{"mode":0,"page":"pCTA-ASUFUi"},"title":"AD–Traka Assa Abloy","key":"taUtddOeTV"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats-Feature","key":"z609bpDd_Z"},{"link":{"mode":0,"page":"pR4lETRfxAS"},"title":"AD–Security Benchmark","key":"WNw_rJif4r"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control-Feature","key":"F13J8jcEPV"},{"link":{"mode":0,"page":"pnzFZ1cz5Yj"},"title":"AD–Solutions by Sector","key":"DQ_PQtYb8m"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology-Feature","key":"0nS8P-wmOM"},{"link":{"mode":0,"page":"pEZiyfEOOey"},"title":"AD–NCS4","key":"AOfs5TYuAY"},{"link":{"mode":0,"page":"ptukQRcDD5Z"},"title":"AD–Security Most Influential","key":"CJWsop0s9a"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence-Column","key":"q2nq0gC1-6"},{"link":{"mode":0,"page":"pNOsvZZe2Ok"},"title":"AD–Security eNewsletter","key":"7kOWmJdXrm"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management-Column","key":"l8qDRfqsLs"},{"link":{"mode":0,"page":"porX_SIZaEp"},"title":"AD–Security Renewal","key":"xLhPZKbPEG"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics-Column","key":"grGxEvPwGM"},{"link":{"mode":0,"page":"pwWXTqaaexY"},"title":"AD–Security Bookstore","key":"AJLpajKbTO"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training-Column","key":"dLp_K9NDm9"},{"link":{"mode":0,"page":"pGroKxzZGp6"},"title":"AD–BNP Engage","key":"eYVuxO1-4D"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight-Department","key":"M-M0Tww8DC"},{"link":{"mode":0,"page":"pLt8XwmTl-X"},"title":"AD–Brivo Infocenter","key":"DvJnQ_nOPw"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classifieds","key":"pKCOFaymC8"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"inGVVYKmrc"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"IpWU2Dw7qf"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"V0oX-P43Ip"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}