Contributing Writer\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eLcS4D4c02k","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","key":"mDryoM81MQ","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eu1j6CVQVSF","content":{"text":"\u003ch1 >Developing a Security Coaching Tree\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"ecNmi_gqEO4","content":{"text":"\u003ch2 >The NFL has seen successful coaching trees — assistant coaches who went on to become head coaches — across the organization. Does the same go for enterprise security?\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"elOkANNubgA","content":{"children":[]},"type":"section","children":["e53aXxVldTz","eLcS4D4c02k","eu1j6CVQVSF","ecNmi_gqEO4"],"cl":"section"},{"key":"edjAhQAw5Pa","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg","key":"c74W76JAxe"},"children":[]},"type":"image","cl":"image"},{"key":"eugrXFgu5aG","content":{"text":"\u003cp >\u003cem >Nt_kimura / E+ via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eGOEJlgRzro","content":{"children":[]},"type":"section","children":["edjAhQAw5Pa","eugrXFgu5aG"],"cl":"section"},{"key":"e7QI3Efp-zI","content":{"text":"\u003cp >Former NFL coach Bill Parcells’s coaching tree — consisting of assistant coaches who went on to become head coaches in their own right — is legendary. Parcells hired and trained Bill Belichick among 14 head coaches who have collectively won nine Super Bowls. One of today’s most powerful coaching tree branches out from Chiefs head coach Andy Reid, who himself sprouted from the legendary Bill Walsh tree.\u003c/p>\u003cp >Does the corporate security world have its own version of coaching trees — \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98299-a-chief-security-officer-cso-by-any-other-name\">chief security officers\u003c/a> (CSOs) whose deputies or other staff went on to become heads of security or executive leaders at the same organization or elsewhere? I revisited my 30 years of working with corporate security departments and consulted with experts with extensive knowledge of corporate security leadership to find out.\u003c/p>\u003cp >Opinions differ, but the upshot is that coaching trees may not be as prevalent as one would expect. “I’m not sure there is a… coaching staff tree in the security world today,” says Scott Lindahl, the CSO of the Kellogg Company and the President of ISMA. “With so many CSO roles being filled by second-career folks (post-FBI, Secret Service, etc.), there hasn’t been a great bit of a succession planning and development to the CSO role.”\u003c/p>\u003cp >If there are analogs to the Parcells and Walsh trees, they might be ones that started with either the late Don Walker or Ray O’Hara. Many of today’s leaders ascended under their tutelage. \u003c/p>\u003cp >To the extent they exist, one of the most bountiful trees emerged from Baker Hughes starting almost two decades ago. Russ Cancilla hired a bumper crop of talent, including, among others, Joe Olivarez, Brian Hogan and Joe Walters. After more than a decade rising through the ranks at Baker Hughes (and helping to recruit some of the aforementioned professionals), Olivarez now serves as CSO and VP, Operational Center of Excellence for Jacobs. Hogan followed his stint at Baker Hughes by landing senior roles at major corporations; he’s now CSO at LyondellBasell. Walters leapt from Regional Director, North America at Baker Hughes to become the top security executive at NRG Energy.\u003c/p>\u003cp >During the same time period, Capital One had a remarkable run of deputies who are CSOs today. Don Childers (now with PayPal), Dave Aflalo (McKesson), Steve Braden (Comerica), Patrick McCarthy (SlapShot Entertainment), Sean Turner (TD), and Sarah Slenker (Gartner) were among those minted by the bank under CSOs Tim Janes and Timothy Rigg.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"etX-89m0EkL","content":{"children":[]},"type":"section","children":["e7QI3Efp-zI"],"cl":"section"},{"key":"eqJSqc07fo5","content":{"text":"\u003ch1 >It’s not just about the technical ability of the craft. It’s about prioritizing real relationships, learning how to connect, to influence…” \u003c/h1>\u003ch2 >— Joe Olivarez, Chief Security Officer at Brennan and Jacobs\u003c/h2>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"ekkIJWSd-Yr","content":{"src":{"key":"rOdeONYU6t","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eb6aDFOMg4c","content":{"children":[]},"type":"section","children":["eqJSqc07fo5","ekkIJWSd-Yr"],"cl":"section"},{"key":"eZj8p-aSy3n","content":{"text":"\u003cp >At Target, Brad Brekke begat Bill Tenney (MetLife), Nick Lovrien (Meta), Mike Rackley (Nike), and Craig D’Souza (confidential employer).\u003c/p>\u003cp >Still, Lindahl says he sees relatively few deputies get CSO opportunities at other organizations. One exception has been Marco Mille’s direct reports at Siemens, he says.\u003c/p>\u003cp >Are Baker Hughes, Target, Siemens and Capital One the rare exceptions? What accounts for such runs of talent? Is it careful recruiting, incentivizing, and development? Is it that opportunities are limited at many companies, so the best professionals leave? Is it a matter of luck or happenstance? Why don’t companies with dozens of senior security executives churn out more senior security executives?\u003c/p>\u003cp >It’s likely a combination of mindful recruiting/development, limited opportunities, happenstance and other factors. \u003c/p>\u003cp >Executive recruiter (and \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/topic/2780\">fellow columnist\u003c/a>) Jerry Brennan says that security coaching trees may not be as obvious or cohesive as NFL coaching trees due to head coaches having much more influence and authority on their teams than security professionals have in their corporations. A CSO may groom a successor, but executive management might have someone else in mind, or wish to move or overhaul the security department once the incumbent CSO leaves.\u003c/p>\u003cp >In addition, Brennan says, "CSOs might repress their deputies. They may not want them to succeed [for fear of getting replaced] or it may not be intentional — deputies are just not paid attention to.” Ignoring assistant coaches in football, by contrast, rarely leads to a successful season.\u003c/p>\u003cp >Moreover, it’s easier to measure the success of a coach than of a CSO. Wins and losses are simpler to assess than losses prevented or other, perhaps murky, metrics.\u003c/p>\u003cp >Brennan and Jacobs CSO Joe Olivarez agree the most fertile environments for security professionals is where the senior security executive “leads up”’; that is, communicates with and provides value to business line owners and executives in other departments. \u003c/p>\u003cp >For example, Olivarez recalls advising Jacobs executives on centralizing Health, Safety and Environment departments in light of company divestitures. “They bought into that idea — not just my boss, but the COO and CEO.”\u003c/p>\u003cp >Unfortunately, Brennan says, many CSOs are “mentally siloed. They don’t understand the infrastructure of the company — administration, purchasing, supply chain, vendor management.”\u003c/p>\u003cp >Adds Olivarez, “Can you run a budget, influence a board, interconnect with enterprise risk?” The best developers of security talent assist their protégés with these non-security skills, he says.\u003c/p>\u003cp >He credits his development to Cancilla, who set him up to report to business leaders. “If you can’t deliver to those operational leaders as a business enabler, you aren’t going to last.”\u003c/p>\u003cp >Olivarez says his purpose as a leader is to help others grow, as Cancilla did with him.\u003c/p>\u003cp >“I prepare them for being in a position to compete for a CSO role,” Olivarez says. “It’s not just about the technical ability of the craft. It’s about prioritizing real relationships, learning how to connect, to influence…. It takes time and willingness.”\u003c/p>\u003cp >CSOs might look to successful coaches like Mike Shanahan, Andy Reid, and Bill Walsh. The Xs and Os of game play are just a fraction of what they do. Like security professionals, they must also motivate, communicate effectively with superiors, navigate adversity, deal with public scrutiny, protect their staff, and convey positive influence.\u003c/p>\u003cp >That’s their legacy. What will be yours?\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eDBAa3hFQ52","content":{"children":[]},"type":"section","children":["eZj8p-aSy3n"],"cl":"section"},{"key":"eepwad-pR4F","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eDvArmDk_r0","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eKpVjqargAp","content":{"children":[]},"type":"section","children":["eepwad-pR4F","eDvArmDk_r0"],"cl":"section"},{"key":"eC1wNJKcmvE","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem >Columnist image courtesy of Gips\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"e7l8O2cQ_vE","content":{"children":[]},"type":"section","children":["eC1wNJKcmvE"],"cl":"section"},{"key":"p2mx_zrQL7o","children":["eiA-uPaN3ue","eTBkK4CVACe","e2wqeuiUtGi","elOkANNubgA","eGOEJlgRzro","etX-89m0EkL","eb6aDFOMg4c","eDBAa3hFQ52","eKpVjqargAp","e7l8O2cQ_vE"]},{"key":"epjcJiWPI6e","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eks0QCnDnIt","content":{"children":[],"linkUrl":"https://www.axis.com/en-us/solutions/education","adCreative":{"key":"LZnW0anu_J","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg"},"ioDetailID":579416,"showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"March Sponsored BOX - LOGO","page":"psW5ZzhPsMH","pageName":"Security March 2024","key":"eGCVfQ1vlmo"},"adSize":"Cover Sponsor","advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["epjcJiWPI6e"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eI_s-VKHcxX","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"ebzzWVWwUpC","content":{"text":"\u003cp >march 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"elI_UNrySRr","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"e10N5f27PRo","content":{"children":[]},"type":"section","children":["ebzzWVWwUpC","elI_UNrySRr"],"cl":"section"},{"key":"eRDtBi2nIvX","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eKsjHtUUm-b","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eDkgHQFk0Ex","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ekwJi6bBXLO","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["eRDtBi2nIvX","eKsjHtUUm-b","eDkgHQFk0Ex"],"cl":"image"},{"key":"e3krE2sJ0bt","content":{"children":[]},"type":"section","children":["ekwJi6bBXLO"],"cl":"section"},{"key":"eimMKY5AsU1","content":{"text":"\u003cp >\u003cem >Copyright ©2024. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eWnzs_zGAtY","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"evAhXyQQqE2","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ew9Yi4XXFDx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"e_e1uAmu98j","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"eT4ISn5ctGh","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"evu7LDdOtwg","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"euolOpKeIP6","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eReaqPc8t_R","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["euolOpKeIP6"],"cl":"image"},{"key":"eUk9fAEHmPk","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eYL2Dkw8VA3","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["eUk9fAEHmPk"],"cl":"image"},{"key":"eR4jVH8rZbi","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQWP4SPw6FN","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eR4jVH8rZbi"],"cl":"image"},{"key":"eL3CKsjUYIZ","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eCH443Waxoj","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["eL3CKsjUYIZ"],"cl":"image"},{"key":"eK95plfR05R","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"e8G1POgCE59","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eK95plfR05R"],"cl":"image"},{"key":"eRQq7mYmMRa","content":{"children":[]},"type":"section","children":["eimMKY5AsU1","eWnzs_zGAtY","evAhXyQQqE2","ew9Yi4XXFDx","e_e1uAmu98j","eT4ISn5ctGh","evu7LDdOtwg","eReaqPc8t_R","eYL2Dkw8VA3","eQWP4SPw6FN","eCH443Waxoj","e8G1POgCE59"],"cl":"section"},{"key":"eqMLUJpSQdb","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"fixed","visibility":{"e10N5f27PRo":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"},"eks0QCnDnIt":{"psW5ZzhPsMH":true},"eI_s-VKHcxX":{"peCkww8NlUm":true},"eqMLUJpSQdb":true,"eRQq7mYmMRa":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"},"e3krE2sJ0bt":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"}},"children":["eks0QCnDnIt","eI_s-VKHcxX","e10N5f27PRo","e3krE2sJ0bt","eRQq7mYmMRa","eqMLUJpSQdb"]}],"pages":[{"key":"p-8W-ySKbbo","title":"TCL Ryan Field-Feature","desc":"Ryan Field, CISO at Bank of Hawaii, discusses the importance of building a strong security community","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ryan-field-feature"},{"key":"p-z-KMsOoI-","title":"TCL Hao-Wei Chen-Feature","desc":"Hao-Wei Chen, Information Security Director at Audible, discusses cybersecurity awareness and international collaboration.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-hao-wei-chen-feature"},{"key":"p0F9hqMTH-K","title":"TCL Jorge Mario Ochoa-Feature","desc":"HQ Information Security Officer at Millicom (Tigo) Jorge Mario Ochoa shares the importance of education and finding your passion in the cybersecurity field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-jorge-mario-ochoa-feature"},{"key":"p10fH4zM6x8","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KnDXdc5lqm/p10fH4zM6x8/v/0.jpg","path":"ad-xxxx"},{"key":"p2GulH2KWSa","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3td0Ot4msx.png","path":"online-contents"},{"key":"p2gmqvtM-hE","title":"Security Talk-Column","desc":"Security leaders who emphasize mentorship and teamwork build programs that are resilient against today’s and tomorrow’s threats.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg","path":"security-talk-column"},{"key":"p2mx_zrQL7o","title":"Leadership & Management-Column","desc":"The NFL has seen successful coaching trees — assistant coaches who went on to become head coaches — across the organization. Does the same go for security?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg","path":"leadership-management-column"},{"key":"p4Z5dpKN259","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"adhouse-security-enewsletter"},{"key":"p64WhrMuQ8X","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide-copy"},{"key":"p6tHaIGzhvE","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_O2wxKgbnO.png","path":"ad-altronix"},{"key":"p7EpYnE6Q_X","title":"TCL Lester Godsey-Feature","desc":"Lester Godsey, Chief Information Security Officer at Maricopa County, discusses his cybersecurity career.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-lester-godsey-feature"},{"key":"p98eCmOyvPk","title":"Career Intelligence-Column","desc":"Security practitioners who felt they were in strong, secure positions in their organizations are finding themselves unexpectedly open to new opportunities.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rgLpzhSvms.jpg","path":"career-intelligence-column"},{"key":"p9r1N80pnQz","title":"TCL Ossie Munroe-Feature","desc":"Ossie Munroe, Deputy CIO at Bloomberg, shares his leadership style and the importance of cybersecurity mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ossie-munroe-feature"},{"key":"pB4ZENe3U8M","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds-copy"},{"key":"pB900Jnrvou","title":"Table of Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/R0WMiuVKJS.jpg","path":"table-of-contents"},{"key":"pBmvI2FsHSJ","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad–house-solutions-by-sector"},{"key":"pC9ZGxkP4uz","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pC9ZGxkP4uz/v/0.jpg","path":"xxxxx-column"},{"key":"pDHO0J4XL85","title":"AD–ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"adisc-west-copy"},{"key":"pGrKc_wQxQp","title":"Intellectual Property Protection-Feature","desc":"Security leaders should consider how everyday habits can drastically improve security measures surrounding intellectual property protection.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jQWGLyGsmT.jpg","path":"intellectual-property-protection-feature"},{"key":"pH2M13VvN2Z","title":"Product Spotlight-Department","desc":"Security magazine highlights crisis management platforms, alert systems and mass-communication channels.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_V54e5Wkn.jpg","path":"product-spotlight-department"},{"key":"pHgH3OVWzUN","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"adhouse-linkedin"},{"key":"pJzBtQxARZb","title":"TCL Shannon Brewster-Feature","desc":"Executive Director and General Manager at AT&T Cybersecurity Shannon Brewster discusses his cybersecurity career and the role of mentorship in the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-shannon-brewster-feature"},{"key":"pKFWDivOC6U","title":"The Security Foundation-Feature","desc":"The Security Foundation is leading cross-organizational efforts to unite diversity, equity and inclusion (DEI) progress across the security profession.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9kbHliNPMn.jpg","path":"the-security-foundation-feature"},{"key":"pKHvk9r_4o-","title":"Global News & Analysis-Department","desc":"Chief security officers prepare themselves for new threats; staffing shortages and limited skillsets negatively impact security.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xtznMQuOdu.jpg","path":"global-news--analysis-department"},{"key":"pMtGv24j6yp","title":"Education & Training-Column","desc":"Executive Director of Safe Havens International Michael Dorn discusses best practices for video surveillance in campus security. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wRP1Lars_t.jpg","path":"education-training-column"},{"key":"pQoIaE74FyQ","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UhXY5pRBFN.png","path":"ad-dks"},{"key":"pRbjxBLMskh","title":"AD–Webinar Alert Media","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1_xEnhjTzd.png","path":"ad-webinar-alert-media"},{"key":"pXfxe1dS4fq","title":"TCL Ryma Abassi-Feature","desc":"Dr. Ryma Abassi, Director of ISET’Com, leads her institution in strengthening cybersecurity education.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ryma-abassi-feature"},{"key":"pbg2Q5vFJUa","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"pbvnMgKn5Td","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"adhouse-security-bookstore"},{"key":"pd13JmdPfy_","title":"TCL Renee Forney-Feature","desc":"Renee Forney, Director, ISSO Governance, Risk and Compliance (GRC) at Meta, impacts people’s lives through technology.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-renee-forney-feature"},{"key":"pe0uUVDbEKX","title":"TCL Jennifer Franks-Feature","desc":"U.S. Government Accountability Office Director of Information Technology & Cybersecurity Jennifer Franks discusses her career and the importance of mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-jennifer-franks-feature"},{"key":"peCkww8NlUm","title":"Special Report-Top Cybersecurity Leaders 2024","desc":"Security magazine’s Top Cybersecurity Leaders 2024 award program highlights the accomplishments of ten visionary information security leaders across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"special-report-top-cybersecurity-leaders-2024"},{"key":"peTxEQ6ffqM","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"adhouse-security-renewal"},{"key":"pilL2vp4Qo2","title":"TCL Sushila Nair-Feature","desc":"Sushila Nair, Vice President, Head of Cybersecurity Services, Americas at Capgemini, emphasizes the importance of people in cybersecurity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-sushila-nair-feature"},{"key":"pjEmmE7ihb8","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"adhouse-onsolve-infocenter"},{"key":"pjTZMtyoJ3c","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CWBKQfiC_2.jpg","path":"staff-listing"},{"key":"plqUaZWGKvw","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"adhouse-continuing-education-ceu"},{"key":"pm4NipT3qbT","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nbtt7Ok68f.jpg","path":"advertising-index"},{"key":"psW5ZzhPsMH","title":"Security March 2024","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"","index":true},{"key":"psw6WNvnap-","title":"TCL TEMPLATE-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-template-feature"},{"key":"pv1Wu2J8xf_","title":"Cyber Tactics-Column","desc":"Data privacy and information security are both critical components of building customer trust for organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3SUazcrrjS.jpg","path":"cyber-tactics-column"},{"key":"pvEi0jyiTmb","title":"AD–House Benchmark Report","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ByRs7pdtKY.png","path":"ad–house-benchmark-report"},{"key":"py3AjPsEffv","title":"AD–House Most Influential","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AC0fPWXXdF.png","path":"ad–house-most-influential"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"LZnW0anu_J":{"meta":{"width":1200,"height":1600,"description":"Interior design, Material property, Product, Flooring, Floor, Chair, Building"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",1600]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"c74W76JAxe":{"meta":{"width":4992,"height":3328,"description":"Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg",2560]]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"mDryoM81MQ":{"meta":{"width":400,"height":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"rOdeONYU6t":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rOdeONYU6t.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w7Ty9ifjBD":"pEIMfUpQ6oy","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/v48vt4er0tte338n7jqut/SEC_March-2024_Full-Issue.pdf?rlkey=q4u2fer2zkvo3czbha9px1my8&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"psW5ZzhPsMH"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pm4NipT3qbT"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Main menu","children":[{"link":{"mode":0,"page":"psW5ZzhPsMH"},"title":"Security March 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pQoIaE74FyQ"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pDHO0J4XL85"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pm4NipT3qbT"},"title":"Advertising Index","key":"GZcZRmwNI_"},{"link":{"mode":0,"page":"py3AjPsEffv"},"title":"AD–Most Influential","key":"SBSruHxuzl"},{"link":{"mode":0,"page":"p2GulH2KWSa"},"title":"Online Contents","key":"UhZugPM73f"},{"link":{"mode":0,"page":"p2gmqvtM-hE"},"title":"Security Talk-Column","key":"KExy5kXZ8p"},{"link":{"mode":0,"page":"pBmvI2FsHSJ"},"title":"AD–Solutions by Sector","key":"05RAvKAGbS"},{"link":{"mode":0,"page":"pKHvk9r_4o-"},"title":"Global News & Analysis-Department","key":"r3C2fbCvqs"},{"link":{"mode":0,"page":"peCkww8NlUm"},"title":"Special Report-Top Cybersecurity Leaders 2024","key":"kFhMt3Kq8t"},{"link":{"mode":0,"page":"pXfxe1dS4fq"},"title":"TCL Ryma Abassi-Feature","key":"7MmDZzd7Bf"},{"link":{"mode":0,"page":"pJzBtQxARZb"},"title":"TCL Shannon Brewster-Feature","key":"msc4IImNv4"},{"link":{"mode":0,"page":"p6tHaIGzhvE"},"title":"AD–Altronix","key":"NKKC4pxVHC"},{"link":{"mode":0,"page":"p-z-KMsOoI-"},"title":"TCL Hao-Wei Chen-Feature","key":"Vo_BZ8YYjK"},{"link":{"mode":0,"page":"p-8W-ySKbbo"},"title":"TCL Ryan Field-Feature","key":"U3D7dMU3yv"},{"link":{"mode":0,"page":"pbvnMgKn5Td"},"title":"AD–Security Bookstore","key":"VFpJlf7MNj"},{"link":{"mode":0,"page":"pd13JmdPfy_"},"title":"TCL Renee Forney-Feature","key":"cjWIE49JGu"},{"link":{"mode":0,"page":"pe0uUVDbEKX"},"title":"TCL Jennifer Franks-Feature","key":"34SX4yD3kP"},{"link":{"mode":0,"page":"p4Z5dpKN259"},"title":"AD–Security eNewsletter","key":"G6espcRa_t"},{"link":{"mode":0,"page":"p7EpYnE6Q_X"},"title":"TCL Lester Godsey-Feature","key":"7lN0Lgpu7h"},{"link":{"mode":0,"page":"p9r1N80pnQz"},"title":"TCL Ossie Munroe-Feature","key":"dvCp15M4zt"},{"link":{"mode":0,"page":"plqUaZWGKvw"},"title":"AD–Continuing Education (CEU)","key":"LRtD0BKmg8"},{"link":{"mode":0,"page":"pilL2vp4Qo2"},"title":"TCL Sushila Nair-Feature","key":"OD6S880omw"},{"link":{"mode":0,"page":"p0F9hqMTH-K"},"title":"TCL Jorge Mario Ochoa-Feature","key":"A85d6IYxDt"},{"link":{"mode":0,"page":"pvEi0jyiTmb"},"title":"AD–Benchmark Report","key":"loa0JHztLK"},{"link":{"mode":0,"page":"pGrKc_wQxQp"},"title":"Intellectual Property Protection-Feature","key":"pVsjfw1jsc"},{"link":{"mode":0,"page":"pKFWDivOC6U"},"title":"The Security Foundation-Feature","key":"T-vwjJXHCg"},{"link":{"mode":0,"page":"pRbjxBLMskh"},"title":"AD–Webinar Alert Media","key":"bkkSu_ZheD"},{"link":{"mode":0,"page":"p98eCmOyvPk"},"title":"Career Intelligence-Column","key":"RtUISbTHAd"},{"link":{"mode":0,"page":"pjEmmE7ihb8"},"title":"AD–OnSolve Infocenter","key":"718iIfXsxa"},{"link":{"mode":0,"page":"p2mx_zrQL7o"},"title":"Leadership & Management-Column","key":"ZQIyWkXKYB"},{"link":{"mode":0,"page":"peTxEQ6ffqM"},"title":"AD–Security Renewal","key":"lbOCxJLulQ"},{"link":{"mode":0,"page":"pv1Wu2J8xf_"},"title":"Cyber Tactics-Column","key":"aE-cRl_vRV"},{"link":{"mode":0,"page":"pHgH3OVWzUN"},"title":"AD–LinkedIn","key":"jG-t4Yq5Ek"},{"link":{"mode":0,"page":"pMtGv24j6yp"},"title":"Education & Training-Column","key":"vTFVcNuRPN"},{"link":{"mode":0,"page":"pH2M13VvN2Z"},"title":"Product Spotlight-Department","key":"lERjJDn9Zw"},{"link":{"mode":0,"page":"pB4ZENe3U8M"},"title":"Classifieds","key":"UaOAAHLtdD"},{"link":{"mode":0,"page":"pjTZMtyoJ3c"},"title":"Staff Listing","key":"P1kZOLd2Gl"},{"link":{"mode":0,"page":"p64WhrMuQ8X"},"title":"eMagazine Navigation Guide","key":"SCPoLbu-bl"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}