Editor in Chief\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eiEgEDEd_d0","content":{"src":{"key":"54nd1t6Yeu","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","ratio":1.025236593059937},"children":[]},"type":"image","cl":"image"},{"key":"eVah_duMHFQ","content":{"text":"\u003ch1 >What Makes a Great Security Leader?\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"e4IXUauAURU","content":{"text":"\u003ch2 >Through encouraging active teamwork and mentoring future leaders, today’s chief security officers are preparing the field for a resilient future.\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eyjWacpj3VO","content":{"children":[]},"type":"section","children":["e6yk7RMBdUV","eiEgEDEd_d0","eVah_duMHFQ","e4IXUauAURU"],"cl":"section"},{"key":"edihEUyjYNZ","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg","key":"QtbOv4tJhH"},"children":[]},"type":"image","cl":"image"},{"key":"eKd3afzu3tu","content":{"text":"\u003cp >\u003cem >PeopleImages / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"e7dJV3xS4l5","content":{"children":[]},"type":"section","children":["edihEUyjYNZ","eKd3afzu3tu"],"cl":"section"},{"key":"e0l-sbUxFmk","content":{"text":"\u003cp >From my interviews across the security field, I have learned that the keys to successful leadership stay the same no matter the sector. In my conversations with dynamic security leaders, I have heard stories time and time again about the impact teamwork and mentorship can have on a security program and the enterprise as a whole.\u003c/p>\u003cp >In my conversations with the 2023 recipients of \u003cem >Security\u003c/em> magazine’s \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/99797-securitys-most-influential-people-in-security-2023\" target=\"_blank\">Most Influential People in Security\u003c/a> award, I asked each awardee to reflect on their proudest career achievements. Matthew Horace, Chief Security Officer at Pretium and Progress Residential, put it well when he said, “My greatest accomplishments are what I’ve been able to do for others.” \u003c/p>\u003cp >As he spoke about giving career advice to burgeoning security professionals and advancing new leaders in the field, I was struck by yet another security leader with numerous significant accomplishments under their belt — in Horace’s case, an impressive career that spans the federal government, Dominion Voting Systems, Mayo Clinic and more — that defined their career success as what they’ve given to others. Horace is not alone in this sentiment — I’ve lost count of how many security executives credit their success in security to their own mentors and commit themselves to passing on their knowledge.\u003c/p>\u003cp >At the 2023 \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-500-conference\" target=\"_blank\">SECURITY 500 Conference\u003c/a> this past November, a panel of seasoned security executives including J. Nicole McDargh of Domino’s Pizza; PepsiCo North America’s Steven Antoine; Shannon Fariel-Mureithi of ChildFund International; Tammi Morton of UnitedHealth Group; and Starbucks Coffee Company’s Cheryl Steele discussed the importance of engaging future leaders and training them to prioritize resilience when faced with the security threats of tomorrow. \u003c/p>\u003cp >These five titans concluded the conference day with a candid, open conversation about their responsibility to shape and upskill the next generation of security talent. By giving opportunities to early- and mid-career professionals, security leaders can instill trust in their teams and develop a program that functions as a whole, rather than one leader lifting the weight of the group.\u003c/p>\u003cp >Through encouraging active teamwork and mentoring future leaders, today’s chief security officers are preparing the field for a resilient future — and demonstrating leadership lessons that can apply across all sectors.\u003c/p>\u003cp >With that, I must share that I am moving to a new opportunity outside of \u003cem >Security \u003c/em>magazine. Working with the wonderful team behind \u003cem >Security\u003c/em> and establishing connections across the physical security and cybersecurity professions have been some of the joys of my time at the helm.\u003c/p>\u003cp >Thank you to all of the security leaders willing to share their own insights for the good of the industry, their organizations, sectors and nations. I look forward to seeing the field continue to grow, evolve and support the mission of safety and risk management across the globe.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eGhDkCIB9xK","content":{"children":[]},"type":"section","children":["e0l-sbUxFmk"],"cl":"section"},{"key":"eJBlDWS76y6","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eborXyK121K","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"e_ZT2-35Y7x","content":{"children":[]},"type":"section","children":["eJBlDWS76y6","eborXyK121K"],"cl":"section"},{"key":"p2gmqvtM-hE","children":["eax7NchkW1Z","eddk5lWMQQB","elRRkSOquKK","eyjWacpj3VO","e7dJV3xS4l5","eGhDkCIB9xK","e_ZT2-35Y7x"]},{"key":"epjcJiWPI6e","content":{"where":"top","pos":0,"layer":0,"type":0,"dist":1000,"children":[]},"type":"w1cal72054-hh4","cl":"w1cal72054-hh4"},{"key":"eks0QCnDnIt","content":{"children":[],"linkUrl":"https://www.axis.com/en-us/solutions/education","adCreative":{"key":"LZnW0anu_J","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg"},"ioDetailID":579416,"showElement":{"image":{"type":2,"value":{"url":"https://cdn.vev.design/private/5YlQ6CapVRbr7RUqaPTH7gT1clH2/p3-layer-icon-frame.svg"}},"name":"March Sponsored BOX - LOGO","page":"psW5ZzhPsMH","pageName":"Security March 2024","key":"eGCVfQ1vlmo"},"adSize":"Cover Sponsor","advertiserName":"AXIS Communications, INC."},"type":"whFspJafhvC","actions":["epjcJiWPI6e"],"icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-54.4 289.1c4.7 4.7 4.7 12.3 0 17L306 377.6c-4.7 4.7-12.3 4.7-17 0L224 312l-65.1 65.6c-4.7 4.7-12.3 4.7-17 0L102.4 338c-4.7-4.7-4.7-12.3 0-17l65.6-65-65.6-65.1c-4.7-4.7-4.7-12.3 0-17l39.6-39.6c4.7-4.7 12.3-4.7 17 0l65 65.7 65.1-65.6c4.7-4.7 12.3-4.7 17 0l39.6 39.6c4.7 4.7 4.7 12.3 0 17L280 256l65.6 65.1z"]},"cl":"whFspJafhvC"},{"key":"eI_s-VKHcxX","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"ebzzWVWwUpC","content":{"text":"\u003cp >march 2024 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"elI_UNrySRr","content":{"children":[],"menu":"wFFqkY-JfK"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"e10N5f27PRo","content":{"children":[]},"type":"section","children":["ebzzWVWwUpC","elI_UNrySRr"],"cl":"section"},{"key":"eRDtBi2nIvX","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eKsjHtUUm-b","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eDkgHQFk0Ex","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ekwJi6bBXLO","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["eRDtBi2nIvX","eKsjHtUUm-b","eDkgHQFk0Ex"],"cl":"image"},{"key":"e3krE2sJ0bt","content":{"children":[]},"type":"section","children":["ekwJi6bBXLO"],"cl":"section"},{"key":"eimMKY5AsU1","content":{"text":"\u003cp >\u003cem >Copyright ©2024. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"eWnzs_zGAtY","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"evAhXyQQqE2","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ew9Yi4XXFDx","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"e_e1uAmu98j","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"eT4ISn5ctGh","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"evu7LDdOtwg","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"euolOpKeIP6","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eReaqPc8t_R","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["euolOpKeIP6"],"cl":"image"},{"key":"eUk9fAEHmPk","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eYL2Dkw8VA3","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["eUk9fAEHmPk"],"cl":"image"},{"key":"eR4jVH8rZbi","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eQWP4SPw6FN","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eR4jVH8rZbi"],"cl":"image"},{"key":"eL3CKsjUYIZ","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"eCH443Waxoj","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["eL3CKsjUYIZ"],"cl":"image"},{"key":"eK95plfR05R","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"e8G1POgCE59","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["eK95plfR05R"],"cl":"image"},{"key":"eRQq7mYmMRa","content":{"children":[]},"type":"section","children":["eimMKY5AsU1","eWnzs_zGAtY","evAhXyQQqE2","ew9Yi4XXFDx","e_e1uAmu98j","eT4ISn5ctGh","evu7LDdOtwg","eReaqPc8t_R","eYL2Dkw8VA3","eQWP4SPw6FN","eCH443Waxoj","e8G1POgCE59"],"cl":"section"},{"key":"eqMLUJpSQdb","content":{"children":[],"nextText":"NEXT","prevText":"BACK","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[320,512,"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"],"right":[320,512,"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"]},"cl":"w7Ty9ifjBD"},{"key":"fixed","visibility":{"e10N5f27PRo":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"},"eks0QCnDnIt":{"psW5ZzhPsMH":true},"eI_s-VKHcxX":{"peCkww8NlUm":true},"eqMLUJpSQdb":true,"eRQq7mYmMRa":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"},"e3krE2sJ0bt":{"pGrKc_wQxQp":"footer","p9r1N80pnQz":"footer","p98eCmOyvPk":"footer","p2GulH2KWSa":"footer","peCkww8NlUm":"footer","pd13JmdPfy_":"footer","pilL2vp4Qo2":"footer","p-8W-ySKbbo":"footer","pB900Jnrvou":"footer","p-z-KMsOoI-":"footer","p2mx_zrQL7o":"footer","p7EpYnE6Q_X":"footer","pKHvk9r_4o-":"footer","pB4ZENe3U8M":"footer","psw6WNvnap-":"footer","pJzBtQxARZb":"footer","p64WhrMuQ8X":"footer","p0F9hqMTH-K":"footer","p5HQJGMlwmi":"footer","pMtGv24j6yp":"footer","pXfxe1dS4fq":"footer","p2gmqvtM-hE":"footer","pH2M13VvN2Z":"footer","pC9ZGxkP4uz":"footer","pv1Wu2J8xf_":"footer","pe0uUVDbEKX":"footer","pm4NipT3qbT":"footer","pbg2Q5vFJUa":"footer","pjTZMtyoJ3c":"footer","pKFWDivOC6U":"footer"}},"children":["eks0QCnDnIt","eI_s-VKHcxX","e10N5f27PRo","e3krE2sJ0bt","eRQq7mYmMRa","eqMLUJpSQdb"]}],"pages":[{"key":"p-8W-ySKbbo","title":"TCL Ryan Field-Feature","desc":"Ryan Field, CISO at Bank of Hawaii, discusses the importance of building a strong security community","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ryan-field-feature"},{"key":"p-z-KMsOoI-","title":"TCL Hao-Wei Chen-Feature","desc":"Hao-Wei Chen, Information Security Director at Audible, discusses cybersecurity awareness and international collaboration.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-hao-wei-chen-feature"},{"key":"p0F9hqMTH-K","title":"TCL Jorge Mario Ochoa-Feature","desc":"HQ Information Security Officer at Millicom (Tigo) Jorge Mario Ochoa shares the importance of education and finding your passion in the cybersecurity field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-jorge-mario-ochoa-feature"},{"key":"p10fH4zM6x8","title":"AD–xxxx","desc":"","cover":"undefined/image/social/KnDXdc5lqm/p10fH4zM6x8/v/0.jpg","path":"ad-xxxx"},{"key":"p2GulH2KWSa","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3td0Ot4msx.png","path":"online-contents"},{"key":"p2gmqvtM-hE","title":"Security Talk-Column","desc":"Security leaders who emphasize mentorship and teamwork build programs that are resilient against today’s and tomorrow’s threats.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg","path":"security-talk-column"},{"key":"p2mx_zrQL7o","title":"Leadership & Management-Column","desc":"The NFL has seen successful coaching trees — assistant coaches who went on to become head coaches — across the organization. Does the same go for security?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/c74W76JAxe.jpg","path":"leadership-management-column"},{"key":"p4Z5dpKN259","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"adhouse-security-enewsletter"},{"key":"p64WhrMuQ8X","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide-copy"},{"key":"p6tHaIGzhvE","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_O2wxKgbnO.png","path":"ad-altronix"},{"key":"p7EpYnE6Q_X","title":"TCL Lester Godsey-Feature","desc":"Lester Godsey, Chief Information Security Officer at Maricopa County, discusses his cybersecurity career.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-lester-godsey-feature"},{"key":"p98eCmOyvPk","title":"Career Intelligence-Column","desc":"Security practitioners who felt they were in strong, secure positions in their organizations are finding themselves unexpectedly open to new opportunities.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rgLpzhSvms.jpg","path":"career-intelligence-column"},{"key":"p9r1N80pnQz","title":"TCL Ossie Munroe-Feature","desc":"Ossie Munroe, Deputy CIO at Bloomberg, shares his leadership style and the importance of cybersecurity mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ossie-munroe-feature"},{"key":"pB4ZENe3U8M","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds-copy"},{"key":"pB900Jnrvou","title":"Table of Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/R0WMiuVKJS.jpg","path":"table-of-contents"},{"key":"pBmvI2FsHSJ","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad–house-solutions-by-sector"},{"key":"pC9ZGxkP4uz","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pC9ZGxkP4uz/v/0.jpg","path":"xxxxx-column"},{"key":"pDHO0J4XL85","title":"AD–ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J1z4G60zGb.png","path":"adisc-west-copy"},{"key":"pGrKc_wQxQp","title":"Intellectual Property Protection-Feature","desc":"Security leaders should consider how everyday habits can drastically improve security measures surrounding intellectual property protection.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jQWGLyGsmT.jpg","path":"intellectual-property-protection-feature"},{"key":"pH2M13VvN2Z","title":"Product Spotlight-Department","desc":"Security magazine highlights crisis management platforms, alert systems and mass-communication channels.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x_V54e5Wkn.jpg","path":"product-spotlight-department"},{"key":"pHgH3OVWzUN","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"adhouse-linkedin"},{"key":"pJzBtQxARZb","title":"TCL Shannon Brewster-Feature","desc":"Executive Director and General Manager at AT&T Cybersecurity Shannon Brewster discusses his cybersecurity career and the role of mentorship in the industry.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-shannon-brewster-feature"},{"key":"pKFWDivOC6U","title":"The Security Foundation-Feature","desc":"The Security Foundation is leading cross-organizational efforts to unite diversity, equity and inclusion (DEI) progress across the security profession.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9kbHliNPMn.jpg","path":"the-security-foundation-feature"},{"key":"pKHvk9r_4o-","title":"Global News & Analysis-Department","desc":"Chief security officers prepare themselves for new threats; staffing shortages and limited skillsets negatively impact security.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xtznMQuOdu.jpg","path":"global-news--analysis-department"},{"key":"pMtGv24j6yp","title":"Education & Training-Column","desc":"Executive Director of Safe Havens International Michael Dorn discusses best practices for video surveillance in campus security. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wRP1Lars_t.jpg","path":"education-training-column"},{"key":"pQoIaE74FyQ","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UhXY5pRBFN.png","path":"ad-dks"},{"key":"pRbjxBLMskh","title":"AD–Webinar Alert Media","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1_xEnhjTzd.png","path":"ad-webinar-alert-media"},{"key":"pXfxe1dS4fq","title":"TCL Ryma Abassi-Feature","desc":"Dr. Ryma Abassi, Director of ISET’Com, leads her institution in strengthening cybersecurity education.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-ryma-abassi-feature"},{"key":"pbg2Q5vFJUa","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"pbvnMgKn5Td","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"adhouse-security-bookstore"},{"key":"pd13JmdPfy_","title":"TCL Renee Forney-Feature","desc":"Renee Forney, Director, ISSO Governance, Risk and Compliance (GRC) at Meta, impacts people’s lives through technology.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-renee-forney-feature"},{"key":"pe0uUVDbEKX","title":"TCL Jennifer Franks-Feature","desc":"U.S. Government Accountability Office Director of Information Technology & Cybersecurity Jennifer Franks discusses her career and the importance of mentorship.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-jennifer-franks-feature"},{"key":"peCkww8NlUm","title":"Special Report-Top Cybersecurity Leaders 2024","desc":"Security magazine’s Top Cybersecurity Leaders 2024 award program highlights the accomplishments of ten visionary information security leaders across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"special-report-top-cybersecurity-leaders-2024"},{"key":"peTxEQ6ffqM","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"adhouse-security-renewal"},{"key":"pilL2vp4Qo2","title":"TCL Sushila Nair-Feature","desc":"Sushila Nair, Vice President, Head of Cybersecurity Services, Americas at Capgemini, emphasizes the importance of people in cybersecurity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-sushila-nair-feature"},{"key":"pjEmmE7ihb8","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"adhouse-onsolve-infocenter"},{"key":"pjTZMtyoJ3c","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CWBKQfiC_2.jpg","path":"staff-listing"},{"key":"plqUaZWGKvw","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"adhouse-continuing-education-ceu"},{"key":"pm4NipT3qbT","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nbtt7Ok68f.jpg","path":"advertising-index"},{"key":"psW5ZzhPsMH","title":"Security March 2024","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"","index":true},{"key":"psw6WNvnap-","title":"TCL TEMPLATE-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-lsuaK-8oZ.jpg","path":"tcl-template-feature"},{"key":"pv1Wu2J8xf_","title":"Cyber Tactics-Column","desc":"Data privacy and information security are both critical components of building customer trust for organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3SUazcrrjS.jpg","path":"cyber-tactics-column"},{"key":"pvEi0jyiTmb","title":"AD–House Benchmark Report","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ByRs7pdtKY.png","path":"ad–house-benchmark-report"},{"key":"py3AjPsEffv","title":"AD–House Most Influential","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AC0fPWXXdF.png","path":"ad–house-most-influential"}],"shapes":{"file-pdf-light":[384,512,"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z"]},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"54nd1t6Yeu":{"meta":{"width":325,"height":317,"description":"Forehead, Nose, Cheek, Smile, Lip, Jaw, Happy, Gesture, Iris"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/54nd1t6Yeu.jpg",325]]},"6n17seTnEB":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"LZnW0anu_J":{"meta":{"width":1200,"height":1600,"description":"Interior design, Material property, Product, Flooring, Floor, Chair, Building"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LZnW0anu_J.jpg",1600]]},"QtbOv4tJhH":{"meta":{"width":7360,"height":4912,"description":"Holding hands, Hand, Arm, Sleeve, Finger, Gesture, Thumb, Happy"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QtbOv4tJhH.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"pkg":{"w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w7Ty9ifjBD":"pEIMfUpQ6oy","w1br1l0lsu-u06":"pgxSSDpDPRe","shape":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/v48vt4er0tte338n7jqut/SEC_March-2024_Full-Issue.pdf?rlkey=q4u2fer2zkvo3czbha9px1my8&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"psW5ZzhPsMH"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pm4NipT3qbT"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Main menu","children":[{"link":{"mode":0,"page":"psW5ZzhPsMH"},"title":"Security March 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pQoIaE74FyQ"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pDHO0J4XL85"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pm4NipT3qbT"},"title":"Advertising Index","key":"GZcZRmwNI_"},{"link":{"mode":0,"page":"py3AjPsEffv"},"title":"AD–Most Influential","key":"SBSruHxuzl"},{"link":{"mode":0,"page":"p2GulH2KWSa"},"title":"Online Contents","key":"UhZugPM73f"},{"link":{"mode":0,"page":"p2gmqvtM-hE"},"title":"Security Talk-Column","key":"KExy5kXZ8p"},{"link":{"mode":0,"page":"pBmvI2FsHSJ"},"title":"AD–Solutions by Sector","key":"05RAvKAGbS"},{"link":{"mode":0,"page":"pKHvk9r_4o-"},"title":"Global News & Analysis-Department","key":"r3C2fbCvqs"},{"link":{"mode":0,"page":"peCkww8NlUm"},"title":"Special Report-Top Cybersecurity Leaders 2024","key":"kFhMt3Kq8t"},{"link":{"mode":0,"page":"pXfxe1dS4fq"},"title":"TCL Ryma Abassi-Feature","key":"7MmDZzd7Bf"},{"link":{"mode":0,"page":"pJzBtQxARZb"},"title":"TCL Shannon Brewster-Feature","key":"msc4IImNv4"},{"link":{"mode":0,"page":"p6tHaIGzhvE"},"title":"AD–Altronix","key":"NKKC4pxVHC"},{"link":{"mode":0,"page":"p-z-KMsOoI-"},"title":"TCL Hao-Wei Chen-Feature","key":"Vo_BZ8YYjK"},{"link":{"mode":0,"page":"p-8W-ySKbbo"},"title":"TCL Ryan Field-Feature","key":"U3D7dMU3yv"},{"link":{"mode":0,"page":"pbvnMgKn5Td"},"title":"AD–Security Bookstore","key":"VFpJlf7MNj"},{"link":{"mode":0,"page":"pd13JmdPfy_"},"title":"TCL Renee Forney-Feature","key":"cjWIE49JGu"},{"link":{"mode":0,"page":"pe0uUVDbEKX"},"title":"TCL Jennifer Franks-Feature","key":"34SX4yD3kP"},{"link":{"mode":0,"page":"p4Z5dpKN259"},"title":"AD–Security eNewsletter","key":"G6espcRa_t"},{"link":{"mode":0,"page":"p7EpYnE6Q_X"},"title":"TCL Lester Godsey-Feature","key":"7lN0Lgpu7h"},{"link":{"mode":0,"page":"p9r1N80pnQz"},"title":"TCL Ossie Munroe-Feature","key":"dvCp15M4zt"},{"link":{"mode":0,"page":"plqUaZWGKvw"},"title":"AD–Continuing Education (CEU)","key":"LRtD0BKmg8"},{"link":{"mode":0,"page":"pilL2vp4Qo2"},"title":"TCL Sushila Nair-Feature","key":"OD6S880omw"},{"link":{"mode":0,"page":"p0F9hqMTH-K"},"title":"TCL Jorge Mario Ochoa-Feature","key":"A85d6IYxDt"},{"link":{"mode":0,"page":"pvEi0jyiTmb"},"title":"AD–Benchmark Report","key":"loa0JHztLK"},{"link":{"mode":0,"page":"pGrKc_wQxQp"},"title":"Intellectual Property Protection-Feature","key":"pVsjfw1jsc"},{"link":{"mode":0,"page":"pKFWDivOC6U"},"title":"The Security Foundation-Feature","key":"T-vwjJXHCg"},{"link":{"mode":0,"page":"pRbjxBLMskh"},"title":"AD–Webinar Alert Media","key":"bkkSu_ZheD"},{"link":{"mode":0,"page":"p98eCmOyvPk"},"title":"Career Intelligence-Column","key":"RtUISbTHAd"},{"link":{"mode":0,"page":"pjEmmE7ihb8"},"title":"AD–OnSolve Infocenter","key":"718iIfXsxa"},{"link":{"mode":0,"page":"p2mx_zrQL7o"},"title":"Leadership & Management-Column","key":"ZQIyWkXKYB"},{"link":{"mode":0,"page":"peTxEQ6ffqM"},"title":"AD–Security Renewal","key":"lbOCxJLulQ"},{"link":{"mode":0,"page":"pv1Wu2J8xf_"},"title":"Cyber Tactics-Column","key":"aE-cRl_vRV"},{"link":{"mode":0,"page":"pHgH3OVWzUN"},"title":"AD–LinkedIn","key":"jG-t4Yq5Ek"},{"link":{"mode":0,"page":"pMtGv24j6yp"},"title":"Education & Training-Column","key":"vTFVcNuRPN"},{"link":{"mode":0,"page":"pH2M13VvN2Z"},"title":"Product Spotlight-Department","key":"lERjJDn9Zw"},{"link":{"mode":0,"page":"pB4ZENe3U8M"},"title":"Classifieds","key":"UaOAAHLtdD"},{"link":{"mode":0,"page":"pjTZMtyoJ3c"},"title":"Staff Listing","key":"P1kZOLd2Gl"},{"link":{"mode":0,"page":"p64WhrMuQ8X"},"title":"eMagazine Navigation Guide","key":"SCPoLbu-bl"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pB900Jnrvou"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}