\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"etPAxCkrBb7","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"etNV_qiT1oG","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"preset":"pWabAOUihi","type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ejW0frMC2Pu","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"ecD8oyUKYRY","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"preset":"pga16ElKd_","type":"text","cl":"text pga16ElKd_"},{"key":"epwwnwAJq3J","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"preset":"pd3XDPpkiFS","type":"text","cl":"text pd3XDPpkiFS"},{"key":"evmZwrJ4_RC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eGYfcK5siJT","content":{"src":{"key":"ZxG9XNbLM9","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","ratio":1},"children":[]},"type":"image","actions":["evmZwrJ4_RC"],"cl":"image"},{"key":"eXNukD7MXpA","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"ea1wVx7EKKW","content":{"src":{"key":"0Dr1INjZ5M","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","ratio":1},"children":[]},"type":"image","actions":["eXNukD7MXpA"],"cl":"image"},{"key":"eBdsGGAswQu","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eX9mWfg3u9U","content":{"src":{"key":"liUVs-P_C0","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","ratio":1},"children":[]},"type":"image","actions":["eBdsGGAswQu"],"cl":"image"},{"key":"e8WabKESOxZ","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"el-JjMmwlW4","content":{"src":{"key":"tqrg8b4yb4","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","ratio":1},"children":[]},"type":"image","actions":["e8WabKESOxZ"],"cl":"image"},{"key":"e41ULfdGcIX","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ep1B-GA5zmn","content":{"src":{"key":"wrI8H5DAEn","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","ratio":1},"children":[]},"type":"image","actions":["e41ULfdGcIX"],"cl":"image"},{"key":"eZA8IQTKzwc","content":{"children":[]},"type":"section","children":["eQikxxJfR6l","enRXUvrEouu","etPAxCkrBb7","etNV_qiT1oG","ejW0frMC2Pu","ecD8oyUKYRY","epwwnwAJq3J","eGYfcK5siJT","ea1wVx7EKKW","eX9mWfg3u9U","el-JjMmwlW4","ep1B-GA5zmn"],"cl":"section"},{"key":"fixed","visibility":{"eJv7Eog6PX5":{"pHz5b1_NGST":true},"eTvaCBPgGRC":{"p6Kswn0BnmS":"footer","pHgoNmOSpMM":"footer","pHz5b1_NGST":"footer","p08ktSWzpJ7":"footer","pkAh7mZU9Rp":"footer","pw8BRa_KMkz":"footer","pit7UIRz4ry":"footer","pIHvCmY5dxg":"footer","p6uToIsa8mS":"footer","pjnrnw9LpyH":"footer","pyePhN8CqQP":"footer","pIgNYg-iO-V":"footer","p-9hCuaoVYB":"footer","pc9YLStwyls":"footer","p5t5fXSJ9l-":"footer","pM5xpXZkB-c":"footer","pYpmNtsoxBg":"footer","pe3InTYJyoj":"footer"},"eV7fy0B5LL7":true,"eifs4ao5KpK":{"puVo0JFp5N5":true},"eZA8IQTKzwc":{"p6Kswn0BnmS":"footer","pHgoNmOSpMM":"footer","pHz5b1_NGST":"footer","p08ktSWzpJ7":"footer","pkAh7mZU9Rp":"footer","pw8BRa_KMkz":"footer","pit7UIRz4ry":"footer","pIHvCmY5dxg":"footer","p6uToIsa8mS":"footer","pjnrnw9LpyH":"footer","pyePhN8CqQP":"footer","pIgNYg-iO-V":"footer","p-9hCuaoVYB":"footer","pc9YLStwyls":"footer","p5t5fXSJ9l-":"footer","pM5xpXZkB-c":"footer","pYpmNtsoxBg":"footer","pe3InTYJyoj":"footer"},"eqUV9H6nJV5":{"p6Kswn0BnmS":"footer","pHgoNmOSpMM":"footer","pHz5b1_NGST":"footer","p08ktSWzpJ7":"footer","pkAh7mZU9Rp":"footer","pw8BRa_KMkz":"footer","pit7UIRz4ry":"footer","pIHvCmY5dxg":"footer","p6uToIsa8mS":"footer","pjnrnw9LpyH":"footer","pyePhN8CqQP":"footer","pIgNYg-iO-V":"footer","p-9hCuaoVYB":"footer","pc9YLStwyls":"footer","p5t5fXSJ9l-":"footer","pM5xpXZkB-c":"footer","pYpmNtsoxBg":"footer","pe3InTYJyoj":"footer"}},"children":["eV7fy0B5LL7","eifs4ao5KpK","eJv7Eog6PX5","eTvaCBPgGRC","eqUV9H6nJV5","eZA8IQTKzwc"]}],"pages":[{"key":"p-9hCuaoVYB","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3LcA5BEsrd.png","path":"online-contents"},{"key":"p08ktSWzpJ7","title":"Political Polarization-Feature","desc":"Top security leaders discuss management strategies to navigate political polarization in an organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/j9Y3Br9yT5.jpg","path":"political-polarization-feature"},{"key":"p4COFF7YtJD","title":"AD–xxxx","desc":"","cover":"undefined/image/social/CgTiSBCXHi/p4COFF7YtJD/v/0.jpg","path":"ad-xxxx"},{"key":"p5t5fXSJ9l-","title":"Career Intelligence-Column","desc":"Security job seekers have many ways to find job leads. For the sheer volume of apparently potential opportunities, though, it is hard to ignore job boards.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/U857RqhGCB.jpg","path":"career-intelligence-column"},{"key":"p6Kswn0BnmS","title":"Leadership & Management-Column","desc":"In the next few decades, if not years, a new leadership theory is bound to upend the current notions of what makes a great leader and how one is developed","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6KOpTTxxKp.jpg","path":"leadership-management-column"},{"key":"p6LN5mMAH24","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eKNIyKACH7.png","path":"adxxxx-copy"},{"key":"p6uToIsa8mS","title":"Product Spotlight-Department","desc":"Security magazine highlights products being showcased at this year’s RSA Conference. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZaT9nTLOzf.jpg","path":"product-spotlight-department"},{"key":"pAaAkoeKzQk","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/h3B_RwlbVK.png","path":"emagazine-navigation-guide-copy5"},{"key":"pBE-0ouci4Z","title":"AD–House OnSolve Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/t_09RIfc3Y.png","path":"ad-house-onsolve-infocenter"},{"key":"pBpeRa9-Spj","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SnOte-U-A9.jpg","path":"ad-house-security-enewsletter"},{"key":"pCSJ2fEz9gA","title":"AD–House LinkedIn","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HuwmmWFXOm.png","path":"ad-house-linkedin"},{"key":"pEgESlMETKx","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/s2_D5-PpqF.jpg","path":"ad-house-security-renewal"},{"key":"pHgoNmOSpMM","title":"Security Talk-Column","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/r5rDJYccoK.jpg","path":"security-talk-column"},{"key":"pHz5b1_NGST","title":"Special Report-Partnership across business operations","desc":"Security leaders discuss how collaborative partnerships enhance security and business operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3ynjOwxEp0.jpg","path":"special-report-partnership-across-business-operations"},{"key":"pIHvCmY5dxg","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/olFN6nalQe.jpg","path":"advertising-index"},{"key":"pIgNYg-iO-V","title":"Profile in Excellence-Feature","desc":"Farhan Sahito, Partner at Privanova, shares the development of his 20-year career including both physical and cybersecurity.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AKEFiPR2Tr.jpg","path":"profile-in-excellence-feature"},{"key":"pM5xpXZkB-c","title":"xxxxx-Column","cover":"undefined/image/social/undefined/pM5xpXZkB-c/v/0.jpg","path":"xxxxx-column"},{"key":"pU0GeuPXzmB","title":"AD–House Benchmark Report","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ByRs7pdtKY.png","path":"ad-house-benchmark-report"},{"key":"pUZqsIdX1zh","title":"xxxxxx-Feature","desc":"","cover":"undefined/image/social/W564kevhO5/pUZqsIdX1zh/v/0.jpg","path":"political-polarization-feature-copy"},{"key":"pYpmNtsoxBg","title":"Leveraging Security Design-Feature","desc":"Security leaders can mitigate vulnerability, reduce risk and keep people safe with thoughtful security design. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wj5g3d-HVp.jpg","path":"leveraging-security-design-feature"},{"key":"pc9YLStwyls","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a5P3jPogeX.jpg","path":"classifieds"},{"key":"pe3InTYJyoj","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"pew4mp2R876","title":"AD–Webinar Seerist","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UBqmLw1o1v.png","path":"ad–webinar-seerist"},{"key":"pgL0EhYxtT6","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/u_Jx7WVSin.png","path":"ad-house-solutions-by-sector"},{"key":"pgUbnh1oSyF","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QzvNob_00g.jpg","path":"ad-house-security-bookstore"},{"key":"pit7UIRz4ry","title":"Global News & Analysis-Department","desc":"Companies experience a rise in data breaches; The most commonly exploited vulnerabilities","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vLk5XAXHk1.jpg","path":"global-news-analysis-department"},{"key":"pjnrnw9LpyH","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pD1aj4xpiK.jpg","path":"staff-listing"},{"key":"pk8EydJZENI","title":"AD–House Continuing Education (CEU)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qRySS-DH8r.png","path":"ad-house-continuing-education-ceu"},{"key":"pkAh7mZU9Rp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KDL11NDsBW.jpg","path":"table-of-contents"},{"key":"puVo0JFp5N5","title":"Security May 2024","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/btNLCIQGaH.jpg","path":"","index":true},{"key":"pw8BRa_KMkz","title":"Education & Training-Column","desc":"Retail spaces can be exposed to a number of risks, meaning security leaders need to be extra careful when creating security plans. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qLGmfMx3y5.jpg","path":"education-training-column"},{"key":"pyePhN8CqQP","title":"Cyber Tactics-Column","desc":"In today's digital landscape, organizations must navigate a complex web of challenges, from cybersecurity threats and data privacy concerns to the integration of emerging technologies.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ALw-s7163Z.jpg","path":"cyber tactics-column"}],"shapes":{},"images":{"0Dr1INjZ5M":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0Dr1INjZ5M.svg","srcset":[]},"ZxG9XNbLM9":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZxG9XNbLM9.svg","srcset":[]},"liUVs-P_C0":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liUVs-P_C0.svg","srcset":[]},"p7iNPhh4EG":{"meta":{"width":1200,"height":1600,"description":"Product, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p7iNPhh4EG.jpg",1600]]},"p8ebwCDRKt":{"meta":{"width":1200,"height":1553,"description":"Product, Gesture, Font, Poster"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/p8ebwCDRKt.jpg",1553]]},"pwAptEAolq":{"meta":{"description":"SEC Logo"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"tqrg8b4yb4":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tqrg8b4yb4.svg","srcset":[]},"wrI8H5DAEn":{"meta":{},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wrI8H5DAEn.svg","srcset":[]}},"interactions":{"trigger":{"global":{"onScroll":[],"onTimer":[],"onKeyDown":[],"onKeyUp":[]},"widget":{}},"event":{"widget":{}}},"variables":[],"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1cal72054-hh4":"pL-YXwgdPSb8","whFspJafhvC":"enfxfhXZ-6","wl9gVIiyFe":"p7bqre2y","text":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","section":"basic","external-link":"basic","image":"basic","w3tbowgsq-":"pMdFOsZW1t","w1br1l0lsu-u06":"pgxSSDpDPRe","wpSs3hF4JIq":"XbbrSxSJp"},"menus":{"1BVt6M8hjj":{"children":[{"link":{"mode":0,"page":"pkAh7mZU9Rp"},"title":"Table of Contents","key":"v0MVtlR1zP"}],"title":"BACK 2 TOC_2023","key":"1BVt6M8hjj"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/06o6el9u0qbv9oykd2agy/SEC_May-2024_Full-Issue.pdf?rlkey=kp64iego232c0gvovh8qqo6lx&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"title":"MAIN MENU_2023","children":[{"link":{"mode":0,"page":"puVo0JFp5N5"},"title":"HOME","key":"N7_78OVrIc"},{"link":{"mode":0,"page":"pkAh7mZU9Rp"},"title":"CONTENTS","key":"ECXJXak2y0"},{"link":{"mode":0,"page":"pIHvCmY5dxg"},"title":"AD INDEX","key":"OZWY5W4-3F"}],"key":"fSPzLGr8R5"},"qJf6gzO8js":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu GOLD & SLIDE OUT","key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"puVo0JFp5N5"},"title":"Security May 2024","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"p6LN5mMAH24"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pkAh7mZU9Rp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pew4mp2R876"},"title":"AD–Webinar Seerist","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pIHvCmY5dxg"},"title":"Advertising Index","key":"ldh8BSxp-L"},{"link":{"mode":0,"page":"pU0GeuPXzmB"},"title":"AD–Benchmark Report","key":"i35TNE1Z_c"},{"link":{"mode":0,"page":"p-9hCuaoVYB"},"title":"Online Contents","key":"FSTgYumCVY"},{"link":{"mode":0,"page":"pHgoNmOSpMM"},"title":"Security Talk-Column","key":"qwhPCjzfya"},{"link":{"mode":0,"page":"pit7UIRz4ry"},"title":"Global News & Analysis-Department","key":"-Pl-Kt5FOQ"},{"link":{"mode":0,"page":"pHz5b1_NGST"},"title":"Special Report-Partnership across business operations","key":"SrJBlyk9Dv"},{"link":{"mode":0,"page":"p08ktSWzpJ7"},"title":"Political Polarization-Feature","key":"QMykYGUVL2"},{"link":{"mode":0,"page":"pBpeRa9-Spj"},"title":"AD–Security eNewsletter","key":"zKKhtNgpIv"},{"link":{"mode":0,"page":"pYpmNtsoxBg"},"title":"Leveraging Security Design-Feature","key":"WY8jHNKlKg"},{"link":{"mode":0,"page":"pEgESlMETKx"},"title":"AD–Security Renewal","key":"w9DfuhYmFj"},{"link":{"mode":0,"page":"pIgNYg-iO-V"},"title":"Profile in Excellence-Feature","key":"YdMTC9cKRH"},{"link":{"mode":0,"page":"pgL0EhYxtT6"},"title":"AD–Solutions by Sector","key":"2Rw_tBWNpN"},{"link":{"mode":0,"page":"p5t5fXSJ9l-"},"title":"Career Intelligence-Column","key":"eaU_an3v6u"},{"link":{"mode":0,"page":"pk8EydJZENI"},"title":"AD–Continuing Education (CEU)","key":"ZPOrw65EsZ"},{"link":{"mode":0,"page":"p6Kswn0BnmS"},"title":"Leadership & Management-Column","key":"PPTXE3CwYP"},{"link":{"mode":0,"page":"pgUbnh1oSyF"},"title":"AD–Security Bookstore","key":"iluDxgcA9P"},{"link":{"mode":0,"page":"pyePhN8CqQP"},"title":"Cyber Tactics-Column","key":"0lLGweGezA"},{"link":{"mode":0,"page":"pBE-0ouci4Z"},"title":"AD–OnSolve Infocenter","key":"q0tBxE2meD"},{"link":{"mode":0,"page":"pw8BRa_KMkz"},"title":"Education & Training-Column","key":"dDK_XgkdGg"},{"link":{"mode":0,"page":"pCSJ2fEz9gA"},"title":"AD–LinkedIn","key":"ybw5pM6twV"},{"link":{"mode":0,"page":"p6uToIsa8mS"},"title":"Product Spotlight-Department","key":"VDU0cxNetR"},{"link":{"mode":0,"page":"pc9YLStwyls"},"title":"Classifieds","key":"Fhm7LADDaa"},{"link":{"mode":0,"page":"pjnrnw9LpyH"},"title":"Staff Listing","key":"G3WaNkWL0X"},{"link":{"mode":0,"page":"pAaAkoeKzQk"},"title":"eMagazine Navigation Guide","key":"9lJ3IOnLL7"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"title":"BACK 2 TOC_2023","children":[{"link":{"mode":0,"page":"pkAh7mZU9Rp"},"title":"BACK TO CONTENTS","key":"v0MVtlR1zP"}],"key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}