Contributing Writers\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eKim85DeYIq","content":{"src":{"key":"3sph_OtIkS","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3sph_OtIkS.jpg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eVr-TUtSQhr","content":{"text":"\u003ch1 >Security Career Competition From the Public Sector\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"et3zldImVPp","content":{"text":"\u003ch2 >Large corporations continue to value public-sector candidates for their security roles. What qualities make them successful?\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eSxnYCY36rv","content":{"src":{"key":"RZrq6Fbfl5","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RZrq6Fbfl5.jpg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eFg7fg5SUbb","content":{"children":[]},"type":"section","children":["e0GTEk0ef6h","eKim85DeYIq","eVr-TUtSQhr","et3zldImVPp","eSxnYCY36rv"],"cl":"section"},{"key":"eBv1FxpdKhP","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","key":"wHEPuVOtCW"},"children":[]},"type":"image","cl":"image"},{"key":"eNhzWcWG4af","content":{"text":"\u003cp >\u003cem >AndreyPopov / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eDpy067tdrz","content":{"children":[]},"type":"section","children":["eBv1FxpdKhP","eNhzWcWG4af"],"cl":"section"},{"key":"e_iu-Q8ITuL","content":{"text":"\u003cp >It is quite common to see executive leadership roles in corporate security filled by candidates from either current or former public sector roles. They are often law enforcement, intelligence or military leaders seeking a second career. \u003c/p>\u003cp >SMR regularly runs studies on statistics for these types of candidates. In the last 10 years, 68% of our U.S.-based candidates reported prior government employment. Including candidates located outside of the United States, the percentage increases to 72%. Year upon year, we have not found a significant difference in those numbers. \u003c/p>\u003cp >These statistics do not suggest that all these individuals were at once hired into the senior-most role upon leaving their public sector jobs. It does show that \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/topics/2645-government-federal-state-and-local\" target=\"_blank\">government\u003c/a> background continues to be a major feed to the corporate security profession. It further illustrates that the security industry has failed to develop a maturity model that offers parallel career opportunities for those who did not have public sector experience. \u003c/p>\u003cp >This disparity is an ongoing point of contention for candidates who have spent their security careers within the private sector. We often hear questions to the effect of, “What does someone from the military or XYZ agency know about the private sector or corporate security?” We appreciate the frustration level of these private sector candidates given the relatively small number of senior level roles that become available within the profession. \u003c/p>\u003cp >Companies hiring from the public sector is not unique, nor is it unprecedented. For many years, companies have recruited military officers and placed them in corporate management programs. Military academy graduates and retiring senior level officers continue to be attractive to large private sector organizations. Many of these individuals have gone on to have exemplary careers in the world’s largest corporations. \u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e9oLIwDE-fM","content":{"children":[]},"type":"section","children":["e_iu-Q8ITuL"],"cl":"section"},{"key":"emRr-8iegTT","content":{"text":"\u003cp >advertisement\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"ec4p1AK143S","content":{"children":[]},"type":"section","children":["emRr-8iegTT"],"cl":"section"},{"key":"e72b5LYieAh","content":{"children":[],"linkUrl":"https://www.isaca.org/cism-sdm","adCreative":{"key":"KwCZoNagMM","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg"},"ioDetailID":"566898","adSize":"1/2 Horizontal","advertiserName":"ISACA"},"type":"wTnDfofkley","cl":"wTnDfofkley"},{"key":"ezKfluULgzz","content":{"text":"\u003cp >advertisement\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"eL7p9EUecuE","content":{"children":[]},"type":"section","children":["ezKfluULgzz"],"cl":"section"},{"key":"eViJUdaA-IO","content":{"text":"\u003ch1 >No group should be painted with a broad brush, nor should they be viewed through a narrow lens without a full understanding of the nature of the roles and organizational expectations.”\u003c/h1>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eGrGVyNSQ0X","content":{"src":{"key":"IKfRqm6_25","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"enVeX4Sg80u","content":{"children":[]},"type":"section","children":["eViJUdaA-IO","eGrGVyNSQ0X"],"cl":"section"},{"key":"eclj3gxTSap","content":{"text":"\u003cp >While there are challenges articulating experience and competencies from government roles to the private sector, there are potential factors corporate executives find attractive in these candidates:\u003c/p>\u003col >\u003cli >The candidate has been successful in leading large numbers of diverse staff roles within a complex national and/or global organizational environment.\u003c/li>\u003cli >Their scale of experience in management of large budgets and complex assets is impressive. \u003c/li>\u003cli >They have a successful history of navigating internal and external political environments.\u003c/li>\u003cli >They tend to execute objectives through collaboration and influence.\u003c/li>\u003cli >Functioning effectively in high-profile, elevated-risk and high-stress circumstances where a mistake or wrong decision has extreme consequences is often second nature.\u003c/li>\u003cli >\u003cdiv style=\"position:relative\">They have high levels of professional training and continuously invest in both operational and leadership education.\u003c/div>\u003c/li>\u003cli >They have previously passed rigorous background checks, assessment instruments and cleared ongoing evaluations. \u003c/li>\u003cli >Many have existing high-level clearances. \u003c/li>\u003cli >Continuously adjusting to continued changes means they are comfortable with a fluid environment.\u003c/li>\u003cli >They may have lived and worked in numerous national and/or international locations and successfully interacted with a wide variety of diverse cultures.\u003c/li>\u003cli >They are very much at ease with problem solving and influencing without authority. \u003c/li>\u003cli >It is not unusual for them to have had regular interaction with key business leaders as a part of their accountabilities.\u003c/li>\u003c/ol>\u003cp >These are all desirable competencies and skills; however, they do not diminish the challenges public sector candidates face during a transition to commercial sectors. It can sometimes be hard for them to adjust to personal and social culture differences in corporations. We have seen examples of extraordinary successes as well as failures to assimilate. But there are equal numbers of challenges the corporate security leadership community faces with a career change. No group should be painted with a broad brush, nor should they be viewed through a narrow lens without a full understanding of the nature of the roles and organizational expectations. \u003c/p>\u003cp >It is highly likely that operational security program knowledge is not a critical expectation for success in leadership. Scope of influence, global view, competencies, vision, creativity, leadership skills, culture and the executive team fit may be deciding hiring factors placed above operational or tactical security knowledge.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"ecXzWxBJ7SJ","content":{"children":[]},"type":"section","children":["eclj3gxTSap"],"cl":"section"},{"key":"eiJ2FfC618w","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"epbN9guP5z_","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ew8GthEfSZw","content":{"children":[]},"type":"section","children":["eiJ2FfC618w","epbN9guP5z_"],"cl":"section"},{"key":"esuI607HNoI","content":{"text":"\u003ch1 >\u003cstrong >About the Columnists\u003c/strong>\u003cbr />Jerry J. Brennan is Co-Founder and Chief Executive of the Security Management Resources Group of Companies (\u003ca target=\"_blank\" href=\"https://www.smrgroup.com/\">www.smrgroup.com\u003c/a>), the leading global executive search practice focused exclusively on corporate and information security positions. \u003cem >Columnist image courtesy of Brennan\u003cbr />\u003c/em>\u003cbr />Joanne R. Pollock is Co-Founder and President of the SMR Group. Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services. \u003cem >Columnist image courtesy of Pollock\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"enbUu3HsSrq","content":{"children":[]},"type":"section","children":["esuI607HNoI"],"cl":"section"},{"key":"pTJuh0Rd2Sw","children":["eljdz_WdN-0","eRtT4A9zmJS","ejfef7uu4-E","eFg7fg5SUbb","eDpy067tdrz","e9oLIwDE-fM","ec4p1AK143S","e72b5LYieAh","eL7p9EUecuE","enVeX4Sg80u","ecXzWxBJ7SJ","ew8GthEfSZw","enbUu3HsSrq"]},{"key":"ePmVNIqEDiw","content":{"children":[],"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"e6Qifq_f1Q1","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e4uib5RwabB","content":{"text":"\u003cp >october 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"ejuNz0xwL4R","content":{"children":[],"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eaHl5lW8NJH","content":{"children":[]},"type":"section","children":["e4uib5RwabB","ejuNz0xwL4R"],"cl":"section"},{"key":"eV87aINDMVk","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e2nN7edE7gO","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8m-hf13_rw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ewifhjATNS4","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ecRt8AVSZpt","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"epJeXHHMOwb","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ejsR_C7F7zP","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"ev86crc_9yg","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eziPieIV_b2","content":{"src":{"key":"Wiy0SNYyh","url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","ratio":1.332},"children":[]},"type":"image","actions":["ev86crc_9yg"],"cl":"image"},{"key":"eaM12KrlHzr","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5XmSU_NgAt","content":{"shapeId":"zyVGqzQPIb","children":[]},"type":"shape","actions":["eaM12KrlHzr"],"cl":"shape"},{"key":"eB07s1draqQ","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ebvPu78QYll","content":{"shapeId":"erJql7HjU","children":[]},"type":"shape","actions":["eB07s1draqQ"],"cl":"shape"},{"key":"e2Himsg6Ild","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKybKBPdwhO","content":{"shapeId":"nxWVNnWZm","children":[]},"type":"shape","actions":["e2Himsg6Ild"],"cl":"shape"},{"key":"ecUnYGt6e3a","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e60ijU3hHgt","content":{"shapeId":"Z5l6xzNGx","children":[]},"type":"shape","actions":["ecUnYGt6e3a"],"cl":"shape"},{"key":"erhqIsFuHdD","content":{"children":[]},"type":"section","children":["eV87aINDMVk","e2nN7edE7gO","e8m-hf13_rw","ewifhjATNS4","ecRt8AVSZpt","epJeXHHMOwb","ejsR_C7F7zP","eziPieIV_b2","e5XmSU_NgAt","ebvPu78QYll","eKybKBPdwhO","e60ijU3hHgt"],"cl":"section"},{"key":"erXjEsRW98p","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eeaN7ordAi7","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ex04RhaVMyC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epeBdQKKVzl","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["erXjEsRW98p","eeaN7ordAi7","ex04RhaVMyC"],"cl":"image"},{"key":"eOUW2tYEpwT","content":{"children":[]},"type":"section","children":["epeBdQKKVzl"],"cl":"section"},{"key":"fixed","visibility":{"eaHl5lW8NJH":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"e6Qifq_f1Q1":{"pdtsTXzV7k2":true},"eOUW2tYEpwT":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"ePmVNIqEDiw":true,"erhqIsFuHdD":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"}},"children":["ePmVNIqEDiw","e6Qifq_f1Q1","eaHl5lW8NJH","erhqIsFuHdD","eOUW2tYEpwT"]}],"pages":[{"key":"p0Un1ptPaNV","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLpwsGgLK6.png","path":"online-contents"},{"key":"p6k2_T8fk4E","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-house-continuing-education"},{"key":"p7XQXvzk8a1","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"ad-house-brivo-infocenter"},{"key":"p8WveKGyZJO","title":"Detecting & Managing Fraud-Feature","desc":"Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bC4cCYGsqO.jpg","path":"detecting-managing-fraud-feature"},{"key":"p8asxhNC7Js","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-house-security-enewsletter"},{"key":"pA6A7KqP4KF","title":"Global News & Analysis-Department","desc":"Common targets of cyberattacks in Q2 2023; security leaders’ role in ensuring public health.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IHgFM_eTPv.jpg","path":"global-news-analysis-department"},{"key":"pA6fb3cLaEX","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vGHEbg2_qE.jpg","path":"advertising-index"},{"key":"pHCw1LUkxdr","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pLiUkAr0Yeq","title":"AD–xxx","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pLiUkAr0Yeq/v/0.jpg","path":"ad-xxx"},{"key":"pMELwnu8xCJ","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNBrVQ35MV.jpg","path":"staff-listing"},{"key":"pNFsGCQa62K","title":"Product Spotlight-Department","desc":"Security magazine highlights emergency and mass communications products for schools, organizations and government systems.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yZro4OBKqv.jpg","path":"product-spotlight-department"},{"key":"pNWtXEzudgY","title":"Education & Training-Column","desc":"The prevalence of active shooter incidents have forced security leaders to rethink their physical security strategies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","path":"education-training-column"},{"key":"pOCZ798jl3P","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tj83G6k2p2.png","path":"ad-amarok"},{"key":"pTJuh0Rd2Sw","title":"Career Intelligence-Column","desc":"Security job openings attract competition from private sector and public sector candidates. What qualities make a successful security leader?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","path":"career-intelligence-column"},{"key":"pUSxmAYzmov","title":"AD–Mobile Comm. America","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T1IRZlrL9t.png","path":"ad-mobile-comm-america"},{"key":"pYsrWx1YYeR","title":"Leadership & Management-Column","desc":"Don’t get “ghosted” — being communicative during the job search process is critical for both the security job seeker and the hiring organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","path":"leadership-management-column"},{"key":"pZv7-zzNSwm","title":"Security Talk-Column","desc":"Discover insights from security executives for proving value & developing partnerships across your organization excerpted from our Solutions by Sector webinars.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QpEUg1GwPh.jpg","path":"security-talk-column"},{"key":"pa7NAZPkku9","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GcnS_1ucs6.png","path":"ad–house-solutions-by-sector"},{"key":"paZpOzXFjLT","title":"Perimeter Security-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QB_keqBPAK.jpg","path":"perimeter-security-feature"},{"key":"pbD0ClsolXt","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pb_IsFqwtDI","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"ad-house-security-bookstore"},{"key":"pdtsTXzV7k2","title":"Strategic Security Management-Special Report","desc":"Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eb259J_VQa.jpg","path":"strategic-security-management-special-report"},{"key":"pfmwYKNSI7D","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pfmwYKNSI7D/v/0.jpg","path":"xxxxxx-column"},{"key":"pgYyu51DpDu","title":"Security Program Design Part 2-Feature","desc":"In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","path":"security-program-design-part-2-feature"},{"key":"ph3hWHT8xZ-","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NB1SostqQt.png","path":"adhouse-security-500-copy"},{"key":"pjqnARLIdYv","title":"AD–Webinar Axis","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/snDssQDUU4.png","path":"ad-webinar-axis"},{"key":"pkYFnV0JOoL","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CRFWW9Du2W.png","path":"ad-dks"},{"key":"pmNBbUhVfqz","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzkGTppKVP.png","path":"ad-altronix"},{"key":"po-qAutG259","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"ad-house-refer-a-friend"},{"key":"ppXUUqUUpJq","title":"Cyber Tactics-Column","desc":"Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/o0aU82VmqZ.jpg","path":"cyber-tactics-column"},{"key":"pq9KKALvWYR","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"psCrsl1SoLZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liAADRz1V_.jpg","path":"table-of-contents"},{"key":"psbWc2vDyc4","title":"Security October 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","path":"","index":true},{"key":"pvjXdec9SnY","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pyiCHi_3RXD","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F41buUXgWJ.jpg","path":"ad-mission-500"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"],"zyVGqzQPIb":[1200,1227,"M714.20,519.30L1160.90,0H1055.00L667.10,450.90L357.30,0H0L468.50,681.80L0,1226.40H105.90L515.50,750.20L842.70,1226.40H1200.00L714.20,519.30V519.30zM569.20,687.80L521.70,619.90L144.00,79.70H306.60L611.40,515.70L658.90,583.60L1055.10,1150.30H892.50L569.20,687.80V687.80z"]},"images":{"3sph_OtIkS":{"meta":{"width":400,"description":"Dress shirt, Forehead, Smile, Tie, Collar, Happy","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3sph_OtIkS.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3sph_OtIkS.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/3sph_OtIkS.jpg",400]]},"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"KwCZoNagMM":{"meta":{"width":1100,"height":700,"description":"Glasses, Font, Line"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KwCZoNagMM.jpg",1100]]},"RZrq6Fbfl5":{"meta":{"width":400,"description":"Forehead, Nose, Smile, Cheek, Lip, Chin, Eyebrow, Eyelash, Jaw, Neck","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RZrq6Fbfl5.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RZrq6Fbfl5.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RZrq6Fbfl5.jpg",400]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"wHEPuVOtCW":{"meta":{"width":8660,"height":5773,"description":"Automotive design, Hand, Photograph, Product, Table, Black, Fashion, Sleeve, Nail, Finger"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg",2560]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","text":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w3tbowgsq-":"pMdFOsZW1t","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","frame":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","wl9gVIiyFe":"p7bqre2y","wTnDfofkley":"XbbrSxSJp","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/guxiimdiymfzkip82pxbh/SEC_Oct-2023_Full-Issue.pdf?rlkey=owvm2jdlph5hslz3nocdtqdnl&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2","key":"3W6fnCOrUF"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"Security October 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pkYFnV0JOoL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph3hWHT8xZ-"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"WcLdotXQsx"},{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk-Column","key":"zlq1ABs6r8"},{"link":{"mode":0,"page":"pyiCHi_3RXD"},"title":"AD–Mission 500","key":"Cg6IKB3bFr"},{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis-Department","key":"KG0c-hBhTc"},{"link":{"mode":0,"page":"pmNBbUhVfqz"},"title":"AD–Altronix","key":"UvdYwEB6iN"},{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management-Special Report","key":"eKkb0fBsAc"},{"link":{"mode":0,"page":"pUSxmAYzmov"},"title":"AD–MCA","key":"SfdjUv-OyG"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud-Feature","key":"aq6zZXw6UA"},{"link":{"mode":0,"page":"pjqnARLIdYv"},"title":"AD–Webinar Axis","key":"H0go83-HS9"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security-Feature","key":"XxFRpQkDzE"},{"link":{"mode":0,"page":"pOCZ798jl3P"},"title":"AD–Amarok","key":"uZ-cmmY400"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2-Feature","key":"uuJYHR9feO"},{"link":{"mode":0,"page":"pa7NAZPkku9"},"title":"AD–Solutions by Sector","key":"g8kLBk6_D8"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence-Column","key":"wYw1IhZagm"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management-Column","key":"lfJW6NrvNJ"},{"link":{"mode":0,"page":"pb_IsFqwtDI"},"title":"AD–Security Bookstore","key":"frJ4MaVoN-"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics-Column","key":"NRD3E5LYWW"},{"link":{"mode":0,"page":"pvjXdec9SnY"},"title":"AD–Security Renewal","key":"4lyhjJDQYf"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training-Column","key":"s2FwOw2OvW"},{"link":{"mode":0,"page":"p6k2_T8fk4E"},"title":"AD–Continuing Education","key":"zoAPkFyCBJ"},{"link":{"mode":0,"page":"p8asxhNC7Js"},"title":"AD–Security eNewsletter","key":"L3B3DRezZk"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight-Department","key":"3KVWR1Bpdd"},{"link":{"mode":0,"page":"p7XQXvzk8a1"},"title":"AD–Brivo Infocenter","key":"3Lh6mdDnQ_"},{"link":{"mode":0,"page":"po-qAutG259"},"title":"AD–Refer a Friend","key":"coB7Ri6PnC"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"HYMHTNNA19"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"qxO4zI9xJB"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"oXZCj4MViB"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"SWniy0cVqL"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}