\u003c/strong>Assistant Editor \u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eQFx-M7x018","content":{"src":{"key":"eZ3CGCzGID","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg","ratio":1.0495626822157433},"children":[]},"type":"image","cl":"image"},{"key":"ev63_KI1ghm","content":{"children":[]},"type":"section","children":["eXVYo5epF0V","ess3XHdUVFX","efGLiylmsIW","eQFx-M7x018"],"cl":"section"},{"key":"e3k0oi-1z8d","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","key":"DV4GqloqRV"},"children":[]},"type":"image","cl":"image"},{"key":"emd7iDUs9wJ","content":{"text":"\u003cp >\u003cem >WoodysPhotos / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"ers73S3su9B","content":{"children":[]},"type":"section","children":["e3k0oi-1z8d","emd7iDUs9wJ"],"cl":"section"},{"key":"eFc0VrE0w2p","content":{"text":"\u003cp >With \u003ca rel=\"noopener external\" href=\"https://www.gunviolencearchive.org/past-tolls\" target=\"_blank\">646\u003c/a> mass shootings happening in 2022, and more than \u003ca rel=\"noopener external\" href=\"https://www.gunviolencearchive.org/\" target=\"_blank\">400\u003c/a> so far in 2023, security leaders are highly aware of the need for active shooter prevention strategies. Organizations have implemented various strategies including enhanced weapons detection, additional law enforcement onsite or safety drills. \u003c/p>\u003cp >Here, security leaders in healthcare and education share some of their strategies for protecting themselves and their organizations from these kinds of attacks. \u003c/p>\u003cp >“Organizational buy-in is imperative from the start. You must get stakeholders to commit to active shooter response plans at the beginning by having them provide the necessary resources and support,” says Mike Hasselbrink, Director of Physical Security at University of Alabama at Birmingham. “The right amount of effort on the front end will go a long way in providing the momentum needed to propel an active shooter program toward success. Success is everyone feeling and being safe and secure.”\u003c/p>\u003cp >Jeff Hauk, Director of Public Safety and Police Authority Services at Memorial Healthcare, also highlights leadership and management as key to active shooter prevention. In the healthcare sector, he says collaboration across many departments helps ensure emergency preparedness across the board. \u003c/p>\u003cp >“Gather a diverse group of individuals who have relevant expertise, including representatives from security, management, human resources, risk management, communications, facilities, clinical staff and any other relevant departments or roles,” Hauk says. \u003c/p>\u003cp >Even the most advanced technology won’t solve an issue of poor communication between teams and departments. An alarm system in a school, for example, only works if teachers and staff have a quick and easy way to implement it. Any emergency codes need to be well communicated and understood, as time is critical during an emergency. \u003c/p>\u003cp >All of this preparation, however, can take a toll on the community. \u003c/p>\u003cp >“Training should be conducted by qualified instructors experienced in law enforcement operations. Part of the qualification to be an instructor is knowing the signs of fatigue and techniques to combat it. Continuous and mundane training will only burn everyone out and not give your team time to absorb the benefits of the training program,” Hasselbrink says. \u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eft-x2MzqhU","content":{"children":[]},"type":"section","children":["eFc0VrE0w2p"],"cl":"section"},{"key":"eA2uv8S8mRv","content":{"children":[],"link":{"mode":0,"page":"pt7ggwr-Dr"}},"type":"external-link","cl":"external-link"},{"key":"eNo3jCRv79O","content":{"text":"\u003cp >Jeff Hauk, Director of Public Safety and Police Authority Services at Memorial Healthcare. \u003cem >Image courtesy of Hauk\u003c/em>\u003c/p>","children":[]},"type":"text","actions":["eA2uv8S8mRv"],"cl":"text pcXiQUrvRN5"},{"key":"exs6JoYMfKn","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg","key":"Pl_DhRiLAy"},"children":[]},"type":"image","cl":"image"},{"key":"eJ18ryNeiQ_","content":{"children":[],"link":{"mode":0,"page":"pt7ggwr-Dr"}},"type":"external-link","cl":"external-link"},{"key":"e4BN3KaYZ6P","content":{"text":"\u003cp >Mike Hasselbrink, Director of Physical Security at University of Alabama at Birmingham. \u003cem >Image courtesy of Hasselbrink\u003c/em>\u003c/p>","children":[]},"type":"text","actions":["eJ18ryNeiQ_"],"cl":"text pcXiQUrvRN5"},{"key":"edDkwVOhQ63","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg","key":"_-u91bW6kU"},"children":[]},"type":"image","cl":"image"},{"key":"eP5DtnxlPat","content":{"children":[]},"type":"section","children":["eNo3jCRv79O","exs6JoYMfKn","e4BN3KaYZ6P","edDkwVOhQ63"],"cl":"section"},{"key":"eLBDP_dWW1e","content":{"text":"\u003ch1 >Training should be conducted by qualified instructors experienced in law enforcement operations. Part of the qualification to be an instructor is knowing the signs of fatigue and techniques to combat it.” \u003c/h1>\u003ch2 >— Mike Hasselbrink, Director of Physical Security at University of Alabama at Birmingham\u003c/h2>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"eyTfT7osyfH","content":{"src":{"key":"IKfRqm6_25","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"efW25Uw7IKG","content":{"children":[]},"type":"section","children":["eLBDP_dWW1e","eyTfT7osyfH"],"cl":"section"},{"key":"etW95R6Lw97","content":{"text":"\u003cp >This doesn’t only apply to employees. For example, in the education sector, students bogged down with constant drills may stop taking them seriously, and it could lead to \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/95017-of-teens-today-do-not-believe-schools-are-equipped-to-respond-effectively-to-emergency-incidents-or-mental-health-needs\">added stress\u003c/a> from constantly thinking of how to protect themselves if a shooter enters the building. \u003c/p>\u003cp >The content of these trainings is equally as, if not more, important as the frequency at which they occur. Security leaders should consider all layers of security in the event of an emergency. Employees, patients/students and guests all need to be considered when building lockdown and evacuation plans. Building a plan for an elementary school will be largely different from a college, just as a hospital in the middle of a city will have a different plan than one in a remote area. \u003c/p>\u003cp >Hauk outlines best practices for considering all elements in an active shooter plan. “Create evacuation plans that address the movement of patients, staff and visitors, including those with mobility challenges,” Hauk says. “Establish lockdown/lockout procedures and consider facility layout and design to ensure easy evacuation routes and safe zones. Develop procedures for securing sensitive patient information during an incident and consider the presence of hazardous materials or equipment that may require specialized handling. Provide training on recognizing warning signs and reporting concerns about suspicious activity. Collaborate closely with law enforcement and first responders to keep them abreast on your response plans. Coordinate with local law enforcement for rapid response and evacuation support.”\u003c/p>\u003cp >Detailed planning is essential, especially in fast-moving environments such as hospitals. “Healthcare is an industry strafed with high stress, emotions, high energy and the risk of life and death situations, requiring strong leaders to help mitigate this turmoil and chaotic environment,” Hauk says. \u003c/p>\u003cp >The added stress of the environment makes it especially important for security leaders to develop clear strategies. Staff should be trained not only for emergencies, but also in de-escalation to help prevent emergencies. This can mean reporting suspicious behavior or having security staff nearby when leadership is delivering difficult news to reduce workplace violence risk. \u003c/p>\u003cp >Just like planning for fatigue, security leaders should also consider the functionality of their buildings and security systems. \u003c/p>\u003cp >“Designing a facility that is difficult for an active shooter to access can be a challenge. You must balance operations with security. This means having security measures in place, such as locked doors, security cameras and alarm systems that don’t prevent the organization from being able to function,” Hasselbrink says. \u003c/p>\u003cp >Individually screening everyone who tries to enter a facility may be effective at detecting weapons, but it dramatically slows down operations. Students would have to arrive to school early, and hospitals would lose valuable seconds when responding to injuries. Adding weapons detection technology to passively monitor people in the area can be a compromise, as it provides safety features without affecting functionality. Education security leaders have implemented \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/88850-clear-backpacks-now-required-at-marjory-stoneman-douglas\">clear bag\u003c/a> policies to review students’ belongings without always having to stop them individually. \u003c/p>\u003cp >There are several aspects to consider when building out an active shooter response plan. The best plans consider not only major risks, but staffing and technology constraints. Strategy can’t override overworked staff, making employee mental health essential to effective security plans. Security leaders need ensure everyone within their organization is prepared, as stress and exhaustion can make all the difference in an emergency.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"eW7A53gzABA","content":{"children":[]},"type":"section","children":["etW95R6Lw97"],"cl":"section"},{"key":"eXl2N0fS-_3","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"eptukdfNcWg","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"eaEiwaYE_t5","content":{"children":[]},"type":"section","children":["eXl2N0fS-_3","eptukdfNcWg"],"cl":"section"},{"key":"pNWtXEzudgY","children":["eTSXDxL9zfN","eK8P0LVCKRd","eNzZlQRsEwe","ev63_KI1ghm","ers73S3su9B","eft-x2MzqhU","eP5DtnxlPat","efW25Uw7IKG","eW7A53gzABA","eaEiwaYE_t5"]},{"key":"ePmVNIqEDiw","content":{"children":[],"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"e6Qifq_f1Q1","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e4uib5RwabB","content":{"text":"\u003cp >october 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"ejuNz0xwL4R","content":{"children":[],"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eaHl5lW8NJH","content":{"children":[]},"type":"section","children":["e4uib5RwabB","ejuNz0xwL4R"],"cl":"section"},{"key":"eV87aINDMVk","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e2nN7edE7gO","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8m-hf13_rw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ewifhjATNS4","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ecRt8AVSZpt","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"epJeXHHMOwb","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ejsR_C7F7zP","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"ev86crc_9yg","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eziPieIV_b2","content":{"src":{"key":"Wiy0SNYyh","url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","ratio":1.332},"children":[]},"type":"image","actions":["ev86crc_9yg"],"cl":"image"},{"key":"eaM12KrlHzr","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5XmSU_NgAt","content":{"shapeId":"zyVGqzQPIb","children":[]},"type":"shape","actions":["eaM12KrlHzr"],"cl":"shape"},{"key":"eB07s1draqQ","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ebvPu78QYll","content":{"shapeId":"erJql7HjU","children":[]},"type":"shape","actions":["eB07s1draqQ"],"cl":"shape"},{"key":"e2Himsg6Ild","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKybKBPdwhO","content":{"shapeId":"nxWVNnWZm","children":[]},"type":"shape","actions":["e2Himsg6Ild"],"cl":"shape"},{"key":"ecUnYGt6e3a","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e60ijU3hHgt","content":{"shapeId":"Z5l6xzNGx","children":[]},"type":"shape","actions":["ecUnYGt6e3a"],"cl":"shape"},{"key":"erhqIsFuHdD","content":{"children":[]},"type":"section","children":["eV87aINDMVk","e2nN7edE7gO","e8m-hf13_rw","ewifhjATNS4","ecRt8AVSZpt","epJeXHHMOwb","ejsR_C7F7zP","eziPieIV_b2","e5XmSU_NgAt","ebvPu78QYll","eKybKBPdwhO","e60ijU3hHgt"],"cl":"section"},{"key":"erXjEsRW98p","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eeaN7ordAi7","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ex04RhaVMyC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epeBdQKKVzl","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["erXjEsRW98p","eeaN7ordAi7","ex04RhaVMyC"],"cl":"image"},{"key":"eOUW2tYEpwT","content":{"children":[]},"type":"section","children":["epeBdQKKVzl"],"cl":"section"},{"key":"fixed","visibility":{"eaHl5lW8NJH":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"e6Qifq_f1Q1":{"pdtsTXzV7k2":true},"eOUW2tYEpwT":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"ePmVNIqEDiw":true,"erhqIsFuHdD":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"}},"children":["ePmVNIqEDiw","e6Qifq_f1Q1","eaHl5lW8NJH","erhqIsFuHdD","eOUW2tYEpwT"]}],"pages":[{"key":"p0Un1ptPaNV","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLpwsGgLK6.png","path":"online-contents"},{"key":"p6k2_T8fk4E","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-house-continuing-education"},{"key":"p7XQXvzk8a1","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"ad-house-brivo-infocenter"},{"key":"p8WveKGyZJO","title":"Detecting & Managing Fraud-Feature","desc":"Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bC4cCYGsqO.jpg","path":"detecting-managing-fraud-feature"},{"key":"p8asxhNC7Js","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-house-security-enewsletter"},{"key":"pA6A7KqP4KF","title":"Global News & Analysis-Department","desc":"Common targets of cyberattacks in Q2 2023; security leaders’ role in ensuring public health.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IHgFM_eTPv.jpg","path":"global-news-analysis-department"},{"key":"pA6fb3cLaEX","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vGHEbg2_qE.jpg","path":"advertising-index"},{"key":"pHCw1LUkxdr","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pLiUkAr0Yeq","title":"AD–xxx","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pLiUkAr0Yeq/v/0.jpg","path":"ad-xxx"},{"key":"pMELwnu8xCJ","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNBrVQ35MV.jpg","path":"staff-listing"},{"key":"pNFsGCQa62K","title":"Product Spotlight-Department","desc":"Security magazine highlights emergency and mass communications products for schools, organizations and government systems.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yZro4OBKqv.jpg","path":"product-spotlight-department"},{"key":"pNWtXEzudgY","title":"Education & Training-Column","desc":"The prevalence of active shooter incidents have forced security leaders to rethink their physical security strategies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","path":"education-training-column"},{"key":"pOCZ798jl3P","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tj83G6k2p2.png","path":"ad-amarok"},{"key":"pTJuh0Rd2Sw","title":"Career Intelligence-Column","desc":"Security job openings attract competition from private sector and public sector candidates. What qualities make a successful security leader?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","path":"career-intelligence-column"},{"key":"pUSxmAYzmov","title":"AD–Mobile Comm. America","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T1IRZlrL9t.png","path":"ad-mobile-comm-america"},{"key":"pYsrWx1YYeR","title":"Leadership & Management-Column","desc":"Don’t get “ghosted” — being communicative during the job search process is critical for both the security job seeker and the hiring organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","path":"leadership-management-column"},{"key":"pZv7-zzNSwm","title":"Security Talk-Column","desc":"Discover insights from security executives for proving value & developing partnerships across your organization excerpted from our Solutions by Sector webinars.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QpEUg1GwPh.jpg","path":"security-talk-column"},{"key":"pa7NAZPkku9","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GcnS_1ucs6.png","path":"ad–house-solutions-by-sector"},{"key":"paZpOzXFjLT","title":"Perimeter Security-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QB_keqBPAK.jpg","path":"perimeter-security-feature"},{"key":"pbD0ClsolXt","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pb_IsFqwtDI","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"ad-house-security-bookstore"},{"key":"pdtsTXzV7k2","title":"Strategic Security Management-Special Report","desc":"Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eb259J_VQa.jpg","path":"strategic-security-management-special-report"},{"key":"pfmwYKNSI7D","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pfmwYKNSI7D/v/0.jpg","path":"xxxxxx-column"},{"key":"pgYyu51DpDu","title":"Security Program Design Part 2-Feature","desc":"In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","path":"security-program-design-part-2-feature"},{"key":"ph3hWHT8xZ-","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NB1SostqQt.png","path":"adhouse-security-500-copy"},{"key":"pjqnARLIdYv","title":"AD–Webinar Axis","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/snDssQDUU4.png","path":"ad-webinar-axis"},{"key":"pkYFnV0JOoL","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CRFWW9Du2W.png","path":"ad-dks"},{"key":"pmNBbUhVfqz","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzkGTppKVP.png","path":"ad-altronix"},{"key":"po-qAutG259","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"ad-house-refer-a-friend"},{"key":"ppXUUqUUpJq","title":"Cyber Tactics-Column","desc":"Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/o0aU82VmqZ.jpg","path":"cyber-tactics-column"},{"key":"pq9KKALvWYR","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"psCrsl1SoLZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liAADRz1V_.jpg","path":"table-of-contents"},{"key":"psbWc2vDyc4","title":"Security October 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","path":"","index":true},{"key":"pvjXdec9SnY","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pyiCHi_3RXD","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F41buUXgWJ.jpg","path":"ad-mission-500"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"],"zyVGqzQPIb":[1200,1227,"M714.20,519.30L1160.90,0H1055.00L667.10,450.90L357.30,0H0L468.50,681.80L0,1226.40H105.90L515.50,750.20L842.70,1226.40H1200.00L714.20,519.30V519.30zM569.20,687.80L521.70,619.90L144.00,79.70H306.60L611.40,515.70L658.90,583.60L1055.10,1150.30H892.50L569.20,687.80V687.80z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"DV4GqloqRV":{"meta":{"width":4216,"height":2525,"description":"Fixture, Wood, Hall, Lighting, Floor, Flooring, Building"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",2560]]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"Pl_DhRiLAy":{"meta":{"width":3431,"height":4954,"description":"Dress shirt, Forehead, Cheek, Sleeve, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Pl_DhRiLAy.jpg",2560]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"_-u91bW6kU":{"meta":{"width":2744,"height":2692,"description":"Dress shirt, Forehead, Nose, Cheek, Chin, Eyebrow, Beard, Smile, Jaw, Tie"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_-u91bW6kU.jpg",2560]]},"eZ3CGCzGID":{"meta":{"width":1080,"height":1029,"description":"Vision care, Forehead, Glasses, Cheek, Lip, Smile, Eye, Jaw, Neck, Eyewear"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eZ3CGCzGID.jpg",1080]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","text":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w3tbowgsq-":"pMdFOsZW1t","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","frame":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/guxiimdiymfzkip82pxbh/SEC_Oct-2023_Full-Issue.pdf?rlkey=owvm2jdlph5hslz3nocdtqdnl&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2","key":"3W6fnCOrUF"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"Security October 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pkYFnV0JOoL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph3hWHT8xZ-"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"WcLdotXQsx"},{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk-Column","key":"zlq1ABs6r8"},{"link":{"mode":0,"page":"pyiCHi_3RXD"},"title":"AD–Mission 500","key":"Cg6IKB3bFr"},{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis-Department","key":"KG0c-hBhTc"},{"link":{"mode":0,"page":"pmNBbUhVfqz"},"title":"AD–Altronix","key":"UvdYwEB6iN"},{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management-Special Report","key":"eKkb0fBsAc"},{"link":{"mode":0,"page":"pUSxmAYzmov"},"title":"AD–MCA","key":"SfdjUv-OyG"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud-Feature","key":"aq6zZXw6UA"},{"link":{"mode":0,"page":"pjqnARLIdYv"},"title":"AD–Webinar Axis","key":"H0go83-HS9"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security-Feature","key":"XxFRpQkDzE"},{"link":{"mode":0,"page":"pOCZ798jl3P"},"title":"AD–Amarok","key":"uZ-cmmY400"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2-Feature","key":"uuJYHR9feO"},{"link":{"mode":0,"page":"pa7NAZPkku9"},"title":"AD–Solutions by Sector","key":"g8kLBk6_D8"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence-Column","key":"wYw1IhZagm"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management-Column","key":"lfJW6NrvNJ"},{"link":{"mode":0,"page":"pb_IsFqwtDI"},"title":"AD–Security Bookstore","key":"frJ4MaVoN-"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics-Column","key":"NRD3E5LYWW"},{"link":{"mode":0,"page":"pvjXdec9SnY"},"title":"AD–Security Renewal","key":"4lyhjJDQYf"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training-Column","key":"s2FwOw2OvW"},{"link":{"mode":0,"page":"p6k2_T8fk4E"},"title":"AD–Continuing Education","key":"zoAPkFyCBJ"},{"link":{"mode":0,"page":"p8asxhNC7Js"},"title":"AD–Security eNewsletter","key":"L3B3DRezZk"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight-Department","key":"3KVWR1Bpdd"},{"link":{"mode":0,"page":"p7XQXvzk8a1"},"title":"AD–Brivo Infocenter","key":"3Lh6mdDnQ_"},{"link":{"mode":0,"page":"po-qAutG259"},"title":"AD–Refer a Friend","key":"coB7Ri6PnC"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"HYMHTNNA19"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"qxO4zI9xJB"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"oXZCj4MViB"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"SWniy0cVqL"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}