Contributing Writer\u003c/h4>","children":[]},"type":"text","cl":"text pGQMJGt39jG"},{"key":"eZOyAWGgyj0","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","key":"mDryoM81MQ","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eUS9CcZsx5l","content":{"text":"\u003ch1 >Giving up the Ghost in Security Job Searches\u003c/h1>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eH4QRsekzu4","content":{"text":"\u003ch2 >Getting a reputation for not responding to or following up in a timely and professional manner to legitimate business matters is a sure-fire way to erode your credibility.\u003c/h2>","children":[]},"type":"text","cl":"text pyY1pMQxVIq"},{"key":"eVo-OGzsKXJ","content":{"children":[]},"type":"section","children":["eFOTq2d3zyl","eZOyAWGgyj0","eUS9CcZsx5l","eH4QRsekzu4"],"cl":"section"},{"key":"eRyhE94ujYl","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","key":"hQIY-kykT_"},"children":[]},"type":"image","cl":"image"},{"key":"ezph1s_Q3C-","content":{"text":"\u003cp >\u003cem >deepblue4you / iStock / Getty Images Plus via Getty Images\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pcXiQUrvRN5"},{"key":"eIZFmu48mLY","content":{"children":[]},"type":"section","children":["eRyhE94ujYl","ezph1s_Q3C-"],"cl":"section"},{"key":"egnzWjRtGiX","content":{"text":"\u003cp >Call me Casper.\u003c/p>\u003cp >I’ve been ghosted so many times in my professional career that I should live in the Haunted Mansion and vacation at the Overlook Hotel. I’d feel at home in the presence of everyone from Banquo, Jacob Marley and Bloody Mary to Inky and Blinky, the Headless Horseman and Nearly Headless Nick.\u003c/p>\u003cp >I’m hardly alone. We all know that ghosting has become a professional epidemic. According to \u003cem >Chief Executive\u003c/em>, 77% of job applicants say they have been ghosted by a potential employer since the beginning of the COVID-19 pandemic. An almost equal percentage of employers say job candidates have done the same to them.\u003c/p>\u003cp >Less well-documented are meeting cancellations that never get rescheduled; unreturned calls, emails, texts or social media queries; networking requests that go unheeded; business proposals that are met with silence; and follow-ups from recruiters who seek you out then drop off the face of the Earth.\u003c/p>\u003cp >Don’t get me wrong. We all get busy or forget. We all suffer calendar glitches, personal emergencies, last-minute board meetings, limited cell service or Wi-Fi, or any of the many other inescapable quirks of modern business communication.\u003c/p>\u003cp >Nor am I talking about ignoring cold calls, likely scammers, or anyone who is rude, hostile or demanding.\u003c/p>\u003cp >However, getting a reputation for not responding to or following up in a timely and professional manner to legitimate business matters is a sure-fire way to erode your credibility. Every week I hear from supremely qualified colleagues who apply for suitable roles and yet never hear back from the company. The recruiter deserves some of the blame, but so does the hiring manager. Yes, you may have received thousands of applications for a single role. But many \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98763-top-security-career-challenges-for-2023\">security job candidates\u003c/a> spent hours examining the position and company description, researching the business, tailoring their resume, writing a cover letter and hopscotching through the online application.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"erLpCvIVirW","content":{"children":[]},"type":"section","children":["egnzWjRtGiX"],"cl":"section"},{"key":"eTC8kEyyDkC","content":{"text":"\u003ch1 >“A cavalier approach to your career or business relationships will stick to you like ectoplasmic slime.”\u003c/h1>","children":[]},"type":"text","cl":"text pzCBR6rvMFP"},{"key":"e8blfo7lPBT","content":{"src":{"key":"IKfRqm6_25","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","ratio":1},"children":[]},"type":"image","cl":"image"},{"key":"eu6FyRWlnDW","content":{"children":[]},"type":"section","children":["eTC8kEyyDkC","e8blfo7lPBT"],"cl":"section"},{"key":"eWP1NQPK6GF","content":{"text":"\u003cp >They are invested. Ignoring them is disrespectful.\u003c/p>\u003cp >All it takes is one thoughtfully written response that can be used for every rejected applicant. Take the case of a colleague who applied for a senior security role at a major software company. This person had previously met the executive to whom the position reported, but didn’t get an interview. Within two months of applying, he received the following (edited) reply:\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"ejUiGSAabq4","content":{"children":[]},"type":"section","children":["eWP1NQPK6GF"],"cl":"section"},{"key":"epoEYTo7BPr","content":{"text":"\u003cp >Thank you for taking the time to apply for the role.\u003c/p>\u003cp >We’re fortunate to have received a lot of interest in this role, resulting in a very competitive selection process and unfortunately, at this time we have decided not to move forward with your application.\u003c/p>\u003cp >While it didn’t work out this time, we hope you will continue to explore other opportunities with us by visiting our Career Site.\u003c/p>\u003cp >Thank you once again for your interest in our company, and we wish you all the best in your search for a suitable position.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"ebQio9VEwAW","content":{"children":[]},"type":"section","children":["epoEYTo7BPr"],"cl":"section"},{"key":"etmtS3x0kvu","content":{"text":"\u003cp >Disappointing, but responsive, polite, encouraging and professional.\u003c/p>\u003cp >It’s even worse for your reputation if you ghost as a job seeker. If you skip an interview — or worse, fail to show up after you’ve been hired — you are likely to obliterate your reputation. \u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/articles/98940-security-executive-job-search-myths-and-realities\" target=\"_blank\">Security executives\u003c/a> (and recruiters) speak. A cavalier approach to your career or business relationships will stick to you like ectoplasmic slime. \u003c/p>\u003cp >That can turn you into something worse than a ghost: a persona non grata in the security profession.\u003c/p>","children":[]},"type":"text","cl":"text px9wGknIVpf"},{"key":"e7hJgUgIR2T","content":{"children":[]},"type":"section","children":["etmtS3x0kvu"],"cl":"section"},{"key":"evxI-TMWFmP","content":{"src":"6n17seTnEB","children":[]},"type":"image","cl":"image"},{"key":"es-W7qsp6vK","content":{"buttons":{"twitter":true,"mail":true,"facebook":true,"linkedin":true},"theme":"colors","children":[]},"type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]},"cl":"w1c12qdsln-oon"},{"key":"ejhVg7LH7Li","content":{"children":[]},"type":"section","children":["evxI-TMWFmP","es-W7qsp6vK"],"cl":"section"},{"key":"eeJLRP5k8SI","content":{"text":"\u003ch1 >\u003cstrong >About the Columnist\u003c/strong>\u003cbr />Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. \u003cem >Columnist image courtesy of Gips\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eDAk3EhWQ3a","content":{"children":[]},"type":"section","children":["eeJLRP5k8SI"],"cl":"section"},{"key":"pYsrWx1YYeR","children":["eQqCnR0KtFe","e24lgO9x3Tf","eJaSw2ej9eq","eVo-OGzsKXJ","eIZFmu48mLY","erLpCvIVirW","eu6FyRWlnDW","ejUiGSAabq4","ebQio9VEwAW","e7hJgUgIR2T","ejhVg7LH7Li","eDAk3EhWQ3a"]},{"key":"ePmVNIqEDiw","content":{"children":[],"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"e6Qifq_f1Q1","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e4uib5RwabB","content":{"text":"\u003cp >october 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"ejuNz0xwL4R","content":{"children":[],"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eaHl5lW8NJH","content":{"children":[]},"type":"section","children":["e4uib5RwabB","ejuNz0xwL4R"],"cl":"section"},{"key":"eV87aINDMVk","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e2nN7edE7gO","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8m-hf13_rw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ewifhjATNS4","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ecRt8AVSZpt","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"epJeXHHMOwb","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ejsR_C7F7zP","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"ev86crc_9yg","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eziPieIV_b2","content":{"src":{"key":"Wiy0SNYyh","url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","ratio":1.332},"children":[]},"type":"image","actions":["ev86crc_9yg"],"cl":"image"},{"key":"eaM12KrlHzr","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5XmSU_NgAt","content":{"shapeId":"zyVGqzQPIb","children":[]},"type":"shape","actions":["eaM12KrlHzr"],"cl":"shape"},{"key":"eB07s1draqQ","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ebvPu78QYll","content":{"shapeId":"erJql7HjU","children":[]},"type":"shape","actions":["eB07s1draqQ"],"cl":"shape"},{"key":"e2Himsg6Ild","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKybKBPdwhO","content":{"shapeId":"nxWVNnWZm","children":[]},"type":"shape","actions":["e2Himsg6Ild"],"cl":"shape"},{"key":"ecUnYGt6e3a","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e60ijU3hHgt","content":{"shapeId":"Z5l6xzNGx","children":[]},"type":"shape","actions":["ecUnYGt6e3a"],"cl":"shape"},{"key":"erhqIsFuHdD","content":{"children":[]},"type":"section","children":["eV87aINDMVk","e2nN7edE7gO","e8m-hf13_rw","ewifhjATNS4","ecRt8AVSZpt","epJeXHHMOwb","ejsR_C7F7zP","eziPieIV_b2","e5XmSU_NgAt","ebvPu78QYll","eKybKBPdwhO","e60ijU3hHgt"],"cl":"section"},{"key":"erXjEsRW98p","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eeaN7ordAi7","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ex04RhaVMyC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epeBdQKKVzl","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["erXjEsRW98p","eeaN7ordAi7","ex04RhaVMyC"],"cl":"image"},{"key":"eOUW2tYEpwT","content":{"children":[]},"type":"section","children":["epeBdQKKVzl"],"cl":"section"},{"key":"fixed","visibility":{"eaHl5lW8NJH":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"e6Qifq_f1Q1":{"pdtsTXzV7k2":true},"eOUW2tYEpwT":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"ePmVNIqEDiw":true,"erhqIsFuHdD":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"}},"children":["ePmVNIqEDiw","e6Qifq_f1Q1","eaHl5lW8NJH","erhqIsFuHdD","eOUW2tYEpwT"]}],"pages":[{"key":"p0Un1ptPaNV","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLpwsGgLK6.png","path":"online-contents"},{"key":"p6k2_T8fk4E","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-house-continuing-education"},{"key":"p7XQXvzk8a1","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"ad-house-brivo-infocenter"},{"key":"p8WveKGyZJO","title":"Detecting & Managing Fraud-Feature","desc":"Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bC4cCYGsqO.jpg","path":"detecting-managing-fraud-feature"},{"key":"p8asxhNC7Js","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-house-security-enewsletter"},{"key":"pA6A7KqP4KF","title":"Global News & Analysis-Department","desc":"Common targets of cyberattacks in Q2 2023; security leaders’ role in ensuring public health.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IHgFM_eTPv.jpg","path":"global-news-analysis-department"},{"key":"pA6fb3cLaEX","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vGHEbg2_qE.jpg","path":"advertising-index"},{"key":"pHCw1LUkxdr","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pLiUkAr0Yeq","title":"AD–xxx","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pLiUkAr0Yeq/v/0.jpg","path":"ad-xxx"},{"key":"pMELwnu8xCJ","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNBrVQ35MV.jpg","path":"staff-listing"},{"key":"pNFsGCQa62K","title":"Product Spotlight-Department","desc":"Security magazine highlights emergency and mass communications products for schools, organizations and government systems.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yZro4OBKqv.jpg","path":"product-spotlight-department"},{"key":"pNWtXEzudgY","title":"Education & Training-Column","desc":"The prevalence of active shooter incidents have forced security leaders to rethink their physical security strategies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","path":"education-training-column"},{"key":"pOCZ798jl3P","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tj83G6k2p2.png","path":"ad-amarok"},{"key":"pTJuh0Rd2Sw","title":"Career Intelligence-Column","desc":"Security job openings attract competition from private sector and public sector candidates. What qualities make a successful security leader?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","path":"career-intelligence-column"},{"key":"pUSxmAYzmov","title":"AD–Mobile Comm. America","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T1IRZlrL9t.png","path":"ad-mobile-comm-america"},{"key":"pYsrWx1YYeR","title":"Leadership & Management-Column","desc":"Don’t get “ghosted” — being communicative during the job search process is critical for both the security job seeker and the hiring organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","path":"leadership-management-column"},{"key":"pZv7-zzNSwm","title":"Security Talk-Column","desc":"Discover insights from security executives for proving value & developing partnerships across your organization excerpted from our Solutions by Sector webinars.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QpEUg1GwPh.jpg","path":"security-talk-column"},{"key":"pa7NAZPkku9","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GcnS_1ucs6.png","path":"ad–house-solutions-by-sector"},{"key":"paZpOzXFjLT","title":"Perimeter Security-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QB_keqBPAK.jpg","path":"perimeter-security-feature"},{"key":"pbD0ClsolXt","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pb_IsFqwtDI","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"ad-house-security-bookstore"},{"key":"pdtsTXzV7k2","title":"Strategic Security Management-Special Report","desc":"Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eb259J_VQa.jpg","path":"strategic-security-management-special-report"},{"key":"pfmwYKNSI7D","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pfmwYKNSI7D/v/0.jpg","path":"xxxxxx-column"},{"key":"pgYyu51DpDu","title":"Security Program Design Part 2-Feature","desc":"In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","path":"security-program-design-part-2-feature"},{"key":"ph3hWHT8xZ-","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NB1SostqQt.png","path":"adhouse-security-500-copy"},{"key":"pjqnARLIdYv","title":"AD–Webinar Axis","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/snDssQDUU4.png","path":"ad-webinar-axis"},{"key":"pkYFnV0JOoL","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CRFWW9Du2W.png","path":"ad-dks"},{"key":"pmNBbUhVfqz","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzkGTppKVP.png","path":"ad-altronix"},{"key":"po-qAutG259","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"ad-house-refer-a-friend"},{"key":"ppXUUqUUpJq","title":"Cyber Tactics-Column","desc":"Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/o0aU82VmqZ.jpg","path":"cyber-tactics-column"},{"key":"pq9KKALvWYR","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"psCrsl1SoLZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liAADRz1V_.jpg","path":"table-of-contents"},{"key":"psbWc2vDyc4","title":"Security October 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","path":"","index":true},{"key":"pvjXdec9SnY","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pyiCHi_3RXD","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F41buUXgWJ.jpg","path":"ad-mission-500"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"],"zyVGqzQPIb":[1200,1227,"M714.20,519.30L1160.90,0H1055.00L667.10,450.90L357.30,0H0L468.50,681.80L0,1226.40H105.90L515.50,750.20L842.70,1226.40H1200.00L714.20,519.30V519.30zM569.20,687.80L521.70,619.90L144.00,79.70H306.60L611.40,515.70L658.90,583.60L1055.10,1150.30H892.50L569.20,687.80V687.80z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"hQIY-kykT_":{"meta":{"width":5022,"height":2825,"description":"Input device, Electronic instrument, Blue, Peripheral, Azure, Watch, Gadget, Water, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",2560]]},"mDryoM81MQ":{"meta":{"width":400,"description":"Dress shirt, Forehead, Cheek, Smile, Chin, Jaw, Sleeve, Gesture, Happy","height":400},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/mDryoM81MQ.jpg",400]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","text":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w3tbowgsq-":"pMdFOsZW1t","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","frame":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/guxiimdiymfzkip82pxbh/SEC_Oct-2023_Full-Issue.pdf?rlkey=owvm2jdlph5hslz3nocdtqdnl&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2","key":"3W6fnCOrUF"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"Security October 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pkYFnV0JOoL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph3hWHT8xZ-"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"WcLdotXQsx"},{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk-Column","key":"zlq1ABs6r8"},{"link":{"mode":0,"page":"pyiCHi_3RXD"},"title":"AD–Mission 500","key":"Cg6IKB3bFr"},{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis-Department","key":"KG0c-hBhTc"},{"link":{"mode":0,"page":"pmNBbUhVfqz"},"title":"AD–Altronix","key":"UvdYwEB6iN"},{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management-Special Report","key":"eKkb0fBsAc"},{"link":{"mode":0,"page":"pUSxmAYzmov"},"title":"AD–MCA","key":"SfdjUv-OyG"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud-Feature","key":"aq6zZXw6UA"},{"link":{"mode":0,"page":"pjqnARLIdYv"},"title":"AD–Webinar Axis","key":"H0go83-HS9"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security-Feature","key":"XxFRpQkDzE"},{"link":{"mode":0,"page":"pOCZ798jl3P"},"title":"AD–Amarok","key":"uZ-cmmY400"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2-Feature","key":"uuJYHR9feO"},{"link":{"mode":0,"page":"pa7NAZPkku9"},"title":"AD–Solutions by Sector","key":"g8kLBk6_D8"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence-Column","key":"wYw1IhZagm"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management-Column","key":"lfJW6NrvNJ"},{"link":{"mode":0,"page":"pb_IsFqwtDI"},"title":"AD–Security Bookstore","key":"frJ4MaVoN-"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics-Column","key":"NRD3E5LYWW"},{"link":{"mode":0,"page":"pvjXdec9SnY"},"title":"AD–Security Renewal","key":"4lyhjJDQYf"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training-Column","key":"s2FwOw2OvW"},{"link":{"mode":0,"page":"p6k2_T8fk4E"},"title":"AD–Continuing Education","key":"zoAPkFyCBJ"},{"link":{"mode":0,"page":"p8asxhNC7Js"},"title":"AD–Security eNewsletter","key":"L3B3DRezZk"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight-Department","key":"3KVWR1Bpdd"},{"link":{"mode":0,"page":"p7XQXvzk8a1"},"title":"AD–Brivo Infocenter","key":"3Lh6mdDnQ_"},{"link":{"mode":0,"page":"po-qAutG259"},"title":"AD–Refer a Friend","key":"coB7Ri6PnC"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"HYMHTNNA19"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"qxO4zI9xJB"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"oXZCj4MViB"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"SWniy0cVqL"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}