J. Nicole McDargh, JD, CPP, is VP Safety and Loss Prevention at Domino’s and host of the podcast Your Security Boss. \u003cem >Image courtesy of McDargh\u003c/em>\u003c/h1>","children":[]},"type":"text","cl":"text pcS1ri5HZdw"},{"key":"eVc_3DOC4iI","content":{"src":{"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg","key":"Qrp0VnaauW"},"children":[]},"type":"image","cl":"image"},{"key":"e5x4naIRocT","content":{"children":[]},"type":"section","children":["eL3n01k_cqn","eVc_3DOC4iI"],"cl":"section"},{"key":"pgYyu51DpDu","children":["eU1L0Nc-mJD","eXbOvq9mxgU","eHKOkEjqbTn","eNYkH80P7lm","eTreebuGCCD","e_YpwL4Aknp","e6HPEjo_5UT","e-osAk7kN6K","eZbH7ezCcxg","eI1P-oo6eyF","e5x4naIRocT"]},{"key":"ePmVNIqEDiw","content":{"children":[],"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"e6Qifq_f1Q1","content":{"debug":false,"children":[]},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"e4uib5RwabB","content":{"text":"\u003cp >october 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text"},{"key":"ejuNz0xwL4R","content":{"children":[],"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"eaHl5lW8NJH","content":{"children":[]},"type":"section","children":["e4uib5RwabB","ejuNz0xwL4R"],"cl":"section"},{"key":"eV87aINDMVk","content":{"text":"\u003cp >\u003cem >Copyright ©2023. All Rights Reserved BNP Media.\u003c/em>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e2nN7edE7gO","content":{"text":"\u003cp >\u003cstrong >RESOURCES\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8m-hf13_rw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ewifhjATNS4","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ecRt8AVSZpt","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"epJeXHHMOwb","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ejsR_C7F7zP","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"ev86crc_9yg","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eziPieIV_b2","content":{"src":{"key":"Wiy0SNYyh","url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","ratio":1.332},"children":[]},"type":"image","actions":["ev86crc_9yg"],"cl":"image"},{"key":"eaM12KrlHzr","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5XmSU_NgAt","content":{"shapeId":"zyVGqzQPIb","children":[]},"type":"shape","actions":["eaM12KrlHzr"],"cl":"shape"},{"key":"eB07s1draqQ","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ebvPu78QYll","content":{"shapeId":"erJql7HjU","children":[]},"type":"shape","actions":["eB07s1draqQ"],"cl":"shape"},{"key":"e2Himsg6Ild","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKybKBPdwhO","content":{"shapeId":"nxWVNnWZm","children":[]},"type":"shape","actions":["e2Himsg6Ild"],"cl":"shape"},{"key":"ecUnYGt6e3a","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e60ijU3hHgt","content":{"shapeId":"Z5l6xzNGx","children":[]},"type":"shape","actions":["ecUnYGt6e3a"],"cl":"shape"},{"key":"erhqIsFuHdD","content":{"children":[]},"type":"section","children":["eV87aINDMVk","e2nN7edE7gO","e8m-hf13_rw","ewifhjATNS4","ecRt8AVSZpt","epJeXHHMOwb","ejsR_C7F7zP","eziPieIV_b2","e5XmSU_NgAt","ebvPu78QYll","eKybKBPdwhO","e60ijU3hHgt"],"cl":"section"},{"key":"erXjEsRW98p","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eeaN7ordAi7","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ex04RhaVMyC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epeBdQKKVzl","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["erXjEsRW98p","eeaN7ordAi7","ex04RhaVMyC"],"cl":"image"},{"key":"eOUW2tYEpwT","content":{"children":[]},"type":"section","children":["epeBdQKKVzl"],"cl":"section"},{"key":"fixed","visibility":{"eaHl5lW8NJH":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"e6Qifq_f1Q1":{"pdtsTXzV7k2":true},"eOUW2tYEpwT":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"ePmVNIqEDiw":true,"erhqIsFuHdD":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"}},"children":["ePmVNIqEDiw","e6Qifq_f1Q1","eaHl5lW8NJH","erhqIsFuHdD","eOUW2tYEpwT"]}],"pages":[{"key":"p0Un1ptPaNV","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLpwsGgLK6.png","path":"online-contents"},{"key":"p6k2_T8fk4E","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-house-continuing-education"},{"key":"p7XQXvzk8a1","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"ad-house-brivo-infocenter"},{"key":"p8WveKGyZJO","title":"Detecting & Managing Fraud-Feature","desc":"Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bC4cCYGsqO.jpg","path":"detecting-managing-fraud-feature"},{"key":"p8asxhNC7Js","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-house-security-enewsletter"},{"key":"pA6A7KqP4KF","title":"Global News & Analysis-Department","desc":"Common targets of cyberattacks in Q2 2023; security leaders’ role in ensuring public health.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IHgFM_eTPv.jpg","path":"global-news-analysis-department"},{"key":"pA6fb3cLaEX","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vGHEbg2_qE.jpg","path":"advertising-index"},{"key":"pHCw1LUkxdr","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pLiUkAr0Yeq","title":"AD–xxx","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pLiUkAr0Yeq/v/0.jpg","path":"ad-xxx"},{"key":"pMELwnu8xCJ","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNBrVQ35MV.jpg","path":"staff-listing"},{"key":"pNFsGCQa62K","title":"Product Spotlight-Department","desc":"Security magazine highlights emergency and mass communications products for schools, organizations and government systems.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yZro4OBKqv.jpg","path":"product-spotlight-department"},{"key":"pNWtXEzudgY","title":"Education & Training-Column","desc":"The prevalence of active shooter incidents have forced security leaders to rethink their physical security strategies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","path":"education-training-column"},{"key":"pOCZ798jl3P","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tj83G6k2p2.png","path":"ad-amarok"},{"key":"pTJuh0Rd2Sw","title":"Career Intelligence-Column","desc":"Security job openings attract competition from private sector and public sector candidates. What qualities make a successful security leader?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","path":"career-intelligence-column"},{"key":"pUSxmAYzmov","title":"AD–Mobile Comm. America","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T1IRZlrL9t.png","path":"ad-mobile-comm-america"},{"key":"pYsrWx1YYeR","title":"Leadership & Management-Column","desc":"Don’t get “ghosted” — being communicative during the job search process is critical for both the security job seeker and the hiring organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","path":"leadership-management-column"},{"key":"pZv7-zzNSwm","title":"Security Talk-Column","desc":"Discover insights from security executives for proving value & developing partnerships across your organization excerpted from our Solutions by Sector webinars.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QpEUg1GwPh.jpg","path":"security-talk-column"},{"key":"pa7NAZPkku9","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GcnS_1ucs6.png","path":"ad–house-solutions-by-sector"},{"key":"paZpOzXFjLT","title":"Perimeter Security-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QB_keqBPAK.jpg","path":"perimeter-security-feature"},{"key":"pbD0ClsolXt","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pb_IsFqwtDI","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"ad-house-security-bookstore"},{"key":"pdtsTXzV7k2","title":"Strategic Security Management-Special Report","desc":"Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eb259J_VQa.jpg","path":"strategic-security-management-special-report"},{"key":"pfmwYKNSI7D","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pfmwYKNSI7D/v/0.jpg","path":"xxxxxx-column"},{"key":"pgYyu51DpDu","title":"Security Program Design Part 2-Feature","desc":"In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","path":"security-program-design-part-2-feature"},{"key":"ph3hWHT8xZ-","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NB1SostqQt.png","path":"adhouse-security-500-copy"},{"key":"pjqnARLIdYv","title":"AD–Webinar Axis","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/snDssQDUU4.png","path":"ad-webinar-axis"},{"key":"pkYFnV0JOoL","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CRFWW9Du2W.png","path":"ad-dks"},{"key":"pmNBbUhVfqz","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzkGTppKVP.png","path":"ad-altronix"},{"key":"po-qAutG259","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"ad-house-refer-a-friend"},{"key":"ppXUUqUUpJq","title":"Cyber Tactics-Column","desc":"Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/o0aU82VmqZ.jpg","path":"cyber-tactics-column"},{"key":"pq9KKALvWYR","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"psCrsl1SoLZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liAADRz1V_.jpg","path":"table-of-contents"},{"key":"psbWc2vDyc4","title":"Security October 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","path":"","index":true},{"key":"pvjXdec9SnY","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pyiCHi_3RXD","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F41buUXgWJ.jpg","path":"ad-mission-500"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"],"zyVGqzQPIb":[1200,1227,"M714.20,519.30L1160.90,0H1055.00L667.10,450.90L357.30,0H0L468.50,681.80L0,1226.40H105.90L515.50,750.20L842.70,1226.40H1200.00L714.20,519.30V519.30zM569.20,687.80L521.70,619.90L144.00,79.70H306.60L611.40,515.70L658.90,583.60L1055.10,1150.30H892.50L569.20,687.80V687.80z"]},"images":{"6n17seTnEB":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"IKfRqm6_25":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IKfRqm6_25.svg","srcset":[]},"PZDerRPxMS":{"meta":{"width":7254,"height":4576,"description":"Post-it note, Handwriting, Community"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",2560]]},"Qrp0VnaauW":{"meta":{"width":1500,"description":"Flash photography, Nose, Cheek, Skin, Lip, Chin, Outerwear, Eyebrow, Iris, Eyelash","height":2100},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Qrp0VnaauW.jpg",2100]]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","text":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","w3tbowgsq-":"pMdFOsZW1t","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","frame":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/guxiimdiymfzkip82pxbh/SEC_Oct-2023_Full-Issue.pdf?rlkey=owvm2jdlph5hslz3nocdtqdnl&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2","key":"3W6fnCOrUF"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"Security October 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pkYFnV0JOoL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph3hWHT8xZ-"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"WcLdotXQsx"},{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk-Column","key":"zlq1ABs6r8"},{"link":{"mode":0,"page":"pyiCHi_3RXD"},"title":"AD–Mission 500","key":"Cg6IKB3bFr"},{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis-Department","key":"KG0c-hBhTc"},{"link":{"mode":0,"page":"pmNBbUhVfqz"},"title":"AD–Altronix","key":"UvdYwEB6iN"},{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management-Special Report","key":"eKkb0fBsAc"},{"link":{"mode":0,"page":"pUSxmAYzmov"},"title":"AD–MCA","key":"SfdjUv-OyG"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud-Feature","key":"aq6zZXw6UA"},{"link":{"mode":0,"page":"pjqnARLIdYv"},"title":"AD–Webinar Axis","key":"H0go83-HS9"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security-Feature","key":"XxFRpQkDzE"},{"link":{"mode":0,"page":"pOCZ798jl3P"},"title":"AD–Amarok","key":"uZ-cmmY400"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2-Feature","key":"uuJYHR9feO"},{"link":{"mode":0,"page":"pa7NAZPkku9"},"title":"AD–Solutions by Sector","key":"g8kLBk6_D8"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence-Column","key":"wYw1IhZagm"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management-Column","key":"lfJW6NrvNJ"},{"link":{"mode":0,"page":"pb_IsFqwtDI"},"title":"AD–Security Bookstore","key":"frJ4MaVoN-"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics-Column","key":"NRD3E5LYWW"},{"link":{"mode":0,"page":"pvjXdec9SnY"},"title":"AD–Security Renewal","key":"4lyhjJDQYf"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training-Column","key":"s2FwOw2OvW"},{"link":{"mode":0,"page":"p6k2_T8fk4E"},"title":"AD–Continuing Education","key":"zoAPkFyCBJ"},{"link":{"mode":0,"page":"p8asxhNC7Js"},"title":"AD–Security eNewsletter","key":"L3B3DRezZk"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight-Department","key":"3KVWR1Bpdd"},{"link":{"mode":0,"page":"p7XQXvzk8a1"},"title":"AD–Brivo Infocenter","key":"3Lh6mdDnQ_"},{"link":{"mode":0,"page":"po-qAutG259"},"title":"AD–Refer a Friend","key":"coB7Ri6PnC"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"HYMHTNNA19"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"qxO4zI9xJB"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"oXZCj4MViB"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"SWniy0cVqL"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}