@media(max-width: 480px){.global-cybersecurity-practices-2024 [class^=btn-]{font-size:16px}}.global-cybersecurity-practices-2024 .wrapper{padding-top:0}.global-cybersecurity-practices-2024 .main .intro{max-width:100%;overflow:hidden;background:#000 url("/assets/images/pages/global-cybersecurity-practices-2024/globe-background-desktop@2x.webp") no-repeat center/contain}@media(max-width: 1200px){.global-cybersecurity-practices-2024 .main .intro{background-image:url("/assets/images/pages/global-cybersecurity-practices-2024/globe-background-desktop.webp")}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro{background:#000 url("/assets/images/pages/global-cybersecurity-practices-2024/globe-background-mobile@2x.webp") no-repeat center bottom/contain;padding-bottom:80%;padding-top:64px}}@media(max-width: 640px){.global-cybersecurity-practices-2024 .main .intro{padding-top:0}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro{background-image:url("/assets/images/pages/global-cybersecurity-practices-2024/globe-background-mobile.webp")}}.global-cybersecurity-practices-2024 .main .intro .container{display:flex;flex-flow:row nowrap;justify-content:space-between;align-items:stretch;gap:20px}.global-cybersecurity-practices-2024 .main .intro .container:before,.global-cybersecurity-practices-2024 .main .intro .container:after{display:none}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro .container{flex-flow:column nowrap;align-items:center;justify-content:center}}.global-cybersecurity-practices-2024 .main .intro .intro-content{display:flex;flex-flow:column nowrap;justify-content:center;align-items:flex-start;width:50%;margin-left:50%;max-width:640px;padding:128px 16px 56px}@media(max-width: 1080px){.global-cybersecurity-practices-2024 .main .intro .intro-content{width:60%;margin-left:40%}}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main .intro .intro-content{width:70%;margin-left:30%}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro .intro-content{width:100%;max-width:100%;margin:0;order:1;padding:48px 16px}}@media(max-width: 640px){.global-cybersecurity-practices-2024 .main .intro .intro-content{padding:114px 16px 48px}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content{padding:96px 16px 40px}}.global-cybersecurity-practices-2024 .main .intro .intro-content .preHeading{font-weight:600;color:#ffc700;margin:0 0 8px;font-size:22px;width:100%}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main .intro .intro-content .preHeading{font-size:20px}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro .intro-content .preHeading{font-size:18px}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content .preHeading{font-size:16px;text-align:center}}.global-cybersecurity-practices-2024 .main .intro .intro-content h1{color:#fff;width:100%}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro .intro-content h1{text-align:center}}@media(max-width: 640px){.global-cybersecurity-practices-2024 .main .intro .intro-content h1{text-align:start}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content h1{text-align:center}}.global-cybersecurity-practices-2024 .main .intro .intro-content p{color:#fff}@media(max-width: 640px){.global-cybersecurity-practices-2024 .main .intro .intro-content p{font-size:20px;text-align:start}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content p{text-align:center}}.global-cybersecurity-practices-2024 .main .intro .intro-content .actions{display:none}.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component]{width:100%;margin-top:32px}.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] [class^=btn-]{height:48px}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] [class^=btn-]{min-width:auto}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] [class^=btn-]{min-width:100%}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .colMobileHalfMinus,.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .colMobileHalfPlus{width:100%}}.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .terms-notice,.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .terms-notice-checkbox{width:100%;text-align:start}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .terms-notice,.global-cybersecurity-practices-2024 .main .intro .intro-content [data-react-component] .terms-notice-checkbox{text-align:center}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways{background:#000;padding:56px 0}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways{padding:48px 0}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways{padding:40px 0}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways{padding:32px 0}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2{color:#fff;text-align:center;margin-bottom:24px}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p{color:#fff;text-align:center;max-width:1150px;width:100%;margin:0 auto 68px}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p{margin-bottom:57px}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p{margin-bottom:48px}}@media(max-width: 640px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p{margin-bottom:40px}}@media(max-width: 480px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p{margin-bottom:32px}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways h2+p em{font-style:italic;font-weight:500}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways{display:flex;flex-flow:row nowrap;justify-content:center;align-items:stretch;gap:56px 10%;width:100%;margin:0 auto;color:#fff}@media(max-width: 1200px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways{gap:56px 48px}}@media(max-width: 991px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways{gap:48px}}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways{gap:32px;flex-flow:column nowrap;align-items:center}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span{display:flex;flex-flow:column nowrap;justify-content:space-between;align-items:center;width:33%;text-align:center;padding:110px 0 0;position:relative}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span{width:480px;max-width:100%}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span.unifiedPlatform{background:url("/assets/images/pages/global-cybersecurity-practices-2024/1-high-low.svg") no-repeat center top/84px}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span.pamSolution{background:url("/assets/images/pages/global-cybersecurity-practices-2024/2-password-threat.svg") no-repeat center top/84px}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span.tooComplex{background:url("/assets/images/pages/global-cybersecurity-practices-2024/3-concern-passwords.svg") no-repeat center top/84px}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span h3{font-size:28px}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span p.finding{margin-top:32px;text-align:center;width:100%}@media(max-width: 768px){.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span p.finding{position:relative;margin-top:16px}}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .theTakeaways span p.finding strong{color:#ffc700}.global-cybersecurity-practices-2024 .main #fourKeyTakeaways .actions{width:100%;margin:56px 0 0;text-align:center}

/*# sourceMappingURL=index.min.css.map*/