@media (max-width:480px){.us-cybersecurity-census-report-2022 [class^=btn-]{font-size:16px}}.us-cybersecurity-census-report-2022 .wrapper{padding-top:0}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro{max-width:100%;overflow:hidden;background:#000}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro{padding-top:96px}}@media (max-width:640px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro{padding-top:0}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .container{display:flex;flex-flow:row nowrap;justify-content:space-between;align-items:stretch;gap:20px}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .container:after,.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .container:before{display:none}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .container{flex-flow:column nowrap;align-items:center;justify-content:center}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-image{width:50%;max-width:500px;padding:100px 0 48px}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-image{width:100%;height:auto;order:2;padding:0 0 48px}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{display:flex;flex-flow:column nowrap;justify-content:center;align-items:flex-start;width:50%;padding:128px 16px}@media (max-width:1080px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{width:60%}}@media (max-width:991px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{width:70%}}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{width:100%;max-width:100%;order:1;padding:48px 16px}}@media (max-width:640px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{padding:128px 16px 48px}}@media (max-width:480px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content{padding:128px 16px 40px}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content h1{color:#fff;width:100%}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content h1{text-align:center}}@media (max-width:640px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content h1{text-align:left}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content p{color:#fff}@media (max-width:640px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content p{font-size:20px;text-align:left}}@media (max-width:991px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] .intro .intro-content .actions{justify-content:center}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways{background:#fff;padding:72px 0}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box{padding:48px 178px}@media (max-width:1440px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box{padding:48px 120px}}@media (max-width:1400px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box{padding:48px 96px}}@media (max-width:1200px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box{padding:48px}}@media (max-width:1100px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box{padding:48px 36px}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .box+p{text-align:center;max-width:1200px;width:100%;margin:72px auto 0}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways h2{text-align:center;margin-bottom:40px}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways h2{display:none}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways{display:flex;flex-flow:row wrap;justify-content:center;align-items:stretch;gap:56px 120px;width:100%;margin:0 auto}@media (max-width:1200px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways{gap:56px 48px}}@media (max-width:991px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways{gap:48px}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span{display:flex;flex-flow:column nowrap;justify-content:flex-start;align-items:center;width:calc(50% - 60px);text-align:center;padding-top:60px;padding-bottom:120px;position:relative}@media (max-width:1440px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span{padding-bottom:140px}}@media (max-width:1200px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span{padding-bottom:160px}}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span{width:480px;max-width:100%;padding-bottom:0}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span.attacks{background:url("/assets/images/pages/reports/cybersecurity-census-report-2022/impact.svg") no-repeat center top/40px}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span.investments{background:url("/assets/images/pages/reports/cybersecurity-census-report-2022/invest-tools.svg") no-repeat center top/40px}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span.leadership{background:url("/assets/images/pages/reports/cybersecurity-census-report-2022/leadership.svg") no-repeat center top/40px}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span.culture{background:url("/assets/images/pages/reports/cybersecurity-census-report-2022/company-culture.svg") no-repeat center top/40px}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span p.finding{padding:16px 24px;background:#f0f0f0;margin-top:48px;border-radius:8px;display:block;width:100%;position:absolute;left:0;bottom:0}@media (max-width:768px){.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .theTakeaways span p.finding{position:relative}}.us-cybersecurity-census-report-2022 .main[view=USCybersecurityCensus2022] #fourKeyTakeaways .actions{width:100%;margin-top:72px;text-align:center}