[et_pb_section fb_built=”1″ make_equal=”on” specialty=”on” admin_label=”Section” _builder_version=”4.17.4″ _module_preset=”default” custom_css_main_element=”align-items:center;” global_colors_info=”{}”][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text module_class=”h2-heading-responsive” _builder_version=”4.20.0″ _module_preset=”default” header_2_font=”|600|||||||” header_2_font_size=”24px” background_size=”contain” background_position=”bottom_right” custom_padding=”30px||30px||true|false” hover_enabled=”0″ global_colors_info=”{}” background_enable_image=”off” sticky_enabled=”0″]
EBOOK
What You Can Do
Today to Make an
Impact on
Cybersecurity
Asset Management
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.1″ _module_preset=”default” custom_margin=”||13px|||” global_colors_info=”{}”]
What you learn in this E-Book:
[/et_pb_text][dsm_icon_list icon_background_color=”#0066ff” list_space_between=”10px” text_indent=”15px” _builder_version=”4.17.4″ _module_preset=”default” text_text_color=”#000000″ border_radii_icon=”on|100px|100px|100px|100px” global_colors_info=”{}”][dsm_icon_list_child text=”How to identify all of your assets by asking the right questions.” font_icon=”R||divi||400″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][/dsm_icon_list_child][dsm_icon_list_child text=”Which techniques and approaches can help protect the identified assets.” font_icon=”R||divi||400″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][/dsm_icon_list_child][dsm_icon_list_child text=”Why detecting threats before they happen will prevent cybersecurity disaster.” font_icon=”R||divi||400″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][/dsm_icon_list_child][dsm_icon_list_child text=”Which policies and procedures should be in place to ensure proper response once a threat is detected” font_icon=”R||divi||400″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][/dsm_icon_list_child][/dsm_icon_list][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” custom_margin=”-17px|||||” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”]Learn more about Lucidum[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_2″ admin_label=”Column” _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_code _builder_version=”4.20.0″ _module_preset=”default” global_colors_info=”{}”][/et_pb_code][et_pb_text _builder_version=”4.17.4″ _module_preset=”94ade72d-5497-4960-87be-c594036e5cd2″ text_font=”Source Sans Pro|300|||||||” text_font_size=”15px” global_colors_info=”{}”]
By completing this form, you agree to let Lucidum use your email to contact you for the purposes of scheduling a demo and marketing.
[/et_pb_text][/et_pb_column][/et_pb_section]