{"id":2882,"date":"2020-01-02T10:50:50","date_gmt":"2020-01-02T10:50:50","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=2882"},"modified":"2020-01-06T06:21:48","modified_gmt":"2020-01-06T06:21:48","slug":"security-awareness-services","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/security-awareness-services\/","title":{"rendered":"Security Awareness Services"},"content":{"rendered":"<div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1578048131647 vc_row-has-fill un-row-full-width\"><div class=\"container-fluid\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2 class=\"vc_custom_heading\" style=\"font-size: 25px; text-align: left; font-family: Poppins, Arial, sans-serif; font-weight: 400; font-style: normal;\">Tailor-made security awareness and training programs for leading<br \/>\norganizations, complemented by effective training delivery methods<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1578045604088\" >THE SECURITY AWARENESS CHALLENGE<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1577973552388\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #009bde;\">\u201cA top-level training program will empower<br \/>\nyour teams to become ambassadors for effective cyber activity, and help create a secure environment for all stakeholders. It&#8217;s more than a smart investment. It&#8217;s smart decision-making.\u201d<\/span><\/p>\n<p><span style=\"color: #009bde;\"><strong>Chen Heffer, CyTech Founder &amp; CEO<\/strong><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577972622811\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1578047582175\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img fetchpriority=\"high\" decoding=\"async\" width=\"717\" height=\"305\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5.png 717w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-300x128.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-410x174.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-570x242.png 570w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972480372 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1578045751660\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">The fast evolution of the cybersecurity landscape requires security training and awareness programs that are frequently updated and improved.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1578047608055\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-6-370x151.png\" width=\"370\" height=\"151\" alt=\"Page-1-Image-6\" title=\"Page-1-Image-6\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972472099 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1578045777595\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Security awareness training programs often fail to engage end users. Lack of engagement can lead to low knowledge retention levels.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1578047627065\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"717\" height=\"304\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7.png 717w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-300x127.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-410x174.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-570x242.png 570w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972460988 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1578045812434\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Irrelevant or outdated training content does not properly prepare your end users to effectively defend the organization against security threats.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1578045849428\" >OUR SECURITY AWARENESS SERVICES<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-center vc_custom_1578287020151\" >\n\t<a onmouseleave=\"this.style.borderColor='#222222'; this.style.backgroundColor='transparent'; this.style.color='#222222'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#222222; color:#222222;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Security_Awareness_Services.pdf\" title=\"\" target=\"_blank\">View or Download Brochure<\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578026760812 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Developing Your Training Program<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We will create or mature a security awareness and training program that is tailored to your organization. The program can include the following:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 52px\" ><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li>Physical Computer Security<\/li>\n<li>Cyber Attacks<\/li>\n<li>Incident Response<\/li>\n<li>Mobile Security<\/li>\n<li>Passwords<\/li>\n<li>Phishing<\/li>\n<li>Social Engineering<\/li>\n<li>Web Usage<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Designing an Effective Training Delivery Plan<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We will develop methods for training delivery and will select the most effective solutions for your organization. Methods of training delivery can include:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 22px\" ><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li>Information Security Awareness and Training Policy<\/li>\n<li>Security Awareness and Training Gamification<\/li>\n<li>Mock Spear Phishing Email<\/li>\n<li>Security Awareness and Training Module Builder and Training<br \/>\nSchedule<\/li>\n<li>Security Training Campaign Development<\/li>\n<li>Security Training Program Manual<\/li>\n<li>Security Awareness and Training Feedback<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1578048189604 vc_row-has-fill un-row-full-width\"><div class=\"container-fluid\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"340\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-10.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-10.png 725w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-10-300x141.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-10-410x192.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-10-570x267.png 570w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading vc_custom_1578047876369\" >THE CYTECH APPROACH<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1578047772917\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We are firm believers in the two main principles of effective cyber security management:<b> Communication and Collaboration. <\/b>We work with CISOs and senior management to create a security awareness and training program that will transform all personnel into secret organizational security<br \/>\nweapons.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_30 vc_sep_border_width_8 vc_sep_pos_align_left vc_separator_no_text vc_sep_color_orange\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1578047196895\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"340\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-9.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-9.png 725w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-9-300x141.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-9-410x192.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-9-570x267.png 570w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading vc_custom_1578047946917\" >CRITICAL INSIGHT<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1578047783856\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>One-time, annual training is no longer enough for creating an effective security awareness and training program. By presenting security as an individualized issue, personal focus becomes a driver for the effective implementation of your organizational security awareness and training program.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_30 vc_sep_border_width_8 vc_sep_pos_align_left vc_separator_no_text vc_sep_color_green\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"346\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-11-1.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-11-1.png 740w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-11-1-300x140.png 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-11-1-410x192.png 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-2-Image-11-1-570x267.png 570w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading vc_custom_1578047955101\" >IMPACT AND RESULTS<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We believe in delivering smaller amounts of information on a more frequent basis, in order to minimize effort, reduce end- user training fatigue, and improve content relevance. We recommend evaluating and improving your security awareness and training program continuously to keep content up to date. We also advocate leveraging end-user feedback to ensure content relevance for recipients.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1578046934400\" >ABOUT CYTECH<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578027656565\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>CyTech is a unique one-stop-shop for CISOs. As a professional consulting firm, we partner with our clients to support their business goals and help create a secure and innovative cyber environment. We are always aware of technological advancements, and are not affiliated with any vendors.<\/p>\n<p>Our consultants are all internationally certified, globally experienced and highly skilled in both business and cyber security. By improving decision-making and leveraging business insight, we help transform compliance efforts into a major competitive advantage.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578291702783\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class='delaware-section-title  delaware_title-type-2 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-12 text-center title no-underline' style='font-size:36px;'>CONNECT WITH US<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-12 text-center desc\"><div style=\"color: #222; font-size: 18px;\">Please fill out the form and send us a message. We will get back to you within 1-3 business days.<\/div>\n<\/div> \r\n\t\t\t<\/div><div class=\"dl-contact-form-7 form-light\" style=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1168-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1168\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/am\/wp-json\/wp\/v2\/pages\/2882#wpcf7-f1168-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/am\/wp-json\/wp\/v2\/pages\/2882#wpcf7-f1168-o1\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1168\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1168-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"dl-form dl-form-2\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number*\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-445\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-445\"><\/textarea><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Now\" \/>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"am\"\/><\/form>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Tailor-made security awareness and training programs for leading organizations, complemented by effective training delivery methods THE SECURITY AWARENESS CHALLENGE \u201cA top-level training program will empower your teams to become ambassadors [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2882","page","type-page","status-publish","hentry","no-thumb"],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=2882"}],"version-history":[{"count":25,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2882\/revisions"}],"predecessor-version":[{"id":3258,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2882\/revisions\/3258"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=2882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}