[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-17.png” parallax=”on” custom_padding=”10vw||” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ custom_padding=”||1px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
A New Era of Security
[/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Cyberattacks are now more common than ever. These attacks have ability to reach a global scale and result in harm and losses on a huge scale towards an individual as well as a business.
It has become more crucial than ever to be self-aware and protected from as many threats as we can.
On this website I share my journey as a Cybersecurity Consultant and my findings. Stay Tuned for more stuff and enjoy your time being here. Hope you find these things useful.
[/et_pb_text][et_pb_button button_url=”https://samantjaitli.com/blogs/” button_text=”checkout blogs and findings” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-13-3.png” title_text=”cyber-security-13-3″ align=”right” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-8vw|-10vw|0vw|||” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”||0px|||” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-01.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-46vw||-2px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|desktop” _builder_version=”4.16″ max_width=”none” custom_margin=”-10vw||-10vw||true” custom_margin_tablet=”0vw||0vw||true” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”|||20%” custom_padding_tablet=”|||0%” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Security Audits” image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-icon-2.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” global_colors_info=”{}”]
Security Audits are really necessary as they help us identity our biggest anomalies and play a crucial role in making company more secure and protecting them from unknown risks.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}”][et_pb_blurb title=”SIEM and SOAR Solution” image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-icon-18.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
In today’s world where there is abundance of data and incidents happening every minute, a SIEM and a SOAR solution are really important to be able to effectively and effeciently deal against Cyber-Threats. An Example of such solution is Microsoft Azure Sentinel. Check out my Blogs for more information on Azure Sentinel as a SIEM.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-188px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}”][et_pb_blurb title=”Threat Intelligence & Hunting” image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-icon-7.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
Organizations all around the world spend millions of dollars on Cybersecurity. Lots of Threat Intelligence is released by such organizations and it has become dominant to have those feeds in our environment to make sure they are blocked of. Check out below for such threat intellifence feeds in my findings.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/download.jpg” title_text=”download” _builder_version=”4.16″ _module_preset=”default” custom_margin=”292px||||false|false” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”18vw||” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
About
Samant Jaitli
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” global_colors_info=”{}”][/et_pb_divider][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_6,1_6,1_6,1_6,1_6,1_6″ _builder_version=”4.16″ _module_preset=”default” module_alignment=”right” custom_margin=”-23px|auto||auto||” global_colors_info=”{}”][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/microsoft365-enterprise-adminstrator-expert-600×600-1.png” title_text=”microsoft365-enterprise-adminstrator-expert-600×600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/CompTIA_Security_2Bce.png” title_text=”CompTIA_Security_2Bce” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/microsoft365-enterprise-adminstrator-expert-600×600-1.png” title_text=”microsoft365-enterprise-adminstrator-expert-600×600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/CompTIA_Linux_2BLPI.png” title_text=”CompTIA_Linux_2BLPI” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/microsoft365-security-administrator-associate-600×600-1.png” title_text=”microsoft365-security-administrator-associate-600×600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cisco_ccna_R_26S.png” title_text=”cisco_ccna_R_26S” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/azure-security-engineer-associate600x600-1.png” title_text=”azure-security-engineer-associate600x600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/exam-ms100_1-600×600-1.png” title_text=”exam-ms100_1-600×600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/azure-administrator-associate.png” title_text=”azure-administrator-associate” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/exam-az400-600×600-1.png” title_text=”exam-az400-600×600″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”380px||” custom_padding_tablet=”0px||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” background_layout_tablet=”dark” background_layout_phone=”” background_layout_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
What to do when an Incident occurs?
The 6 stages for an Incident Response plan are: Preparation, Identificiation, Containment, Eradication, Recovery and Lessons Learned.
[/et_pb_text][et_pb_button button_url=”https://samantjaitli.com/blogs/” button_text=”Get to know more” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|18px|8px|18px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-14.png” force_fullwidth=”on” _builder_version=”4.16″ animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Testimonial” _builder_version=”4.16″ custom_padding=”65px|0px|138px|0px||” global_colors_info=”{}”][et_pb_row admin_label=”Testimonial Row” _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_blurb title=”%22There are only two types of companies: those that have been hacked, and those that will be%22″ admin_label=”Testimonial” _builder_version=”4.16″ header_level=”h2″ header_font=”Nunito Sans|700|||||||” header_text_color=”#535b7c” header_line_height=”1.4em” body_font=”Nunito Sans|600|||||||” body_text_color=”#959baf” body_font_size=”16px” body_line_height=”1em” background_image=”https://samantjaitli.com/wp-content/uploads/2021/02/quote-bg.png” background_size=”initial” text_orientation=”center” global_colors_info=”{}”]
– Robert Muelier
FBI Director, 2012
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” top_divider_height=”26vw” top_divider_flip=”horizontal” bottom_divider_color=”#dcecff” bottom_divider_height=”30vw” bottom_divider_arrangement=”above_content” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”3_4,1_4″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”3_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Approach
Our Approach to Security and Blogs
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” locked=”off” global_colors_info=”{}”][/et_pb_divider][et_pb_blog fullwidth=”off” _builder_version=”4.19.4″ _module_preset=”default” header_font=”|600|||||||” header_font_size=”18px” body_font=”Nunito Sans||||||||” meta_font_size=”11px” width=”100%” hover_enabled=”0″ global_colors_info=”{}” include_categories=”all” sticky_enabled=”0″][/et_pb_blog][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-10.png” _builder_version=”4.16″ custom_margin=”-20vw|-9vw||||” custom_margin_tablet=”0vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-04-1.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-48vw||-2px” custom_margin_tablet=”-50vw||” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Section” _builder_version=”4.16″ bottom_divider_style=”slant” bottom_divider_color=”#f1fafe” bottom_divider_height=”40vw” bottom_divider_flip=”horizontal” bottom_divider_arrangement=”above_content” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-07-2.png” _builder_version=”4.16″ max_width=”700px” custom_margin=”-40vw|||” custom_margin_tablet=”-45vw|||” custom_margin_phone=”-50vw|||” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3d72e7 0%|#53a0fe 100%” background_color_gradient_start=”#3d72e7″ background_color_gradient_end=”#53a0fe” background_image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Contact Me
[/et_pb_text][et_pb_blurb title=”samantjaitli@gmail.com” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Vancouver, CA” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]
Monday-Friday: 8am – 5pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#53a0fe 0%|#00ffbf 100%” background_color_gradient_start=”#53a0fe” background_color_gradient_end=”#00ffbf” background_image=”https://samantjaitli.com/wp-content/uploads/2021/02/cyber-security-010-1-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Its never too late to get started. Remember- Its not “If something happens, its When it happens”.
[/et_pb_text][et_pb_button button_url=”https://samantjaitli.com/blogs/” button_text=”view blogs and findings” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]