{"id":1220,"date":"2020-08-27T12:57:10","date_gmt":"2020-08-27T12:57:10","guid":{"rendered":"https:\/\/staging4.havemoreinfluence.com\/?page_id=1220"},"modified":"2021-01-22T22:14:59","modified_gmt":"2021-01-22T22:14:59","slug":"home","status":"publish","type":"page","link":"https:\/\/staging4.havemoreinfluence.com\/","title":{"rendered":"Home"},"content":{"rendered":"

[et_pb_section fb_built=”1″ disabled_on=”on|on|off” admin_label=”Header” _builder_version=”4.6.0″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(255,255,255,0.1)” background_color_gradient_end=”#80b1e2″ background_color_gradient_direction=”124deg” background_color_gradient_start_position=”30%” background_color_gradient_end_position=”90%” background_enable_image=”off” background_position=”bottom_center” custom_padding=”5vw||5vw||true|” border_color_all=”#e5b31a”][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”4″ _builder_version=”3.25″ background_size=”contain” background_position=”bottom_center” max_width=”1280px”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”40px|||” custom_padding_tablet=”0vw|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold|800||on|||||” header_text_color=”#000000″ header_font_size=”4.5vw” header_line_height=”1.1em” header_2_font=”Camingos Dos Regular||||||||” custom_margin=”||-5px|||” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_font_size_tablet=”8vw” header_font_size_phone=”10vw” header_font_size_last_edited=”on|phone”]<\/p>\n

Big Breaches<\/h1>\n

Cybersecurity Lessons for Everyone<\/strong><\/h2>\n

 <\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” text_font=”Camingos Dos Regular||||||||” text_font_size=”18px”]<\/p>\n

Discover some of the biggest cybersecurity breaches that have occurred, the history and stories behind them, and a path to recovery.\u00a0\u00a0<\/span><\/p>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/www.amazon.com\/Big-Breaches-Cybersecurity-Lessons-Everyone\/dp\/1484266544″ button_text=”Buy Now” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”#80b1e2″ button_border_width=”0px” button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” custom_margin=”||16px” custom_padding=”18px|40px|18px|40px|true|true”][\/et_pb_button][et_pb_button button_url=”#optin” button_text=”Download the First Chapter” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”rgba(49,209,144,0)” button_border_width=”0px” button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” custom_padding=”16px||16px||true|true” box_shadow_style=”preset4″ box_shadow_horizontal=”0px” box_shadow_vertical=”4px” box_shadow_color=”#000000″ button_bg_color__hover=”#31d190″ button_text_color__hover_enabled=”on” button_text_color__hover=”#31d190″ box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”#31d190″][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/Neil-Daswani_3D.png” title_text=”Neil Daswani_3D” _builder_version=”4.6.0″ max_width=”480px” animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|on” admin_label=”Header” _builder_version=”4.6.0″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(255,255,255,0.1)” background_color_gradient_end=”#80b1e2″ background_color_gradient_direction=”124deg” background_color_gradient_start_position=”30%” background_color_gradient_end_position=”90%” background_enable_image=”off” background_position=”bottom_center” custom_padding=”5vw||5vw||true|” border_color_all=”#e5b31a”][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”4″ _builder_version=”4.6.0″ background_size=”contain” background_position=”bottom_center” max_width=”1280px”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/Neil-Daswani_3D.png” title_text=”Neil Daswani_3D” _builder_version=”4.6.0″ max_width=”480px” animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”40px|||” custom_padding_tablet=”0vw|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold|800||on|||||” header_text_color=”#000000″ header_font_size=”4.5vw” header_line_height=”1.1em” header_2_font=”Camingos Dos Regular||||||||” custom_margin=”||-5px|||” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_font_size_tablet=”8vw” header_font_size_phone=”10vw” header_font_size_last_edited=”on|phone”]<\/p>\n

Big Breaches<\/h1>\n

Cybersecurity Lessons for Everyone<\/strong><\/h2>\n

 <\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” text_font=”Camingos Dos Regular||||||||” text_font_size=”18px”]<\/p>\n

Discover some of the biggest cybersecurity breaches that have occurred, the history and stories behind them, and a path to recovery.\u00a0\u00a0<\/span><\/p>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/www.amazon.com\/Big-Breaches-Cybersecurity-Lessons-Everyone\/dp\/1484266544″ button_text=”Buy Now” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”#80b1e2″ button_border_width=”0px” button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” custom_margin=”||16px” custom_padding=”18px|40px|18px|40px|true|true”][\/et_pb_button][et_pb_button button_url=”#optin” button_text=”Download the First Chapter” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”rgba(49,209,144,0)” button_border_width=”0px” button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” custom_padding=”16px||16px||true|true” box_shadow_style=”preset4″ box_shadow_horizontal=”0px” box_shadow_vertical=”4px” box_shadow_color=”#000000″ button_bg_color__hover=”#31d190″ button_text_color__hover_enabled=”on” button_text_color__hover=”#31d190″ box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”#31d190″][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” admin_label=”Brands” _builder_version=”4.7.7″ custom_padding=”0px||75px|||” custom_padding_tablet=”||0px||false|false” custom_padding_phone=””][et_pb_row _builder_version=”4.7.7″ _module_preset=”default” custom_padding=”82px|||||”][et_pb_column type=”4_4″ _builder_version=”4.7.7″ _module_preset=”default”][et_pb_text _builder_version=”4.7.7″ header_font=”Camingos Dos Regular||||||||” header_2_font=”Bold|800||on|||||” header_2_text_color=”#000000″ header_2_font_size=”60px” header_2_line_height=”1.2em” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” module_alignment=”right” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop” locked=”off”]<\/p>\n

About The Book<\/h2>\n

 <\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.7″ text_font=”Camingos Dos Regular||||||||” text_font_size=”20px” text_line_height=”1.8em” text_orientation=”justified” custom_margin=”-56px|||||” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” locked=”off”]<\/p>\n

The Capital One breach, the Facebook and Cambridge Analytica Hacks, the Marriott Breach, the Office of Personnel Management breaches, the Yahoo breaches, the Equifax breach, and other breaches we cover in this book are some of the worst, most infamous breaches to date.\u00a0 This book covers the key causes of each of these breaches in addition to the 9,000 other reported breaches to date as well as the impact to the political, financial, and social landscapes in the US.<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.7″ text_font=”Camingos Dos Regular||||||||” text_font_size=”20px” text_line_height=”1.8em” text_orientation=”justified” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” locked=”off”]<\/p>\n

Learn why people should enter the cybersecurity field and what they can do to help prevent breaches from happening in the future.\u00a0 George Santayana once said \u201cThose who cannot remember the past are condemned to repeat it.\u201d\u00a0 For those both entering and currently in the field, the first step is to know the biggest breaches of the past, and the next step is to always remember them like the back of their hands to avoid having them repeated.<\/p>\n

[\/et_pb_text][et_pb_text quote_border_weight=”0px” _builder_version=”4.7.7″ text_font=”||||||||” text_text_color=”#80b1e2″ text_font_size=”18px” text_line_height=”1.8em” quote_font=”Bold|700|on||||||” quote_text_align=”right” quote_text_color=”#80b1e2″ quote_font_size=”24px” header_text_color=”#ffffff” custom_margin=”||||false|false” custom_padding=”|30px|||false|false” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” border_color_all=”#000000″ border_width_right=”8px” locked=”off”]<\/p>\n

\n

Those who cannot remember the past are condemned to repeat it.<\/p>\n

 <\/p>\n

-George Santayana\u00a0<\/span><\/p>\n<\/blockquote>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/www.amazon.com\/Big-Breaches-Cybersecurity-Lessons-Everyone\/dp\/1484266544″ button_text=”Get the Book” button_alignment=”right” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”rgba(255,255,255,0)” button_border_width=”2px” button_border_color=”#80b1e2″ button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” custom_padding=”14px|40px|14px|40px|true|true” locked=”off” button_text_color__hover_enabled=”on|hover” button_text_color__hover=”#80b1e2″][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|off” admin_label=”About” _builder_version=”4.7.7″ custom_padding=”1px||5px|||”][\/et_pb_section][et_pb_section fb_built=”1″ specialty=”on” admin_label=”What’s Inside” _builder_version=”3.22.7″ custom_padding=”43px|||||”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.7″ text_font=”Camingos Dos Regular|600|||||||” text_line_height=”1.8em” header_font=”Camingos Dos Regular||||||||” header_4_font=”Bold|800|||||||” header_4_text_color=”#000000″ header_4_font_size=”40px” header_4_line_height=”1.2em” background_color=”#ffffff” use_background_color_gradient=”on” background_color_gradient_start=”#ffffff” background_color_gradient_end=”#f2f2f2″ background_color_gradient_start_position=”45%” module_alignment=”right” max_height=”800px” overflow-y=”scroll” custom_margin=”-200px||||false|false” custom_margin_tablet=”-5vw|||0vw” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”80px|50px|80px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”20px|10px|20px|10px|true|true” custom_padding_last_edited=”on|tablet” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”off|desktop” header_4_font_size_tablet=”30px” header_4_font_size_phone=”20px” header_4_font_size_last_edited=”on|phone” border_radii=”on|30px|30px|30px|30px” border_width_all=”3vw” border_color_all=”#f2f2f2″ box_shadow_style=”preset3″ box_shadow_vertical=”80px” box_shadow_blur=”80px” box_shadow_spread=”-30px” locked=”off”]<\/p>\n

WHY THIS BOOK MATTERS<\/strong><\/h1>\n

An investment of over $45 billion dollars has been made in cybersecurity over the past 15 years, yet breaches continue. As of 2020, there are more than 500,000 unfilled cybersecurity jobs in the US alone with less than one million professionals employed in the field, yielding a negative employment rate of over 50%. We desperately need more people to enter the cybersecurity field, and we also need to aggressively automate away some of the most basic, entry-level positions in the field by leveraging the power of artificial intelligence and cloud computing.<\/p>\n

You do not have to be a deep technologist to get involved in cybersecurity. Cybersecurity is a field in which you need to be multi-disciplinary to be successful. This book will provide you with a solid understanding of how phishing, malware, software vulnerabilities, third-party compromise and abuse, unencrypted data, and inadvertent employee mistakes have resulted in a significant negative business and political impact.<\/p>\n

Lessons learned are provided along with a blueprint for how people can enter the field and help starting at the board level down to entry-level information security analysts.\u00a0 Whether entering the field as a beginner, or as an existing technology or business professional, you can help defend against the nation-state and organized cybercriminal attacks that will target your organization.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.7.7″ custom_margin=”-134px|||||” custom_margin_tablet=”0px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”59px||0px|||”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ header_font=”||||||||” header_2_font=”Bold|800||on|||||” header_2_text_color=”#000000″ header_2_font_size=”60px” header_2_line_height=”1.2em” module_alignment=”right” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop” locked=”off”]<\/p>\n

you’ll learn:<\/h2>\n

[\/et_pb_text][et_pb_divider color=”rgba(0,0,0,0.06)” divider_weight=”3px” _builder_version=”3.22.7″ transform_translate=”10vw|0px” transform_translate_linked=”off” custom_margin=”|||”][\/et_pb_divider][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=”1_2,1_2″ _builder_version=”4.6.0″][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”Important data breaches” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off”]<\/p>\n

and their lasting impact<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”The 7 habits of highly effective security” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off” locked=”off”]<\/p>\n

and how to apply them<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”The best areas to learn in cybersecurity” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off” locked=”off”]<\/p>\n

in order to make a real difference<\/p>\n

[\/et_pb_blurb][\/et_pb_column_inner][et_pb_column_inner type=”1_2″ saved_specialty_column_type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”3 key meta-level causes” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off”]<\/p>\n

and 6 key technical issues seen in breaches<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”Effective detection and prevention countermeasures” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off” locked=”off”]<\/p>\n

for organizations and consumers<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”How to start a journey in cybersecurity” use_icon=”on” font_icon=”%%61%%” icon_color=”#80b1e2″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”32px” _builder_version=”4.6.0″ header_font=”Bold|700|||||||” header_font_size=”16px” header_line_height=”1.4em” body_font=”Bold|700|||||||” body_line_height=”1.5em” animation=”off” locked=”off”]<\/p>\n

and how to apply real world advice from the pros<\/p>\n

[\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Testimonials” _builder_version=”3.22.7″ custom_padding=”0px||100px|||”][et_pb_row _builder_version=”4.7.7″ background_color=”#000000″ width_tablet=”94%” width_phone=”” width_last_edited=”on|desktop” max_width=”2560px” module_alignment=”left” custom_padding=”70px||0px|||”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/output-onlinepngtools-15.png” title_text=”output-onlinepngtools (15)” align=”center” _builder_version=”4.6.0″ width=”50px” animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][et_pb_slider _builder_version=”4.7.7″ header_level=”h4″ header_font=”Bold|700|||||||” header_font_size=”26px” header_line_height=”1.6em” body_font=”Bold|700|||||||” body_text_color=”#31d190″ background_color=”rgba(255,255,255,0)” custom_padding=”0px||115px|||” hover_enabled=”0″ header_font_size_tablet=”20px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” sticky_enabled=”0″][et_pb_slide heading=”This book uses previous failures in computer security to teach useful lessons in preventing them in the future.” _builder_version=”4.7.7″ header_level=”h4″ body_text_color=”#80b1e2″ hover_enabled=”0″ sticky_transition=”on” sticky_enabled=”0″]<\/p>\n

\n
\n
Andy Steingruebl, Chief Security Officer at Pinterest<\/span><\/div>\n<\/div>\n<\/div>\n

[\/et_pb_slide][\/et_pb_slider][et_pb_button button_url=”https:\/\/www.amazon.com\/Big-Breaches-Cybersecurity-Lessons-Everyone\/dp\/1484266544″ button_text=”Buy Now” button_alignment=”right” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_bg_color=”#000000″ button_border_width=”0px” button_border_radius=”0px” button_font=”Bold|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”||-67px” custom_padding=”20px|40px|20px|40px|true|true” locked=”off” button_bg_color__hover=”#80b1e2″ button_bg_color__hover_enabled=”on|hover” button_bg_enable_color__hover=”on”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|off” admin_label=”Call To Action” module_id=”contact” _builder_version=”4.7.7″ background_color=”#80b1e2″ transform_translate=”-10px|0px” transform_translate_linked=”off” width=”93%” module_alignment=”right” custom_margin=”||6vw|||” custom_margin_tablet=”||20vw|” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”||72px|||” border_color_all=”#000000″ border_width_right=”6vw” border_color_right=”#ffffff” box_shadow_style=”preset4″ box_shadow_vertical=”0px” box_shadow_color=”#000000″ global_module=”1637″][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.6.0″][et_pb_column type=”3_5″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2020\/11\/author-icon-03-2.png” align=”center” _builder_version=”3.23″ animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][et_pb_text _builder_version=”4.6.0″ text_font=”Camingos Dos Regular||||||||” text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold||||||||” header_2_font=”Bold|800||on|||||” header_2_font_size=”60px” header_2_line_height=”1.2em” header_3_font=”Bold|700|||||||” header_3_font_size=”16px” header_3_line_height=”1.4em” text_orientation=”center” background_layout=”dark” module_alignment=”right” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop”]<\/p>\n

Big Breaches: Cybersecurity Lessons for Everyone<\/h3>\n

Get in Touch<\/h2>\n

Interested in understanding what cybersecurity is all about, what failures have taken place in the field to date, and how they could have been avoided? This is the book for you. Questions? Contact us below.<\/p>\n

[\/et_pb_text][et_pb_contact_form captcha=”off” _builder_version=”4.7.7″ _module_preset=”default” custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#000000″ button_border_color=”#000000″ button_font=”Camingos Dos Regular||||||||”][et_pb_contact_field field_id=”Name” field_title=”Name” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address” field_type=”email” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.6.0″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/Neil-Daswani_3D.png” title_text=”Neil Daswani_3D” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” disabled_on=”on|on|off” _builder_version=”4.6.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”||-180px” custom_padding=”|||” animation_direction=”bottom”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” admin_label=”Footer” module_id=”optin” _builder_version=”4.7.7″ background_color=”#000000″ background_color_gradient_direction=”240deg” background_enable_image=”off” background_size=”contain” background_position=”top_center” custom_margin=”||” custom_padding=”1vw||4vw||false|” custom_padding_tablet=”0vw||4vw||false|” custom_padding_phone=”1vw||4vw||false|” global_module=”1636″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ max_width=”80%” custom_padding=”42px|||||”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”Camingos Dos Regular||||||||” text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold||||||||” header_2_font=”Bold|800||on|||||” header_2_font_size=”2vw” header_2_line_height=”1.2em” header_3_font=”Bold|700|||||||” header_3_font_size=”16px” header_3_line_height=”1.4em” background_layout=”dark” module_alignment=”right” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”8vw” header_2_font_size_last_edited=”on|phone”]<\/p>\n

get a free book chapter.<\/h2>\n

Subscribe to the mailing list to get the entire first chapter of Big Breaches: Cybersecurity Lessons for Everyone\u00a0<\/em>delivered to your inbox, absolutely free!<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_signup mailchimp_list=”elegantthemestest|b373b2459d” first_name_field=”off” last_name_field=”off” _builder_version=”4.6.0″ form_field_font=”||||||||” form_field_line_height=”1.8em” use_background_color=”off” custom_button=”on” button_text_size=”16px” button_text_color=”#ffffff” button_bg_color=”#80b1e2″ button_border_width=”10px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”0px” button_font=”Montserrat|700|||||||” button_use_icon=”off” border_radii_fields=”on|0px|0px|0px|0px”][\/et_pb_signup][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

[et_pb_section fb_built=”1″ disabled_on=”on|on|off” admin_label=”Header” _builder_version=”4.6.0″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(255,255,255,0.1)” background_color_gradient_end=”#80b1e2″ background_color_gradient_direction=”124deg” background_color_gradient_start_position=”30%” background_color_gradient_end_position=”90%” background_enable_image=”off” background_position=”bottom_center” custom_padding=”5vw||5vw||true|” border_color_all=”#e5b31a”][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”4″ _builder_version=”3.25″ background_size=”contain” background_position=”bottom_center” max_width=”1280px”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”40px|||” custom_padding_tablet=”0vw|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold|800||on|||||” header_text_color=”#000000″ header_font_size=”4.5vw” header_line_height=”1.1em” header_2_font=”Camingos Dos Regular||||||||” custom_margin=”||-5px|||” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_font_size_tablet=”8vw” header_font_size_phone=”10vw” header_font_size_last_edited=”on|phone”] Big Breaches Cybersecurity Lessons for Everyone […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1220"}],"collection":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/comments?post=1220"}],"version-history":[{"count":52,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1220\/revisions"}],"predecessor-version":[{"id":1766,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1220\/revisions\/1766"}],"wp:attachment":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/media?parent=1220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}