{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/iW1nyIkeS0afTDSJYfPk/h5JG5nNKE9YfIHGH9uIq/m3OG29zGk-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as i}from\"framer\";import{motion as a}from\"framer-motion\";import*as n from\"react\";export const richText=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Date:\"}),\" Thursday, June 26, 2025\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Time:\"}),\" 11:00 am PT/ 2:00 pm ET  \"]}),/*#__PURE__*/e(\"p\",{children:\"Are you actively trying to gain better visibility and detection from your environment? Join us virtually for a live demo of the Panther platform.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"In this session, a Panther expert will walk you through:\"})}),/*#__PURE__*/t(\"ul\",{className:\"text-styles-preset-reset\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:[/*#__PURE__*/e(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:/*#__PURE__*/e(\"p\",{children:\"Setting up a log source in minutes, not days\"})}),/*#__PURE__*/e(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:/*#__PURE__*/e(\"p\",{children:\"Creating detections and triggering alerts with ease\"})}),/*#__PURE__*/t(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:[/*#__PURE__*/t(\"p\",{children:[\"Exploring new and upcoming \",/*#__PURE__*/e(\"strong\",{children:\"Panther AI\"}),\" features\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/t(\"p\",{children:[\"Discover how Panther can help you accelerate your time to value\u2014\",/*#__PURE__*/e(\"strong\",{children:\"register now to save your spot!\"})]})]});export const richText1=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"We're excited to announce Matt Jezorek as Panther's new VP of Product and Security! Join us for a conversation led by Paul Clarke, Head of Security & Trust at Canva, who worked for Matt at Amazon.\\xa0 Together, Paul and Matt will explore how Matt\u2019s past life experiences have shaped his views on security, why he believes security is ultimately a human problem, and his plans for Panther's future.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"In this conversation, you'll hear about:\"})}),/*#__PURE__*/t(\"ul\",{className:\"text-styles-preset-reset\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:[/*#__PURE__*/e(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:/*#__PURE__*/e(\"p\",{children:\"Matt's journey from Security Engineer to leading the elite Blue Team at Amazon and the incidents he oversaw\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Real security challenges Matt faced in the field and how those experiences will influence Panther's evolution\"})}),/*#__PURE__*/e(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:/*#__PURE__*/e(\"p\",{children:\"The story behind Matt's decision to choose Panther for his previous team and why he believed in the product enough to join us\"})}),/*#__PURE__*/e(\"li\",{className:\"text-styles-preset-reset\",\"data-preset-tag\":\"p\",\"data-styles-preset\":\"reset\",style:{\"--font-selector\":\"Q1VTVE9NO0dUIFBsYW5hciBMaWdodA==\"},children:/*#__PURE__*/e(\"p\",{children:\"Where Matt sees Panther heading next - his honest take on our strengths, opportunities, and the roadmap ahead\"})})]})]});export const richText2=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:'\"With Panther, LaunchDarkly can easily and seamlessly monitor our critical data in Snowflake.\" '})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Patrick Kaeding, Staff Security Engineer at LaunchDarkly\"})}),/*#__PURE__*/e(\"p\",{children:\"Organizations centralize mission-critical information in Snowflake, from financial records to customer data to AI training sets. Without proper security monitoring, this creates dangerous blind spots against data theft and credential compromise.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Security teams need robust solutions that seamlessly integrate Snowflake's rich context into their broader monitoring strategy. Unifying security data enables event correlation, which creates targeted detections that deliver high-fidelity, actionable alerts. \"}),/*#__PURE__*/e(\"p\",{children:\"Patrick from LaunchDarkly will walk you through how the integration fits seamlessly into their broader security monitoring strategy and enhances their ability to detect and respond to threats.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch now to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn how to gain complete visibility into your Snowflake environments with seamless security monitoring\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand how you can detect suspicious activity to protect your critical data assets with streaming analysis\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Discover how to strengthen audit capabilities with comprehensive visibility across all Snowflake accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Hear from security leaders at LaunchDarkly, Snowflake, and Panther about practical approaches to data lake security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"See a live demonstration of monitoring capabilities for your Snowflake accounts\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Speakers: \"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Peter Horrigan, Applied Field Engineering at Snowflake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Patrick Kaeding, Staff Security Engineer at LaunchDarkly \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ariel Ropek, Principal Threat Researcher at Panther\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Jon Massari, Solutions Engineer at Panther\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText3=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Join us to see how leading security teams leverage Wiz\u2019s deep visibility into cloud security posture directly within Panther\u2019s detection, correlation, and alerting workflows. We\u2019ll explore how the integration provides Panther customers another critical layer of cloud visibility and context for faster, more informed decisions around incident severity and response actions.\"}),/*#__PURE__*/e(\"p\",{children:\"Throughout the webinar, Wiz Senior Security Engineer James Cleverley-Prance and other leading security practitioners will discuss how the integration unifies context around assets, configurations, and security findings to enhance their teams\u2019 ability to detect and respond at enterprise scale.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch the on-demand webinar to get an in-depth look at how Panther\u2019s Wiz integration helps cloud-native security teams:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Streamline investigation and response processes without requiring switching views between multiple tools\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ingest policy violation alerts from Wiz alongside data stored in Panther from EDR solutions, network sensors, and cloud infrastructure logs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze critical context from Wiz on cloud asset security findings, compliance status, risk exposure, and admin longs\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Correlate security signals across their entire cloud security stack with Python-based detection rules\"})})]})]});export const richText4=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Join us in exploring the what, why, and how of \",/*#__PURE__*/e(\"strong\",{children:\"PantherFlow\"}),\", our powerful, intuitive piped query language.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, we discuss PantherFlow\u2019s design, key features, focus use cases, and functional benefits. You\u2019ll leave with an understanding of how PantherFlow uses familiar interfaces and workflows to unlock threat detection at scale across modern security data lakes.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Our Director of Product Management, Casey Hill, reviews how PantherFlow pushes Panther\u2019s product vision forward, reinforcing our cloud-native, code-driven approach that enables more efficient workflows and better security outcomes.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Our Staff Backend Software Engineer, Doug Miller, illuminates how PantherFlow simplifies operations for everyone, from entry-level analysts to SQL experts.\"}),/*#__PURE__*/e(\"p\",{children:\"We also showcase a specific threat hunting scenario. Our Principal Threat Researcher, Ariel Ropek, uses PantherFlow to investigate an incident involving an account compromise and secrets exfiltration.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch now to learn how PantherFlow can accelerate investigations and analysis for your org. We cover:\\xa0\\xa0\\xa0\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How PantherFlow delivers a more approachable search experience without sacrificing the power and flexibility of SQL\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How to build PantherFlow queries using bite-sized, easy-to-understand chunks so you can quickly find the answers you need\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How PantherFlow accelerates investigation and response for a threat scenario involving account compromise, lateral movement, privilege escalation, and secrets exfiltration\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How PantherFlow will evolve to cover visualizations and additional monitoring use cases, while reinforcing our DaC framework\u2019s testing, peer review, and automation benefits so customers can continue delivering high-performance programs\"})})]})]});export const richText5=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Learn to transform noisy cloud logs into security signals with Panther\u2019s code-driven detection and response, at petabyte scale\u2013without the overhead and cost of traditional SIEMs.\"}),/*#__PURE__*/e(\"p\",{children:\"Join this in-depth Panther product showcase with our threat detection experts to walk through core detection, response, and investigation workflows in the context of a real-life threat scenario. We\u2019ll show you the power of Panther\u2019s high-scale log ingestion pipelines, Detection-as-Code features, and investigation workflows, with live Q&A to unpack details related to key use cases.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"See Panther\u2019s core capabilities in action:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ingestion: configuring log sources for centralized threat monitoring at scale\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detections: creating and tuning detections for critical threat scenarios using correlation rules and detection-as-code\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alerts: showing Panther\u2019s seamless alert workflows, with testing for enhanced fidelity and reliability\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Search: reviewing common techniques to investigate events related to an alert and triage incidents\"})})]})]});export const richText6=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The SIEM monolith is fading in favor of modular building blocks that enable efficient and performant ingestion, detection, and response workflows. This shift starts with refactoring data pipelines for the flexibility needed to eliminate noisy alerts and keep infrastructure costs low. But\\xa0 aligning people, process, and technology to make it happen is easier said than done.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Join us to learn how to approach balancing scale, efficiency, performance, and cost considerations to transform your SecOps strategy. We will review a range of strategic considerations and practical tips to building data pipelines and managing security infrastructure to eliminate noise, streamline detections and investigations, and drastically reduce TCO.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"We\u2019ll cover:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Strategic planning considerations spanning cost, threat models, log priority, compliance requirements, and more\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Approaches to reducing storage and processing costs by prioritizing data sources for immediate threat detections vs historical analysis\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data pipeline capabilities across routing, parsing, normalizing, filtering, etc. with practical examples on how to use them in your environment\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Benefits that efficient data pipelines deliver downstream to detections and correlations for identifying complex attacks\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Generative AI capabilities that help supercharge workflows built on this foundation\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"And much more\"})})]})]});export const richText7=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Burdened by false positive alerts and grappling with outdated approaches to detection and response, security teams face challenges such as analyst fatigue, slow response times, and the risk of missed threats. Without modern detection creation and iteration methods, teams find themselves stuck reviewing poor-quality alerts triggered by generic rules.\"}),/*#__PURE__*/e(\"p\",{children:\"Detections-as-code empowers teams to prioritize high-value alerts and reduce false positives, enabling a stronger security posture with fewer resources.\"}),/*#__PURE__*/e(\"p\",{children:\"Join us for this webinar to learn how you can use DaC to improve your alert fidelity. You\u2019ll hear from Michael Kuchera, Zapier\u2019s Security Incident Response Leader, about how he has transformed Zapier\u2019s Detection & Response with DaC.\"})]});export const richText8=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Hear from Panther Founder and CTO, Jack Naglieri, for a presentation of Panther\u2019s H1 Product Roadmap. Jack is joined by our Product leaders to give an overview of Panther\u2019s product strategy, focused on increasing the effectiveness of SOC teams at the forefront of cloud threat detection and response.\\xa0\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The webinar outlines Panther\u2019s ongoing efforts to increase alert fidelity, deliver action-focused analytics, and enable intuitive, collaborative SOC team workflows. \"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Introduction of Correlation Rules for detecting attack paths and sequences, mapped to modern attacks\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using AI for improving log comprehension, security intuition, and time-to-resolve for analysts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Introduction of Panther Query Language (PQL) as the basis for powerful analytics and Detection-as-Code (DaC) paradigms\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"New log integrations for key components of the modern security tech stack\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ingestion filtering capabilities that improve data hygiene and create high-value alerts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"And more!\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText9=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In this Webinar\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn about the importance of DaC and Code Driven SecOps\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand how to stay ahead of emerging threats like cloud crypto mining\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Zero in on efficient and rapid investigation processes\\xa0\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Detections-as-Code: A Revolution in Threat Detection\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"DaC transforms threat detection by applying software engineering principles to cybersecurity. This paradigm shift empowers security teams to articulate, manage, and evolve detection rules in code, promoting collaboration, version control, and automation. DaC's customization enables organizations to tailor detection rules precisely to their unique requirements, ensuring an optimal match for their threat landscape.\"}),/*#__PURE__*/e(\"p\",{children:\"DaC facilitates swift adaptation to evolving threats like cloud crypto mining. Security teams can efficiently customize and enhance detection rules specific to crypto mining, maintaining a vigilant defense against sophisticated tactics. Seamless integration with DevOps and infrastructure-as-code pipelines embeds security throughout the technology stack, from code development in GitHub logs to deployment in AWS logs, strengthening defenses against emerging threats like crypto mining.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"The Importance of Swift and Intuitive Security Investigations\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Swift and intuitive security investigations are paramount in effectively addressing emerging threats like crypto mining. As the cybersecurity landscape continually evolves, the ability to rapidly and seamlessly investigate potential threats becomes a linchpin for maintaining the integrity of digital environments. Every second matters during an investigation and your tools should support a rapid search experience with intuitive, easy-to-interpret results. \",/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"br\",{}),\" Emerging threats like cloud crypto mining often employ sophisticated and ever-changing tactics, strengthening the need for agility and adaptation in both threat detection and response. Swift investigations enable security teams to stay ahead of the curve, identifying and mitigating potential risks before they escalate. Leveraging a cost effective security data lake delivers both budget savings and increased performance for even more efficient investigations. Furthermore, intuitive search results ensure that security analysts can quickly comprehend and react accurately to threats, reducing the window of vulnerability and fortifying overall cybersecurity resilience.\\xa0\"]})]});export const richText10=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Elevate your Notion workspace's security effortlessly by seamlessly integrating it with Panther. In just a few clicks, Panther will actively monitor Notion activity logs, ensuring that your security team receives prompt alerts for any suspicious logins, permission changes, or access updates.\"}),/*#__PURE__*/e(\"p\",{children:\"Join us for this session to discover how you can deploy out-of-the-box real-time protection against a range of security threats, thereby guaranteeing the safety of your team's work.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"During this webinar, you will learn:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How to monitor Notion for potential data exfiltration and unauthorized access\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Implementing an early warning system for account takeovers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identifying suspicious logins in real-time, including unusual IP activity\"})})]})]});export const richText11=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"SIEMs have been around for decades, but the demands on these tools have evolved dramatically due to the exponential increase in data volume and the requirements for more automation to assist overburdened security teams. The increasing number of alerts generated by SIEMs requires a different approach; not all alerts need to be handled by human analysts. Faster threat detection and automated responses mean more time for analysts to focus on unknown threats and reduce potential dwell time for threat actors.\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, Ken Westin, Field CISO of Panther, will highlight how organizations can leverage the advantages of real-time detection and how to use automation to enrich alerts and automate response actions.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"This session will cover:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leveraging Panther for real-time detection and applying detection-as-code principles to increase the speed and efficiency of detection creation.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Applying real-time alerts to automated responses to mitigate threats faster.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Integrating SIEM within the modern security ecosystem, including ticketing systems, Slack, SOAR, and analytics platforms, for more streamlined security operations.\"})})]})]});export const richText12=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Finding a SIEM that's easy, scalable, affordable, and detects threats in real time is complex with all the jargon out there, so we are making it easy for you.\"}),/*#__PURE__*/t(\"p\",{children:[\"We'll show you how to ditch your legacy SIEM and upgrade to a modern SIEM that provides real-time visibility from day one and start detecting your first threat in <1 hour. \",/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\" We'll cover everything from how to:\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unlock total visibility without breaking the bank\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Drive accuracy and reliability with detection-as-code\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increase threat coverage without adding operational overhead\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Choose the right SIEM that grows with your data needs\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\" This webinar is for you if:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You face challenges managing budget constraints that limit your security investments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Meeting evolving compliance requirements is a time-consuming and stressful task for your resource-strapped team\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The frustration caused by vendor lock-in hinders your team's productivity and progress\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Don\u2019t sacrifice your security posture due to rigid SIEMs. Register for the webinar now!\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText13=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"You can\u2019t secure what you can\u2019t see; this is why asset inventory is a foundational control for many security and compliance frameworks such as CIS, PCI, and NIST 800-53. In this joint webinar, Axonius and Panther will discuss how the security team at Axonius leverages their \",/*#__PURE__*/e(i,{href:\"https://www.axonius.com/platform\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Cybersecurity Asset Management platform\"})}),\" to correlate alerts from Panther with asset data for better visibility and richer context. Attendees will learn how integrating asset inventory with detections provides faster mean-time-to-alert resolution and an overall reduction in alert volume requiring human investigation.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Key Takeaways\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increase overall visibility of assets for better detection\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand the role of asset inventory for compliance and security use cases\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn how to enrich real-time alerts with asset inventory data to reduce mean-time-to-alert resolution and false positives\"})})]})]});export const richText14=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In today's evolving threat landscape, data is the lifeblood of effective security operations. However, getting the right data into your security platform and utilizing it efficiently can be a complex challenge.\"}),/*#__PURE__*/e(\"p\",{children:\"Explore how Panther addresses this challenge head-on by providing granular control over data ingestion. The agenda will include a dive deep into the tactical and technical aspects of data management. Our hosts will demonstrate how to transform and distill data for improved visibility and reduced noise.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this webinar to learn how to:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Easily integrate and leverage data from various sources for reliable data ingestion\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Filter and focus on the most relevant security data using practical techniques to reduce noise and costs\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain control over the structure and value of your security data to improve data quality and write better detection logic\"})})]})]});export const richText15=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'Join us for an exciting fireside chat on the future of cybersecurity jobs with Helen E. Patton, author of the book \"Navigating the Cybersecurity Career Path\". We\u2019ll discuss current and emerging trends in the industry and how you can navigate your career path to be successful in this field now and into the future.'}),/*#__PURE__*/e(\"p\",{children:\"Helen will discuss hot topics in the industry, such as the impact of data science on the future of cybersecurity careers, and share insights from her book on how to enter, excel and lead in the industry.\"}),/*#__PURE__*/e(\"p\",{children:\"Watch the webinar today for this exciting opportunity to learn from a leading expert in the field of cybersecurity.\"})]});export const richText16=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As organizations continue to shift their workloads to the cloud, the volume, velocity and variety of data generated has increased exponentially, making it increasingly challenging to detect and respond to threats at scale. Legacy approaches to security log ingest, detection, and analysis are no longer sufficient, or cost effective. These outdated approaches were designed for on-premise networks, or siloed data centers in the realm of corporate IT. In this webinar we will discuss the evolution of SIEM from on-prem to the Cloud and how SIEM is being reshaped to handle this shift.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"In this webinar attendees will learn:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How SIEM has evolved to meet the demands of cloud data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How Detection-as-Code is applied to write detections specifically for Cloud environments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Techniques for ingesting high volume log sources and applying real time detections at scale\"})})]})]});export const richText17=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Join us for a fun and engaging fireside chat with Adam Shostack, author of the highly regarded \u201CThreat Modeling: Designing for Security,\u201D where he will read from and discuss his new book \u201CThreats: What Every Engineer Should Learn From Star Wars.\u201D Adam will share how he has used lessons from Star Wars to teach security concepts, the risk of blind spots across kill chains, and lessons we can learn from the security lapses of the Galactic Empire.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Please Note:\"}),\" We\u2019ll send a complimentary copy of Adam\u2019s e-book to the first 50 webinar attendees so save your spot ASAP!\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Heading to RSA in San Francisco?\"})}),/*#__PURE__*/t(\"p\",{children:[\"Adam will be joining us in the Panther booth (#228 in the South Expo Hall) on \",/*#__PURE__*/e(\"strong\",{children:\"Wed., Apr. 26 at 11 am\"}),\" to discuss his new book! Following the discussion, we\u2019ll have a book signing with Adam and giving the first 200 people in line a free copy!\"]})]});export const richText18=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"SIEM came into existence because data had a security problem; however, as the volume of data organizations parse and alert on increases exponentially, it has become clear that now security has a data problem.\"}),/*#__PURE__*/e(\"p\",{children:\"Join Panther, Snowflake, and Workrise as we discuss the evolution of SIEM data architectures over the past two decades and best practices for deploying real-time detections and leveraging a Security Data Lake to improve security posture.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"In this webinar you will:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn how a Security Data Lake can handle large volumes of data efficiently.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Discover the techniques for real-time detections to identify threats instantly.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand the importance of conducting searches in seconds for investigations and threat hunting.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Join us to understand the importance of staying on top of evolving security threats and the solutions to address them.\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"})]});export const richText19=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As we celebrate International Women's Month, we want to reinforce our commitment to promoting gender equality in the dynamic and rewarding field of Detection Engineering.\"}),/*#__PURE__*/e(\"p\",{children:\"During the event, you\u2019ll hear from successful Detection Engineering women who share their personal experiences and provide valuable insights into what it takes to thrive in this field. You'll learn about the various career paths available, the essential skills and qualifications you need, and the resources accessible to support your career growth.\"}),/*#__PURE__*/e(\"p\",{children:\"This is a unique opportunity to gain a deeper understanding of the Detection Engineering industry and how to break into it.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Join Danielle Gautier, Customer Success Manager at Panther; Page Glave, Security Engineer at FloQast; Hannie Do, Security Eningeer at Docker; Rachel Taylor, Senior Manager, Information Security, Risk and Trust at Docker; and Kat Yi, Senior Security Engineer at Docker to celebrate the accomplishments of women in Detection Engineering and help to promote gender equality in the workplace and empower more women to succeed in tech!\"})]});export const richText20=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"With Panther, the FloQast team set up a Detection-as-Code\\xa0practice\\xa0for their cloud environment. The benefits of Detection-as-Code are similar to Infrastructure-as-Code: logic testing, version control, rollback, code reuse and automation. \",/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"br\",{}),\" While the benefits of Detection-as-Code are easy to list, the true value lies in being able to implement them effectively and sustainably. In this webinar, FloQast will both overview their Detection-as-Code environment and also give in-depth examples of powerful detection and automation techniques they developed to facilitate their work.\"]}),/*#__PURE__*/e(\"p\",{children:\"We hope you come away with a better understanding of Detection-as-Code generally, but also some specific takeaways regarding detection logic and automation.\"})]});export const richText21=/*#__PURE__*/e(n.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"In this webinar, you\u2019ll learn how Dropbox implemented Detection-as-Code using Panther. The content will cover Dropbox\u2019s detection workflow and the benefits of applying software development best practices to your detection logic. Then, we\u2019ll step through a hypothetical, real-world example of an AWS detection from start to finish - beginning with a vulnerability and finishing with alert resolution.\"})});export const richText22=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Building a robust, maintainable, performant data pipeline is complex. AWS infrastructure creates a tremendous amount of log data that needs to be collected and organized, and security teams are increasingly tasked with creating and maintaining a secure data pipeline. Teams are asked to \u201Cbe data-driven,\u201D onboard a SIEM, ensure clean, tagged data is flowing, deploy detections, and confirm they are working continuously - all while staying within budget.\"}),/*#__PURE__*/e(\"p\",{children:\"Security teams must implement a modern, scalable detection, response, and analytics platform to make this mandate a reality.\"}),/*#__PURE__*/e(\"p\",{children:\"For ActBlue, Panther is that platform. Join Panther and ActBlue as we dig into a few specific decisions the ActBlue team made from day one to deploy a robust, maintainable, and performant data platform that would support their entire infosec program. These decisions include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leveraging out-of-the-box schemas and detections for AWS environments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detection-as-Code from day one\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"CI/CD orchestrations for detection and configurations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Data pipeline health monitoring and maintenance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Schema first all the things\"})})]})]});export const richText23=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Detecting and responding to threats before they cause serious problems is paramount to any security operations team. Effective threat hunting can reduce the time from intrusion to discovery, mitigating the damage done by attackers. However, modern cloud environments challenge defenders with high volumes of data to be analyzed.\"}),/*#__PURE__*/e(\"p\",{children:\"Consider AWS. With over 200+ services that generate event and log data in various formats and types, identifying and detecting threats has become exceedingly complex.\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, we will walk through real-world examples of AWS security threats along with practical steps to ensure you can proactively defend against them.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Join Carrie Pascale and Holly Benac, Senior Solutions Engineers at Panther Labs, as they cover:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Critical AWS log sources to collect and what you can learn from each\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How to leverage learnings from threat-hunting to build proactive monitoring\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Demonstration of real-world threat hunting scenarios in AWS\"})})]})]});export const richText24=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security teams are overloaded with overhead tasks that greatly slow down the speed at which they can respond to threats. Detections can take weeks or even a month to deploy, and even when they do work, the alerts are tedious to respond to. Security Professionals are drowning to manage detections with rudimentary limitations as well as triaging an overbearing amount of alerts manually.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"What if there was a way to use multiple tools together, to alleviate the pain of security operations and response? With Panther and Tines, security teams have the ability to write powerful detections in a CI/CD workflow and then automate response workloads for common security use cases.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"\u200B\u200BJoin Panther and Tines, where we will walk you through real threat detection scenarios and learn how to:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Write, manage, and rollback detections for your SIEM\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Create high-fidelity alerts with threat intelligence platforms\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automate common response workflows like endpoint detection & response and phishing response\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Combine these workflows for a responsive and robust security posture\"})})]})]});export const richText25=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The biggest challenges that security teams face today all stem from the same root cause: \\xa0 an exponential increase in data, leading to high operational overhead, cost, and alert volumes. They need the right resources, like platforms made for cloud-scale data ingestion, developer-centric processes, and easy automation to reduce the barriers to efficiency they're hindered by today.\"}),/*#__PURE__*/e(\"p\",{children:\"With the right tools and mindset, security teams can transform into modern detection teams who can keep their organization safe while increasing team efficiency, reducing overhead, and ensuring fast detection of threats.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Join Panther to learn what security teams need to know about the future of detection at scale. In this webinar, you will learn about how to:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Embrace developer-centric principles for writing, testing, and tuning detections\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Avoid false positives and speed response with enrichment and automation\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain fast time-to-value with easy onboarding and normalization of logs\"})})]})]});export const richText26=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security teams are inundated with data from cloud applications, making it difficult to manage security-relevant data, and detect threats across massive data sets.\"}),/*#__PURE__*/e(\"p\",{children:\"What if you had a platform that could ingest petabytes of unstructured security data and turn it into a structured data lake to power security monitoring at scale? Panther does just this, providing a fast, flexible and scalable platform for threat detection and response.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"\u200B\u200BJoin Panther, where we will walk you through real threat detection scenarios to show you have you can: \"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain visibility into all security-relevant data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect threats in real-time with analysis of streaming data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduce noise with high-fidelity, Python-based detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Power investigations with fast queries on normalized data\"})})]})]});export const richText27=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Security teams are slammed with too many alerts. Everyone in the SOC is too busy, it seems like every alert is critical, and there\u2019s never enough time to get all the work done.\"}),/*#__PURE__*/e(\"p\",{children:\"To address this challenge, Panther and GreyNoise have partnered to provide integrated, out-of-the-box threat intelligence in the Panther threat detection platform that identifies and classifies noisy IP addresses that are mass scanning the internet.\"}),/*#__PURE__*/e(\"p\",{children:\"With this innovation, security teams can focus on critical alerts and reduce alert fatigue by crafting detection and alerting logic that intelligently rules out internet background noise and other innocuous activity.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Jack Naglieri and Andrew Morris, founders of Panther and GreyNoise discuss how this new integration helps security teams:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Immediately flag activity from known bad actors\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve detection fidelity using contextual data to evaluate network behaviors\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduce false positives by suppressing alerts from internet background noise\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Accelerate investigations and reduce MTTR by adding context to alerts\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Hosted by: Brad LaPorte, former Gartner analyst & cybersecurity expert.\"})]});export const richText28=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As more and more organizations choose Snowflake as their cloud data platform, it is critical that they monitor their Snowflake environment for insecure configurations and other potential security risks.\"}),/*#__PURE__*/t(\"p\",{children:[\"Snowflake and Panther have partnered to deliver \",/*#__PURE__*/e(i,{href:\"https://panther.com/product/panther-for-snowflake/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Panther For Snowflake\"})}),\", which includes built-in rules to ensure that Snowflake\u2019s own security best practices are implemented, monitored and enforced.\"]}),/*#__PURE__*/e(\"p\",{children:\"Snowflake\u2019s Principal Security Architect, Mike Mitrowski and Panther\u2019s Senior Detections Engineer, Ben Sebastian discuss best practices around securing your Snowflake Data Cloud.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"You\u2019ll also learn how to:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect changes to critical Snowflake security settings\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor Snowflake instances with out-of-the-box security rules\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conduct effective and contextualized security investigations\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze past threats to proactively prevent attacks\"})})]})]});export const richText29=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"At Panther, our mission is to make security monitoring fast, flexible, and scalable, for all security teams. With our latest release, \",/*#__PURE__*/e(i,{href:\"https://panther.com/releases/v1-25/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"v1.25\"})}),\", you\u2019ll be able to improve visibility into suspicious activity to focus on what matters most: security.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Learn more about new features and enhancements with Panther's Solution Engineer, Nick Kuligaski to help you:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Quickly onboard custom log data with our new schema generation wizard\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve compliance coverage by mapping detections to frameworks like MITRE ATT&CK and CIS\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Expand security visibility with new Zoom and 1Password integrations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain better visibility into system performance with more granular log drop-off alarms\"})})]})]});export const richText30=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"For organizations tasked with securing rapidly growing AWS environments, one of the most challenging issues faced is collecting and normalizing AWS infrastructure logs like CloudTrail and VPC to identify suspicious activity. There\u2019s a wealth of security-relevant information in these logs, but AWS logs are \u201Cnoisy\u201D and often voluminous, and teams need a robust security architecture to process this data that optimizes for speed, scale, and flexibility.\"}),/*#__PURE__*/t(\"p\",{children:[\"With \",/*#__PURE__*/e(i,{href:\"https://panther.com/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Panther\"})}),\", disparate security logs from multiple AWS accounts and services can be collected and normalized in a single view for easier and faster threat detection and investigation. Panther\u2019s data pipeline is built on the idea of \u201CStreaming ETL (Extract, Transform, and Load)\u201D where security data is parsed, normalized, and analyzed in real-time to identify suspicious activity as soon as it happens.\"]}),/*#__PURE__*/e(\"p\",{children:\"Two former AWS and Amazon Engineers Russell Leighton and Kostas Papageorgiou discuss AWS security logging best practices with Former Gartner Analyst, Brad LaPorte along with how to:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Centralize AWS logs for threat detection and investigation\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Transform high-volume AWS data into a structured and scalable security data lake\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Achieve real-time alerts with detection-as-code\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Triage alerts faster by correlating activity across your AWS environment\"})})]})]});export const richText31=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The internet is ever-expanding and exabytes of data across disparate sources make data ingestion volume unbearable for traditional security tools. Security teams need solutions that can keep up with big data and provide dependable security analytics that is built with speed, scale, and flexibility in mind in order to operate efficiently and effectively.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Your data, your peace of mind! It's time to rethink your strategy and build a sustainable approach that allows teams to forward data into a single, scalable location, and normalize it for detection and investigations to meet the growing needs of security pros who face new and emerging threats.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Former Gartner Analyst\"}),\", and security industry expert, \",/*#__PURE__*/e(\"strong\",{children:\"Brad LaPorte\"}),\"\\xa0discusses how to:\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Revolutionize your SIEM capabilities to scale infinitely with high-scale data\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduce cost and boost capabilities with serverless architecture\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage tailored security analytics to fine-tune threat detection programs\\xa0\"})})]})]});export const richText32=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The rise of large cloud providers and horizontally scalable infrastructure has made building software for production workloads more approachable than ever. Coupled with traditionally slow vendor innovation cycles and outdated business models, many teams are feeling pressure to build software in-house to replace or augment their legacy SIEM.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"However, even with access to cheap storage, scalable infrastructure, and in-house engineering resources, the cost and business risk associated with building and maintaining a mission-critical security platform is high. In addition, given that the average time to discover a breach is 280 days, security teams don't just need to capture their organization's data, they need to retain it for long periods of time in a format that enables reliably fast searching in the event of breach. In these situations, system design, flexibility, and cost-effectiveness at scale are paramount.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://about.gitlab.com/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GitLab\"})}),\" Director of Security Operations, Jan Urbanc, and Panther Labs Director of Engineering, Joren McReynolds, discuss how you can:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Evaluate the total cost of ownership, opportunity cost, and time-to-value associated with SIEM Buy vs Build\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Build modern detection and response pipelines with best-of-breed tooling, well-understood programming interfaces, and open data ecosystems\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Position your security team for success in the era of big data and everything-as-a-service\"})})]})]});export const richText33=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Panther Security Engineer, Patrick Hagan walks you through how to write simple, creative, and useful threat detections in Python.\"}),/*#__PURE__*/e(\"p\",{children:\"With its versatility and extensibility, Python makes it easy to express security logic that aligns with your business objectives for risk and compliance. In this session, Patrick will explain how first-timers and experienced Pythoneers and Pythonistas alike can write, test, and manage detection engineering like a pro. \"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Learn how you can:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Create intelligent detections by analyzing nested JSON data.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Handle complex data by simplifying AWS resource data structures and event logs.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Keep private rules from being overwritten from changes to a public ruleset.\\xa0\\xa0\"})})]})]});export const richText34=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Threat detection in the cloud requires a combination of visibility and context. But in order to gain actionable insights from your data, it needs to be centralized, normalized, and structured in a way that supports high-scale analysis and investigation.\"}),/*#__PURE__*/e(\"p\",{children:\"Cloud data platforms like Snowflake offer a scalable foundation for storing petabytes of business and security data for long-term retention. By introducing a purpose built security analytics platform like Panther, security teams can operationalize their data lake to correlate activity across applications and infrastructure, detect signs of breach, and trigger high-fidelity alerts to third-party applications like Slack, PagerDuty, and Jira. \"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Join Snowflake\u2019s Head of CyberSecurity, Omer Singer, and Panther Labs Principal Engineer, Russell Leighton, discuss how you can use Panther and Snowflake to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain new security visibility with detections-as-code and a central security data lake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect and alert upon anomalies by regularly baselining user behavior\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Correlate suspicious activity with normalized security data and scheduled alerts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validate security controls automatically with code-driven compliance policies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify compromised accounts and insider threats in your Snowflake\\xa0\\xa0\"})})]})]});export const richText35=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Modern security teams need a new and open approach to security, so they can do their day jobs and only focus on high fidelity alerts. Security is shifting from the SOC towards automation and programming.\"}),/*#__PURE__*/t(\"p\",{children:[\"By combining the power of \",/*#__PURE__*/e(i,{href:\"https://panther.com/cyber-explained/detections-as-code/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Detections-as-Code\"})}),\", which opens up a whole new toolbox, and the Security Data Lake, security teams can scale to their specific needs and gain powerful log analysis and investigation capabilities.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Join us for an open panel discussion with modern security leaders from Snowflake, Figma, and Panther as they discuss:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How thinking beyond security today can prepare you for the future\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A modern approach to open security that can address today\u2019s challenges\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Best practices for alert fatigue and navigating other challenges for growing organizations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scaling security for large & small organizations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How Detection-as-Code can help improve efficiency, scale & remediate incidents quickly\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"And whatever else might come up in the discussion\"})})]})]});export const richText36=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cloud technology is changing the way we interact with colleagues, partners, customers, and data. To keep up with the rapidly changing business landscape, security teams are tasked with implementing flexible security policies and controls that help their organizations balance risks and business needs.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://cedar.com\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Cedar\"})}),\", a healthcare technology company that is revolutionizing the patient experience, needed a way to collect and operationalize data from across its environment to maintain a high level of security and comply with regulatory requirements. With Panther, Cedar was able to gain visibility into user activity that impacted its security posture, generate real-time alerts for suspicious behavior, and detect unauthorized data sharing across the organization.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on demand webinar to learn how Cedar is leveraging Panther to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor application authorizations to identify overly permissive data in G-suite\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect manual changes to AWS production environments\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage Detections-as-Code to build high-signal alerts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Quickly search through terabytes of structured data to triage alerts using SQL\"})})]})]});export const richText37=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Automate the analysis and remediation of your security alerts with Tines and Panther!\"})}),/*#__PURE__*/e(\"p\",{children:\"To keep up with detection and response in the cloud, modern security teams are leveraging automation to build robust and scalable workflows.\"}),/*#__PURE__*/e(\"p\",{children:\"In the old world, homegrown scripts and inflexible SIEMs with proprietary data formats led to vendor lock-in, complicated operations, and many low-value alerts. In today\u2019s world, security practitioners are using detections as code, REST APIs, and best-of-breed cloud tools to bootstrap security operations capable of handling detection and response at petabyte-scale.\"}),/*#__PURE__*/t(\"p\",{children:[\"Panther CEO, Jack Naglieri, and Tines COO, Thomas Kinsella show how you can craft high-value alerts in Panther that trigger robust remediation workflows in the industry\u2019s leading no-code security automation platform, \",/*#__PURE__*/e(i,{href:\"https://tines.io\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Tines\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on-demand webinar to learn how to use Panther and Tines to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collect and monitor security logs from across your environment\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Produce high value alerts with Python-based threat detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automatically respond to generated alerts with no-code automation\"})})]})]});export const richText38=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Learn how to threat hunt at scale using lightning fast SQL queries against large volumes of well-structured security data.\"})}),/*#__PURE__*/e(\"p\",{children:\"Sophisticated attacks can bypass even the tightest security controls. With an understanding of advanced attacker patterns and access to well-structured indicators like IPs, domains, and hashes, security teams can proactively hunt for threats to identify malicious activity related to an incident and prevent further escalation.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, Panther CEO, Jack Naglieri, and Principal Engineer, Russell Leighton, share how teams can use Panther to search through\\xa0 a high scale security data lake to enable threat hunting at scale.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on demand webinar to learn how to:\\xa0\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Hunt for ongoing threats against large volumes of data using SQL\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gain context about suspicious activity, find hits on IOCs, and pivot across data to identify root causes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Prevent further escalation by joining activity logs with infrastructure state changes\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage findings to improve detections and generate real-time alerts for similar activity in the future\"})})]})]});export const richText39=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Learn how to leverage all of Panther's advanced features to build out a sophisticated security operations pipeline.\"})}),/*#__PURE__*/e(\"p\",{children:\"In the second and final installment of our webinar series about writing custom detections with Panther, we dig deeper into the advanced functionality security teams can achieve with our Python-based detection engine.\"}),/*#__PURE__*/e(\"p\",{children:\"Python offers security engineers a wide breadth of versatility and flexibility for building detections that directly map to business objectives for risk and compliance.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on demand webinar to learn how to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage Python libraries and helpers to write sophisticated threat detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use Panther's standard fields to detect suspicious activity across systems\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adopt developer-centric workflows for writing and managing detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Store stateful objects in Panther's built-in DynamoDB cache\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"This is a two-part webinar series. \"}),/*#__PURE__*/e(i,{href:\"https://panther.com/resources/webinars/writing-custom-python-detections-with-panther/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"em\",{children:\"Register to watch Part I now\"})})}),/*#__PURE__*/e(\"em\",{children:\".\"})]})]});export const richText40=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"Learn how to identify common and specialized cybersecurity attacks with Python detections and developer-friendly workflows.\"})}),/*#__PURE__*/e(\"p\",{children:\"In our cloud-first world, security surface areas continue to expand and attacker behavior is evolving. To keep up with the changing threat landscape, security teams need powerful and flexible new tools to detect suspicious activity across cloud and on-premise environments.\"}),/*#__PURE__*/e(\"p\",{children:\"In traditional SIEMs, detection logic can be difficult to express and challenging to maintain as complexity increases. The proprietary and obscure programming languages used in legacy platforms present security engineers with steep learning curves to effectively model attacker techniques at scale.\"}),/*#__PURE__*/e(\"h5\",{children:\"Python Detections Enable Endless Possibilities\"}),/*#__PURE__*/e(\"p\",{children:\"Rather than inventing another new domain-specific language (DSL) for security teams to learn, Panther uses Python to enable teams to quickly bootstrap a modern and flexible detection and response program.\"}),/*#__PURE__*/e(\"p\",{children:\"With its versatility and extensibility, Python offers security engineers the ability to more easily write and maintain complicated detection logic that aligns security programs with business objectives for risk and compliance.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on demand webinar to learn how to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Write custom threat detections in Python\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Baseline behaviors to calibrate detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use Panther\u2019s built-in unit testing framework to achieve high signal alerts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage Global Helper Functions to store reusable detection logic\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"P.S. This is a two-part webinar series about writing custom threat detections with Panther. \"}),/*#__PURE__*/e(i,{href:\"https://panther.com/webinars/writing-custom-python-detections-with-panther-part-ii/\",motionChild:!0,nodeId:\"m3OG29zGk\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:/*#__PURE__*/e(\"em\",{children:\"Register for Part II\"})})}),/*#__PURE__*/e(\"em\",{children:\".\"})]})]});export const richText41=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"As teams shift to work from home and SaaS usage is on the rise, security teams are struggling more than ever to operationalize large volumes of data to thwart a growing number of sophisticated attacks.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Cloud misconfigurations cost organizations billions of dollars and loss of trust.\"})}),/*#__PURE__*/e(\"p\",{children:\"To detect and remediate suspicious activity, security practitioners need powerful and purpose-built tooling that integrates into a modern security operations pipeline.\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, we'll show you how the Panther platform can be used to detect, investigate, and remediate threats in real-time and achieve security visibility.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on-demand webinar to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn how to configure Panther for real-time continuous monitoring of your AWS cloud infrastructure\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Explore how Panther enables quick and automatic remediation of misconfigured resources\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Discover pre-built Panther policies that can immediately improve organizational cloud security posture\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand how to write and test custom policies to meet the unique security requirements of your business\"})})]})]});export const richText42=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The challenge of monitoring servers for compromise is increasing as organizations rapidly move infrastructure to the cloud. Universal event logging and granular permissions help, but native cloud services on their own don't offer the functionality security teams need to adequately detect and investigate breaches, and harden cloud infrastructure.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Continuous monitoring in the cloud requires a new approach to security.\"})}),/*#__PURE__*/e(\"p\",{children:\"In the cloud, object storage is a ubiquitous and necessary service. It powers our digital applications and environments and contains financial data, personally identifiable information (PII), user analytics, and more. In the last several years, attackers have continued to discover vulnerabilities in AWS S3 configurations that compromise user trust and privacy and cost businesses billions of dollars.\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, we'll walk through strategies to monitor your most sensitive data in S3 using Panther.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on demand webinar to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn practical, defense-in-depth techniques for monitoring and securing your S3 buckets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand how to model security best practices with code\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Learn how to detect unauthorized activity to your buckets\"})})]})]});export const richText43=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cloud-centric security teams need to detect threats across complex environments that are generating an exploding amount of log data. This is challenging and requires complete visibility across cloud and on-premise data sources, as well as pre-built threat detection rules and investigation queries.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Panther is the first SIEM delivered as a service on top of Snowflake\"})}),/*#__PURE__*/e(\"p\",{children:\"By using Panther, you can turn your Snowflake into a SIEM with real-time alerting and 200+ pre-built detection rules. In this webinar, we'll show how you can replace your expensive legacy SIEM with scalable log analytics that uses cloud storage and compute to scale to your needs.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Watch this on-demand webinar to:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Replace your expensive legacy SIEM with a cloud-native alternative\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Centralize your security data with affordable, no-hassle data retention for years\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Run advanced analytics across multiple sources in a security data lake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage Panther to collect, analyze, and retain terabytes of security logs in Snowflake with low costs and real-time alerts\"})})]})]});export const richText44=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Should you add more tools to beef up your infrastructure security? How about making the tools you already have work better?.\"}),/*#__PURE__*/e(\"p\",{children:\"In this webinar, we give you a practical demo of how to improve and simplify infrastructure security by using the next generation of open source tools \u2014 Teleport and Panther. You will learn how to SSH properly and discover why certificate authorities are a must-have. You will also learn how to audit that activity and what to do with those audit logs once you have them.\"}),/*#__PURE__*/e(\"h3\",{children:\"Watch this on demand webinar to:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"SSH properly and use certificates for SSH, not public/private key pairs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use a proxy or SSH bastion\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Derive your identity from a centralized database (SSO)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Collect and centralize important security data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detect threats and take action\"})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,0BAA0B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,UAAU,2BAA2B,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAgFE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oZAA+Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,UAAU,2BAA2B,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,2BAA2B,kBAAkB,IAAI,qBAAqB,QAAQ,MAAM,CAAC,kBAAkB,kCAAkC,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sYAAuX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAA2S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8HAAyH,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,kDAA+DE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kPAA6O,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8LAAoL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAAiY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iDAA4C,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAAwG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+XAA+X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAA0O,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oUAA0T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAAuK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kaAAka,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6eAA6e,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mEAAmE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8cAA2dE,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,KAAK,CAAC,CAAC,EAAE,uqBAAuqB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+fAA+f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4LE,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAA6F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,gSAAmSE,EAAEc,EAAE,CAAC,KAAK,mCAAmC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAE,wRAAwR,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iUAA4T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,klBAAklB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qdAAic,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,uHAA6G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mJAA8I,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oWAA+V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gbAAgb,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,uPAAoQE,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,KAAK,CAAC,CAAC,EAAE,sVAAsV,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBvB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gaAAiZ,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kdAAwc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yYAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,0HAAgH,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mYAAmY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qHAA2G,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uLAAkL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwBhC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAEc,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,sIAAiI,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAS,8LAAoL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oCAA+B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,yIAAsJE,EAAEc,EAAE,CAAC,KAAK,sCAAsC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,+GAA0G,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sdAAuc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,QAAqBE,EAAEc,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,wZAAyY,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yWAAyW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mCAAgDA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4VAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ykBAAykB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEc,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,gIAAgI,CAAC,CAAC,EAAejB,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBrC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kUAAkU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoC,EAAwBtC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+PAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8bAA8b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oKAA+J,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBvC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAEc,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,mLAAmL,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBxC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEc,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,qcAAqc,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuC,EAAwBzC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAiX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iOAAyOE,EAAEc,EAAE,CAAC,KAAK,mBAAmB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAef,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewC,EAAwB1C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyC,EAAwB3C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAEc,EAAE,CAAC,KAAK,wFAAwF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAsBf,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe0C,EAAwB5C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,6HAA6H,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAEc,EAAE,CAAC,KAAK,sFAAsF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBd,EAAEe,EAAE,EAAE,CAAC,SAAsBf,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2C,EAAwB7C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4C,GAAwB9C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6VAA6V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAAoZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6C,GAAwB/C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe8C,GAAwBhD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAAqX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EACt9zE+C,GAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "Link", "motion", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "richText42", "richText43", "richText44", "__FramerMetadata__"]
}
