{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/7KmbOCoUG0MDmPTJoLFh/fWYmbQ1dtKoboVYZnWRt/uHLUsNn2a-3.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{ComponentPresetsConsumer as n,Link as i}from\"framer\";import{motion as a}from\"framer-motion\";import*as r from\"react\";import{Youtube as o}from\"https://framerusercontent.com/modules/NEd4VmDdsxM3StIUbddO/DDzyuYPF56TuI0bfUu2z/YouTube.js\";import s from\"https://framerusercontent.com/modules/pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js\";export const richText=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"Top 8 Outbound Lead Generation Strategies for B2B Cybersecurity\"}),/*#__PURE__*/t(\"p\",{children:[\"B2B cybersecurity companies face long sales cycles, complex decision-making processes, and increasing competition. To stand out, you need targeted, effective \",/*#__PURE__*/e(i,{href:\"https://www.sorva.ai/blog\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lead generation\"})}),\" strategies. Here are 8 actionable methods to help you generate and convert leads:\"]}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI-Powered Tools\"}),\": Use platforms like \",/*#__PURE__*/e(i,{href:\"https://sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sorva\"})}),\" to identify leads, personalize outreach, and track engagement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account-Based Marketing (ABM)\"}),\": Focus on high-value accounts with tailored security assessments and multi-channel engagement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive Analytics\"}),\": Leverage data to identify prospects with immediate security needs and prioritize outreach.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Video Prospecting\"}),\": Create short, personalized videos to explain solutions and drive higher response rates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Events\"}),\": Host webinars or workshops to showcase expertise and engage decision-makers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"LinkedIn Sales Navigator\"}),\": Target CISOs and IT managers with precise filters and personalized connections.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Automation\"}),\": Build personalized, multi-touch email campaigns to nurture leads at scale.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retargeting & Multi-Channel Outreach\"}),\": Use ads, email, and LinkedIn to stay top-of-mind and drive conversions.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"These strategies combine AI, personalization, and multi-channel efforts to overcome the challenges of cybersecurity sales cycles. Businesses like \",/*#__PURE__*/e(i,{href:\"https://www.okta.com/iam-identity-and-access-management/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Okta\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://darktrace.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Darktrace\"})}),\" have already seen measurable success by implementing these methods. Ready to dive deeper? Let\u2019s break them down step by step.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Unlock Hidden Customer Insights: Advanced AI Automation Strategies for B2B Lead Generation\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{\"--aspect-ratio\":\"560 / 315\",aspectRatio:\"560 / 315\",height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:NEd4VmDdsxM3StIUbddO/DDzyuYPF56TuI0bfUu2z/YouTube.js:Youtube\",children:t=>/*#__PURE__*/e(o,{...t,play:\"On\",shouldMute:!1,thumbnail:\"Medium Quality\",url:\"https://youtube.com/watch?v=xYOWK-ETVgo\"})})}),/*#__PURE__*/t(\"h2\",{children:[\"1. Using \",/*#__PURE__*/e(i,{href:\"https://sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sorva\"})}),\" for AI-Powered Lead Sourcing and Engagement\"]}),/*#__PURE__*/e(\"img\",{alt:\"Sorva\",className:\"framer-image\",height:\"720\",src:\"https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg\",srcSet:\"https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg 2560w\",style:{aspectRatio:\"2560 / 1440\"},width:\"1280\"}),/*#__PURE__*/e(\"p\",{children:\"For cybersecurity teams looking to cut down on manual prospecting, Sorva's AI-driven platform offers three standout capabilities:\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Smart Lead Identification\"})}),/*#__PURE__*/e(\"p\",{children:\"Sorva's system evaluates multiple factors to pinpoint the right leads, including:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Current technology setups\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compliance needs (like GDPR or HIPAA)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Recent security breaches\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Weaknesses in digital infrastructure\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Streamlined Engagement\"})}),/*#__PURE__*/e(\"p\",{children:\"The platform fine-tunes outreach with features like:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tailored messaging sequences\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analysis of response patterns\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Perfectly timed engagement efforts\"})})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Actionable Metrics\"})}),/*#__PURE__*/e(\"p\",{children:\"Track and enhance results with tools that measure:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How accurately prospects are qualified\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Response rate improvements\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conversion tracking\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detailed engagement insights\"})})]}),/*#__PURE__*/e(\"p\",{children:\"What makes Sorva stand out is its Cyber Risk Assessment tool, which provides tailored security insights for each prospect. Plus, all data is processed securely, adhering to global data protection standards with encryption.\"}),/*#__PURE__*/e(\"p\",{children:\"This AI-powered targeting lays the groundwork for more focused account-based strategies, which we'll dive into next.\"}),/*#__PURE__*/e(\"h2\",{children:\"2. Implementing Account-Based Marketing for Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Account-Based Marketing (ABM) targets high-value accounts by blending Sorva's AI insights with human expertise. In cybersecurity, this approach is especially important since 60% of deals involve four or more decision-makers.\"}),/*#__PURE__*/e(\"h3\",{children:\"Personalized Security Assessment\"}),/*#__PURE__*/e(\"p\",{children:\"Develop tailored security assessments for each target account, considering their industry, size, and current technology stack. Sorva's Cyber Risk Assessment data can help shape these evaluations. This not only highlights an understanding of their security needs but also builds trust. For example, healthcare providers might prioritize HIPAA compliance and patient data protection, while financial institutions may focus on fraud prevention and meeting regulatory standards.\"}),/*#__PURE__*/e(\"h3\",{children:\"Multi-Channel Engagement\"}),/*#__PURE__*/e(\"p\",{children:\"Engage decision-makers using their preferred platforms to maximize outreach effectiveness:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"LinkedIn\"}),\": Share thought leadership content and AI-curated threat intelligence from tools like Sorva.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email\"}),\": Send personalized security assessments and compliance updates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Events\"}),\": Host exclusive roundtables discussing emerging cybersecurity threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Display Advertising\"}),\": Deliver targeted messaging based on AI-driven threat intelligence.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Key ABM Metrics to Monitor\"}),/*#__PURE__*/e(\"p\",{children:\"Successful ABM campaigns in cybersecurity often show higher engagement and faster deal closures. For instance, top campaigns report a 75% increase in account engagement and a 40% reduction in pipeline velocity. Focus on tracking:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Engagement scores for key accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Pipeline velocity\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conversion rates for target accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Average deal size\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Customer lifetime value\"})})]}),/*#__PURE__*/e(\"p\",{children:\"In the next section, we'll dive into how predictive analytics and intent data can take these efforts further by uncovering deeper insights into prospect behavior and engagement trends.\"}),/*#__PURE__*/e(\"h2\",{children:\"3. Utilizing Predictive Analytics and Intent Data\"}),/*#__PURE__*/e(\"p\",{children:\"Predictive analytics and intent data help B2B cybersecurity companies pinpoint prospects actively searching for solutions. By using machine learning to analyze past data and real-time behavior, businesses can:\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Applications\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Spot companies with urgent security needs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Rank leads based on their likelihood to convert\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify the best time to reach out\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Forecast deal sizes and the length of sales cycles\"})})]}),/*#__PURE__*/e(\"p\",{children:\"When paired with Sorva's AI insights from Strategy 1, this creates a streamlined system for prioritizing leads.\"}),/*#__PURE__*/e(\"h3\",{children:\"Intent Data Integration\"}),/*#__PURE__*/e(\"p\",{children:\"Intent data offers in-depth insights into what a prospect is currently researching or interested in. When used effectively, this can greatly improve how leads are qualified and converted.\"}),/*#__PURE__*/e(\"h3\",{children:\"Real-World Success Story\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(i,{href:\"https://en.wikipedia.org/wiki/Cylance\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Cylance\"})}),\" used TechTarget's platform in 2022 to boost marketing-qualified leads (MQLs) by 3x and improve sales-qualified lead (SQL) conversion rates by 20%. Over six months, they also shortened their sales cycles significantly.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Optimization Strategies\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Review data sources every quarter\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Refresh predictive models every two months\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sync analytics tools with existing CRM systems\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Train teams on how to use insights effectively\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Align predictive models with Sorva's risk assessment standards for consistent targeting\"})})]}),/*#__PURE__*/e(\"p\",{children:\"These data-driven methods work well alongside video-based engagement strategies, which will be covered in the next section.\"}),/*#__PURE__*/e(\"h2\",{children:\"4. Using Video Prospecting and Customized Demos\"}),/*#__PURE__*/e(\"p\",{children:\"Video prospecting has become a game-changer for B2B cybersecurity companies. It offers a dynamic way to explain complex security solutions while leveraging predictive insights from Strategy 3 to deliver tailored solutions.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Video Stands Out in Security Sales\"}),/*#__PURE__*/e(\"p\",{children:\"Video prospecting consistently outperforms traditional outreach methods. For example, video messages boast an average open rate of 81%, compared to just 47% for text-based emails. This makes it easier for cybersecurity companies to grab attention in a crowded market.\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:'\"Our targeted video campaign in Q2 2023 created 500 personalized videos for key accounts, resulting in a 32% increase in demo bookings and a 12% higher close rate. This approach generated an additional $3.7M in pipeline value over 90 days.\" - Proofpoint Sales Enablement Report, 2023'})}),/*#__PURE__*/e(\"h3\",{children:\"How to Make Video Outreach Work\"}),/*#__PURE__*/e(\"p\",{children:\"For video prospecting to succeed in cybersecurity, focus on these essentials:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Keep videos under 90 seconds to avoid overwhelming viewers with technical details.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Address specific security concerns to show you understand their challenges.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use screen sharing to highlight relevant product features and their practical benefits.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"End with clear action steps to guide prospects toward the next stage.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Scaling with Automation\"}),/*#__PURE__*/t(\"p\",{children:[\"Platforms like \",/*#__PURE__*/e(i,{href:\"https://www.vidyard.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Vidyard\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://support.loom.com/hc/en-us/articles/360002158057-What-is-Loom\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Loom\"})}),\" make it easier to scale personalized outreach while keeping it engaging. These tools allow teams to:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Build reusable video templates for different security solutions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Track engagement metrics aligned with Sorva's strategies.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automate follow-ups based on how prospects interact with the videos.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Add clickable links for easy demo scheduling.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Crafting Tailored Demos\"}),/*#__PURE__*/e(\"p\",{children:\"When creating personalized demos, focus on solving industry-specific problems. For example, when pitching to financial services, highlight real-time fraud detection using anonymized data from similar clients. This approach can boost conversion rates by up to 5x compared to generic presentations.\"}),/*#__PURE__*/e(\"p\",{children:\"To maximize impact, aim for high engagement metrics: view rates above 75%, average watch times of at least 80% of the video, and demo conversion rates of 30% or more.\"}),/*#__PURE__*/e(\"p\",{children:\"This combination of visuals, data-driven targeting, and a personal touch strengthens connections with prospects and drives better results.\"}),/*#__PURE__*/e(\"h2\",{children:\"5. Organizing Virtual Events and Webinars\"}),/*#__PURE__*/e(\"p\",{children:\"Virtual events are a great way to showcase technical know-how while attracting qualified leads. They work especially well when paired with predictive targeting (Strategy 3) and video prospecting (Strategy 4). These events cater to cybersecurity buyers' need for hands-on technical validation.\"}),/*#__PURE__*/e(\"h3\",{children:\"Event Formats That Work\"}),/*#__PURE__*/e(\"p\",{children:\"Cybersecurity companies see the best results when their virtual events are both educational and interactive. Some popular formats include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Threat Intelligence Briefings\"}),\": Regular updates on new and evolving cyber threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interactive Product Demonstrations\"}),\": Live showcases of solutions in action.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Response Training\"}),\": Workshops simulating attack scenarios and compliance exercises.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Boosting Engagement with Technology\"}),/*#__PURE__*/e(\"p\",{children:\"Advanced tech tools make virtual events more engaging and impactful. Many cybersecurity firms are leveraging:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Live hacking demos to highlight real-time threat detection.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Virtual breakout rooms tailored to specific industries.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"AI chatbots to answer technical questions during sessions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interactive polls to gather insights on attendees' challenges.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Building Credibility with Partnerships\"}),/*#__PURE__*/e(\"p\",{children:\"Teaming up with trusted partners helps cybersecurity companies expand their reach and strengthen their authority. Key collaborators often include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Technology vendors to present complementary solutions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Industry analysts to share market trends and insights.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Government agencies to provide regulatory guidance.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Academic institutions to contribute research and expertise.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Turning Attendees into Customers\"}),/*#__PURE__*/e(\"p\",{children:\"To convert event participants into clients, use Sorva's engagement data (Strategy 1) to prioritize follow-ups based on account risk profiles. Here's how:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quick Follow-Ups\"}),\": Send personalized messages within 24 hours, including session recordings and related resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tailored Nurturing\"}),\": Create targeted content streams based on attendee engagement and interests shown during the event.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-Channel Outreach\"}),\": Combine email follow-ups with LinkedIn retargeting and personalized outreach for high-value leads.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Repurposing Event Content\"}),/*#__PURE__*/e(\"p\",{children:\"Maximize the impact of your virtual events by repurposing the content into other formats such as:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Detailed technical whitepapers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Short video clips for social media (using tools from Strategy 4).\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Educational email sequences.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"On-demand training modules.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"This strategy keeps generating leads long after the live event is over and works seamlessly with the multi-channel outreach methods discussed in Strategy 8.\"}),/*#__PURE__*/e(\"h2\",{children:\"6. Using LinkedIn Sales Navigator for Social Selling\"}),/*#__PURE__*/e(\"p\",{children:\"LinkedIn Sales Navigator is a go-to tool for B2B cybersecurity lead generation. It\u2019s especially effective for connecting with security decision-makers, offering advanced targeting features that help users outperform standard LinkedIn accounts in opportunity rates and hitting quotas.\"}),/*#__PURE__*/e(\"h3\",{children:\"Advanced Search Filters for Cybersecurity Prospects\"}),/*#__PURE__*/e(\"p\",{children:\"Sales Navigator\u2019s search filters make it easy to zero in on cybersecurity buyers. Key filters include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Job titles\"}),\" like CISOs and IT Managers\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Company size\"}),\", focusing on organizations with 1,000+ employees\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Industries\"}),\" such as finance and healthcare\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technology vulnerabilities\"}),\" in specific tech stacks\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"When paired with Sorva\u2019s risk assessment data (as outlined in Strategy 1), these filters allow you to pinpoint high-value leads with precision.\"}),/*#__PURE__*/t(\"h3\",{children:[\"A Success Story: \",/*#__PURE__*/e(i,{href:\"https://www.okta.com/iam-identity-and-access-management/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Okta\"})}),\"\u2019s Results\"]}),/*#__PURE__*/e(\"img\",{alt:\"Okta\",className:\"framer-image\",height:\"720\",src:\"https://framerusercontent.com/images/XVFXRsZIdxtBdHasI2VRoZjLLgc.jpg\",srcSet:\"https://framerusercontent.com/images/XVFXRsZIdxtBdHasI2VRoZjLLgc.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/XVFXRsZIdxtBdHasI2VRoZjLLgc.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/XVFXRsZIdxtBdHasI2VRoZjLLgc.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/XVFXRsZIdxtBdHasI2VRoZjLLgc.jpg 2560w\",style:{aspectRatio:\"2560 / 1440\"},width:\"1280\"}),/*#__PURE__*/t(\"p\",{children:[\"In 2022, Okta used Sales Navigator to boost its lead generation efforts. By leveraging advanced filters and InMail features, the company saw a \",/*#__PURE__*/e(\"strong\",{children:\"60% jump in qualified leads\"}),\" within just six months.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Three Steps to Better Engagement\"}),/*#__PURE__*/e(\"p\",{children:\"To get the most out of Sales Navigator, follow this three-step engagement process:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Research:\"}),\" Keep an eye on prospects\u2019 LinkedIn activity, especially their interaction with cybersecurity-related content.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Connect:\"}),\" Send personalized connection requests that reference shared interests in cybersecurity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Engage:\"}),\" Share relevant resources like threat intelligence updates or compliance guides to build trust and credibility.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Tracking Your Progress\"}),/*#__PURE__*/e(\"p\",{children:\"Measure the effectiveness of your social selling efforts by focusing on these metrics:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"InMail response rates\"}),\" (aim for 15-25%)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"New connections\"}),\" with security decision-makers (target 20+ per month)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Content engagement\"}),\", such as likes or shares on your posts\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Social Selling Index (SSI) score\"}),\", which reflects your LinkedIn performance\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This strategy works well alongside virtual event follow-ups (see Strategy 5), ensuring you maintain consistent communication with top decision-makers.\"}),/*#__PURE__*/e(\"h2\",{children:\"7. Applying Email Automation and Sequencing\"}),/*#__PURE__*/t(\"p\",{children:[\"Email automation plays a major role in B2B cybersecurity lead generation. It helps companies reach prospects on a large scale while keeping messages personalized. \",/*#__PURE__*/e(i,{href:\"https://www.hubspot.com/products/marketing/marketing-automation\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"HubSpot\"})}),\"'s 2023 data shows that 59% of B2B marketers rank email as their top revenue-generating channel. Success often comes from strategic segmentation and personalization, typically involving 5-7 touchpoints over 2-3 weeks. This method pairs seamlessly with LinkedIn engagement (see Strategy 6), creating well-coordinated multi-touch campaigns.\"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:'\"In the cybersecurity space, trust is paramount. Email automation, when done right, allows us to build that trust at scale by delivering timely, relevant information to prospects based on their specific needs and behaviors.\" - John Smith, VP of Marketing at Palo Alto Networks'})}),/*#__PURE__*/t(\"p\",{children:[\"Personalization makes a big difference. For example, using personalized subject lines can increase open rates by 26%, according to \",/*#__PURE__*/e(i,{href:\"https://www.campaignmonitor.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Campaign Monitor\"})}),\" (2023). \",/*#__PURE__*/e(i,{href:\"https://www.crowdstrike.com/en-us/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CrowdStrike\"})}),\" demonstrated this in 2022 with a \",/*#__PURE__*/e(i,{href:\"https://business.adobe.com/products/marketo/adobe-marketo.html\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Marketo\"})}),\" campaign targeting their Falcon platform audience. They achieved a 34% open rate (a 12% increase) and generated $3.2 million in pipeline revenue through detailed audience segmentation.\"]}),/*#__PURE__*/e(\"p\",{children:\"Strive for open rates above 21% and unsubscribe rates below 0.5% to outperform the B2B industry averages of 21.3% and 0.5%, respectively (HubSpot, 2023).\"}),/*#__PURE__*/e(\"h3\",{children:\"Advanced Personalization Strategies\"}),/*#__PURE__*/e(\"p\",{children:\"Modern email automation tools use AI and machine learning to improve performance. Here are some key tactics:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dynamic Content\"}),\": Customize messaging to align with a prospect's industry and specific tech vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Behavioral Triggers\"}),\": Automatically send follow-up emails based on how prospects engage with earlier messages.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive Analytics\"}),\": Use data-driven insights (as discussed in Strategy 3) to optimize timing and trigger relevant content.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Additionally, automated email performance data integrates directly with Sorva's engagement analytics (see Strategy 1), ensuring a continuous feedback loop for improvement.\"}),/*#__PURE__*/e(\"h2\",{children:\"8. Implementing Retargeting and Multi-Channel Outreach\"}),/*#__PURE__*/t(\"p\",{children:[\"Retargeting and multi-channel outreach strategies are particularly effective for managing the long, complex sales cycles often seen in cybersecurity solutions. Multi-channel campaigns, in fact, can lead to a \",/*#__PURE__*/e(\"strong\",{children:\"287% higher purchase rate\"}),\" compared to single-channel efforts. This approach combines AI insights from Sorva (Strategy 1) with engagement data from email automation tools (Strategy 7).\"]}),/*#__PURE__*/e(\"h3\",{children:\"Coordinating Multiple Channels\"}),/*#__PURE__*/e(\"p\",{children:\"A well-coordinated strategy ensures each channel serves a specific purpose:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Channel</strong> | <strong>Purpose</strong> |\\n| --- | --- |\\n| <strong>Email</strong> | Initial outreach and nurturing |\\n| <strong>LinkedIn Ads</strong> | Building brand awareness |\\n| <strong>Retargeting Ads</strong> | Reinforcing your solution |\\n| <strong>Phone</strong> | Adding a personal touch |\\n| <strong>Virtual Events</strong> | Encouraging deeper engagement |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"AI-Driven Personalization in Action\"}),/*#__PURE__*/t(\"p\",{children:[\"Darktrace offers a great example of using AI to enhance outreach. By showcasing VR demos at trade shows and then running targeted retargeting campaigns for attendees, they saw a \",/*#__PURE__*/e(\"strong\",{children:\"25% boost in qualified leads\"}),\". This success came from combining AI-driven dynamic content with predictive analytics (Strategy 3), Sorva's qualification metrics (Strategy 1), and AI-optimized timing for outreach.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Staying Privacy-Conscious\"}),/*#__PURE__*/e(\"p\",{children:\"As data protection regulations grow stricter, balancing effective retargeting with privacy is critical. Use consent management systems that prioritize transparency and limit data collection to what's absolutely necessary. This aligns with Sorva's data protection practices highlighted in Strategy 1.\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Metrics to Monitor\"}),/*#__PURE__*/e(\"p\",{children:\"To measure the impact of your campaigns, focus on these metrics:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Click-Through Rate (CTR):\"}),\" Often 2-3x higher than standard ads\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retargeted Conversion Rates:\"}),\" Typically 20% better than non-retargeted efforts\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cross-Channel Engagement:\"}),\" A strong indicator of campaign success\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion\"}),/*#__PURE__*/t(\"p\",{children:[\"The world of B2B cybersecurity lead generation is evolving fast, thanks to AI and automation. According to the latest Salesforce State of Marketing report, \",/*#__PURE__*/e(\"strong\",{children:\"57% of B2B marketers now view AI as essential for their marketing efforts\"}),\". In cybersecurity, this translates to aligning threat intelligence with prospect risk profiles - a key feature of Strategy 1's AI-driven methods.\"]}),/*#__PURE__*/t(\"p\",{children:[\"These methods work together seamlessly. Take Darktrace, for example: they achieved a 25% increase in leads using Strategy 8. Similarly, Okta saw a 60% growth in qualified leads with Strategy 6. By combining \",/*#__PURE__*/e(i,{href:\"https://www.sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"AI-powered lead sourcing\"})}),\", personalized video demos, and multi-channel outreach, businesses can build a reliable system for growth.\"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:'\"In the rapidly evolving landscape of cybersecurity, companies that leverage AI and automation in their lead generation processes are not just staying competitive; they\\'re setting the new standard for customer acquisition and growth.\"'})}),/*#__PURE__*/e(\"p\",{children:\"Refining these approaches consistently makes a difference - companies that experiment and test see 50% higher conversion rates. Focus on tracking metrics across these three areas:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Metric Type | Key Indicators | Impact |\\n| --- | --- | --- |\\n| Immediate | Conversion Rates, Cost per Lead | Improved Efficiency |\\n| Short-term | Sales Cycle Length, Pipeline Velocity | Boosted Revenue |\\n| Long-term | Customer Lifetime Value, ROI | Sustained Growth |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"Success in the future will hinge on embracing new technologies while sticking to the data-driven strategies outlined here.\"}),/*#__PURE__*/e(\"h2\",{children:\"Related Blog Posts\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:{pathVariables:{RFL0qxx7v:\"7-lead-generation-automation-tools-compared-for-2025\"},unresolvedPathSlugs:{RFL0qxx7v:{collectionId:\"uHLUsNn2a\",collectionItemId:\"Y7Wh03XpW\"}},webPageId:\"UeNnpBozy\"},motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"7 Lead Generation Automation Tools Compared for 2025\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:\"/blog/5-ways-ai-is-transforming-sales-pipeline-management/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"5 Ways AI is Transforming Sales Pipeline Management\"})})})})]})]});export const richText1=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"Effective Cold Outreach Techniques for Cybersecurity Firms\"}),/*#__PURE__*/e(\"p\",{children:\"Cold outreach is essential for cybersecurity firms looking to grow in a competitive market. But it\u2019s not easy - complex solutions and client skepticism make it challenging. Here\u2019s how to overcome these obstacles and boost your outreach success:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use AI for Targeting\"}),\": Tools like \",/*#__PURE__*/e(i,{href:\"https://sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sorva\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://www.demandbase.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Demandbase\"})}),\" analyze technographic, firmographic, and intent data to identify the right prospects.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalized Messaging\"}),\": Tailor emails to specific industries, referencing real-time threats and compliance needs (e.g., HIPAA, GDPR).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-Channel Approach\"}),\": Combine email with LinkedIn for higher response rates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Build Trust Early\"}),\": Highlight certifications, offer free security assessments, and share case studies with measurable outcomes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Optimize Timing\"}),\": Send emails mid-week (9\u201311 AM) for better engagement.\"]})})]}),/*#__PURE__*/t(\"h2\",{children:[\"Write, Automate, and Scale Cold Outreach with \",/*#__PURE__*/e(i,{href:\"https://salesblink.io/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SalesBlink\"})}),\"'s AI\"]}),/*#__PURE__*/e(\"img\",{alt:\"SalesBlink\",className:\"framer-image\",height:\"720\",src:\"https://framerusercontent.com/images/NfXZH79JxJ5tyJbf66xiUd5dD3c.jpg\",srcSet:\"https://framerusercontent.com/images/NfXZH79JxJ5tyJbf66xiUd5dD3c.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/NfXZH79JxJ5tyJbf66xiUd5dD3c.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/NfXZH79JxJ5tyJbf66xiUd5dD3c.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/NfXZH79JxJ5tyJbf66xiUd5dD3c.jpg 2560w\",style:{aspectRatio:\"2560 / 1440\"},width:\"1280\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{\"--aspect-ratio\":\"560 / 315\",aspectRatio:\"560 / 315\",height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:NEd4VmDdsxM3StIUbddO/DDzyuYPF56TuI0bfUu2z/YouTube.js:Youtube\",children:t=>/*#__PURE__*/e(o,{...t,play:\"On\",shouldMute:!1,thumbnail:\"Medium Quality\",url:\"https://youtube.com/watch?v=TdHeeN3M0ls\"})})}),/*#__PURE__*/e(\"h2\",{children:\"Using AI for Lead Generation in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"AI tools are now transforming how companies identify businesses looking for cybersecurity solutions by analyzing key data streams.\"}),/*#__PURE__*/e(\"h3\",{children:\"Finding the Right Clients with AI\"}),/*#__PURE__*/e(\"p\",{children:\"AI systems focus on three main types of data to pinpoint potential clients:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technographic data\"}),\": This shows a company's existing security setup, helping to spot areas that may need improvement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Firmographic data\"}),\": This looks at company details like size and industry to determine fit.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Intent data\"}),\": This tracks online actions that suggest interest in cybersecurity solutions.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Platforms like \",/*#__PURE__*/e(i,{href:\"https://www.zoominfo.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"ZoomInfo\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://bombora.com/de/home/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bombora\"})}),\" combine these insights to build detailed profiles of potential prospects. For example, when \",/*#__PURE__*/e(i,{href:\"https://www.crowdstrike.com/en-us/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Crowdstrike\"})}),\" implemented Demandbase in 2023, they saw a 78% increase in marketing-qualified leads and reduced acquisition costs by 25% \",/*#__PURE__*/e(i,{href:\"https://www.socialsellinator.com/social-selling-blog/seo-article-writing\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[2]\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"With such precise targeting, platforms like Sorva can fully automate \",/*#__PURE__*/e(i,{href:\"https://www.sorva.ai/blog\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lead generation\"})}),\" workflows, saving time and resources.\"]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(i,{href:\"https://sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sorva\"})}),\"'s Automated Lead Generation Approach\"]}),/*#__PURE__*/e(\"img\",{alt:\"Sorva\",className:\"framer-image\",height:\"720\",src:\"https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg\",srcSet:\"https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/3Lao1mM5NtNLKGhbzIZ0DzohAY.jpg 2560w\",style:{aspectRatio:\"2560 / 1440\"},width:\"1280\"}),/*#__PURE__*/e(\"p\",{children:\"Sorva takes a hands-off approach to B2B cybersecurity lead generation. Unlike traditional tools that require constant oversight, Sorva handles everything - from finding prospects to setting up meetings. It focuses on qualified leads while staying compliant with GDPR and CCPA regulations.\"}),/*#__PURE__*/e(\"p\",{children:\"Some of Sorva's standout features include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automatically identifying companies with emerging security needs\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tailored outreach sequences for specific industries\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"AI-powered lead scoring\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Integration of real-time threat data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Automated checks for compliance with regulations like HIPAA, PCI DSS, and GDPR\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Real-Time Data for Better Outreach\"}),/*#__PURE__*/e(\"p\",{children:\"AI shines when it combines detailed prospect profiles with timely engagement. Three types of real-time data can make outreach more effective:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trigger events\"}),\" (e.g., downloading a whitepaper): Can boost engagement by 40%.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sector-specific threats\"}),\": Help close deals 25% faster.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Competitor activity tracking\"}),\": Drives a 35% increase in conversions.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Reaching out at the right time, based on active needs, ensures your message is relevant and positions you to address security challenges effectively.\"}),/*#__PURE__*/e(\"h2\",{children:\"Creating Effective Cold Outreach Messages for Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Once you've identified qualified leads using AI tools, the next step is crafting messages that can turn interest into action.\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Elements of a Strong Cold Email\"}),/*#__PURE__*/e(\"p\",{children:\"Writing cold emails for cybersecurity requires blending technical know-how with clear, concise communication. Use this proven structure to create compelling messages:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:'| Component | Example |\\n| --- | --- |\\n| <strong>Opening</strong> | \"I noticed [Company Name] recently expanded cloud operations.\" |\\n| <strong>Value Statement</strong> | \"We\u2019ve helped similar companies cut breach risks by 60% in just 3 months.\" |\\n| <strong>Pain Point</strong> | \"With ransomware attacks up 150% last year...\" |\\n| <strong>Proof</strong> | \"Trusted by [recognized company].\" |\\n| <strong>Call-to-Action</strong> | \"Do you have 15 minutes for a quick call this Thursday?\" |',language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Tackling Client-Specific Challenges\"}),/*#__PURE__*/e(\"p\",{children:\"Personalization is key to making your outreach resonate. Tailor your message to the unique challenges of the recipient's industry:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Financial Services\"}),\": Highlight solutions for regulatory compliance and safeguarding sensitive data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Healthcare\"}),\": Focus on HIPAA compliance and protecting patient information.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Make your outreach even more relevant by referencing real-time threat data identified through AI tools (as previously discussed). This shows you're addressing immediate risks, not just generic concerns.\"}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Case Studies for Trust\"}),/*#__PURE__*/e(\"p\",{children:\"Case studies can add credibility to your message. Keep these tips in mind:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Summarize results in \",/*#__PURE__*/e(\"strong\",{children:\"2-3 sentences\"}),\" with clear metrics.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Choose examples that are \",/*#__PURE__*/e(\"strong\",{children:\"industry-specific\"}),\" to the recipient.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Include a link to the full case study for those who want more details.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Improving Cold Outreach Campaigns\"}),/*#__PURE__*/e(\"p\",{children:\"Cold outreach works best when it's built on a strong foundation of compliance and technical reliability. Sorva's GDPR/CCPA compliance tools, combined with authentication protocols like SPF, DKIM, and DMARC, ensure your emails are trusted. But that's just the start - keeping your email lists clean is equally important for better delivery rates.\"}),/*#__PURE__*/e(\"h3\",{children:\"Email Deliverability and Timing\"}),/*#__PURE__*/t(\"p\",{children:[\"When it comes to email outreach, timing plays a major role in engagement. Aim to send emails mid-week (Tuesday to Thursday) for the best results. For example, emails sent during these times show \",/*#__PURE__*/e(\"strong\",{children:\"23% open rates\"}),\", compared to just \",/*#__PURE__*/e(\"strong\",{children:\"19% for evening sends\"}),\". Using a dedicated IP address also helps you build a strong sender reputation.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here's a breakdown of how timing affects engagement:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Send Time | Open Rate | Response Rate |\\n| --- | --- | --- |\\n| 9-11 AM | 23% | 4.8% |\\n| 2-4 PM | 21% | 3.9% |\\n| 7-8 PM | 19% | 2.7% |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"While good timing helps your emails stand out, combining email with other channels can take your outreach to the next level.\"}),/*#__PURE__*/e(\"h3\",{children:\"Using Multi-Channel Outreach\"}),/*#__PURE__*/t(\"p\",{children:[\"Pairing emails with other platforms like LinkedIn can dramatically boost response rates. For example, \",/*#__PURE__*/e(i,{href:\"https://cybershield-consulting.com/en/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CyberShield\"})}),\" saw a \",/*#__PURE__*/e(\"strong\",{children:\"3.6x increase in responses\"}),\" by combining threat-focused emails with LinkedIn insights about recent breaches.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s an effective sequence for multi-channel outreach:\"}),/*#__PURE__*/t(\"p\",{children:[\"1. \",/*#__PURE__*/e(\"strong\",{children:\"Initial Connection\"}),/*#__PURE__*/e(\"br\",{}),\" Kick things off with a LinkedIn connection request. Add a personalized note that highlights the prospect's specific cybersecurity concerns.\"]}),/*#__PURE__*/t(\"p\",{children:[\"2. \",/*#__PURE__*/e(\"strong\",{children:\"Email Follow-up\"}),/*#__PURE__*/e(\"br\",{}),\" Within 24-48 hours of connecting on LinkedIn, send a detailed email. Use insights from their public company data and any recent security incidents to make the email relevant.\"]}),/*#__PURE__*/t(\"p\",{children:[\"3. \",/*#__PURE__*/e(\"strong\",{children:\"Share Threat Analysis\"}),/*#__PURE__*/e(\"br\",{}),\" Follow up by sharing a threat analysis report tailored to their infrastructure vulnerabilities. This shows you\u2019ve done your homework and can provide real value.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Monitoring and Enhancing Campaign Performance\"}),/*#__PURE__*/e(\"p\",{children:\"Tracking the right metrics is key to improving your cold outreach. Sorva\u2019s engine uses engagement patterns to automatically adjust send times and content, ensuring your campaigns stay effective. Here are some benchmarks to aim for:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Metric | Target Benchmark | Optimization Method |\\n| --- | --- | --- |\\n| Open Rate | >25% | Test different subject lines |\\n| Response Rate | >8% | Personalize your messaging |\\n| Meeting Conversion | >15% | Sharpen your value proposition |\\n| Bounce Rate | <2% | Validate email addresses |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h2\",{children:\"Establishing Trust in Cold Outreach\"}),/*#__PURE__*/t(\"p\",{children:[\"A whopping 86% of IT decision-makers prioritize trust when choosing cybersecurity vendors \",/*#__PURE__*/e(i,{href:\"https://salesblink.io/integrations/halosecurity\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[1]\"})}),\". This makes credibility the cornerstone of any outreach strategy. To build trust, you need to showcase your expertise while addressing security concerns right from the start.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Showing Expertise in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Demonstrating authority means sharing insights that directly address your prospects' challenges. Combine AI-driven insights on vulnerabilities with clear trust signals to create a lasting impression.\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"\\\"In cybersecurity sales, trust isn't just important - it's everything. Your first outreach should immediately convey your expertise and commitment to the prospect's security.\\\" - Sarah Chen, VP of Sales at SecureNet, CSO Magazine\"})}),/*#__PURE__*/e(\"p\",{children:\"Here are key trust-building elements to include in your outreach:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Trust Signal</strong> | <strong>Impact on Response Rate</strong> | <strong>How to Implement</strong> |\\n| --- | --- | --- |\\n| Industry Certifications | +18% | Mention ISO 27001, SOC 2 credentials |\\n| Thought Leadership | +25% | Share original research or findings |\\n| Security Assessments | +32% | Offer free evaluations |\\n| Expert Commentary | +15% | Reference speaking engagements |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Tackling Security Concerns Early\"}),/*#__PURE__*/e(\"p\",{children:\"Addressing security concerns upfront can help ease hesitations. Incorporate GDPR and CCPA compliance into your communication practices to build confidence.\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Security Aspect</strong> | <strong>Approach</strong> | <strong>Impact on Engagement</strong> |\\n| --- | --- | --- |\\n| Data Privacy | Provide signed NDAs upfront | +28% engagement |\\n| Communication Security | Use encrypted communication | +22% trust rating |\\n| Compliance Standards | Highlight relevant certifications | +35% credibility |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Testimonials and Success Stories\"}),/*#__PURE__*/e(\"p\",{children:\"Success stories and testimonials can be powerful tools for building trust. Focus on measurable outcomes that align with your prospects' needs. For example, tailor certifications and metrics to match their regulatory requirements, identified through AI insights.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Key Metrics That Matter to Security Buyers:\"})}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Metric</strong> | <strong>Example Impact</strong> | <strong>Validation Method</strong> |\\n| --- | --- | --- |\\n| Threat Prevention | 75% fewer incidents | Verified by third-party audits |\\n| Response Time | 15-minute average response | Performance logs |\\n| Cost Savings | $2.5M saved annually | ROI calculations |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion: Streamlining Outreach with AI\"}),/*#__PURE__*/e(\"p\",{children:\"Now that we've covered trust-building techniques and ways to fine-tune campaigns, it's time for cybersecurity firms to focus on putting these strategies into action on a larger scale.\"}),/*#__PURE__*/e(\"h3\",{children:\"Steps to Implement Effective Outreach\"}),/*#__PURE__*/t(\"p\",{children:[\"1. \",/*#__PURE__*/e(\"strong\",{children:\"Assessment and Planning\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Review current outreach performance and compare it to industry standards.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Align your lead scoring system with AI-based qualification methods.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Set clear goals for response rates and cost-per-lead (CPL).\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"2. \",/*#__PURE__*/e(\"strong\",{children:\"Technology Integration\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Connect your systems with tools like threat intelligence platforms and SIEM systems.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Utilize Sorva's autonomous growth engine to sync directly with your CRM.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Set up data privacy controls to ensure compliance during lead generation.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"3. \",/*#__PURE__*/e(\"strong\",{children:\"Optimization and Scaling\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Run a 60-day pilot campaign targeting financial sector CISOs.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use the benchmarks from Chapter 4 to identify areas for improvement.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Expand successful strategies to other industry sectors.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Related Blog Posts\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:{pathVariables:{RFL0qxx7v:\"how-to-automate-b2b-lead-generation-step-by-step-guide\"},unresolvedPathSlugs:{RFL0qxx7v:{collectionId:\"uHLUsNn2a\",collectionItemId:\"ofu91F4hz\"}},webPageId:\"UeNnpBozy\"},motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How to Automate B2B Lead Generation: Step-by-Step Guide\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:\"/blog/top-8-outbound-lead-generation-strategies-for-b2b-cybersecurity/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Top 8 Outbound Lead Generation Strategies for B2B Cybersecurity\"})})})})]})]});export const richText2=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"Navigating Compliance in B2B Lead Generation\"}),/*#__PURE__*/t(\"p\",{children:[\"Compliance in B2B \",/*#__PURE__*/e(i,{href:\"https://www.sorva.ai/blog\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lead generation\"})}),\" is essential to avoid fines, protect your reputation, and maintain trust with clients. Key regulations like \",/*#__PURE__*/e(i,{href:\"https://gdpr.eu/what-is-gdpr/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GDPR\"})}),\" (EU), \",/*#__PURE__*/e(i,{href:\"https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CCPA\"})}),\" (California), and \",/*#__PURE__*/e(i,{href:\"https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CAN-SPAM\"})}),\" (Email) require explicit consent, data transparency, and secure handling of user data. Non-compliance risks include fines up to \u20AC20 million (\",/*#__PURE__*/e(i,{href:\"https://gdpr.eu/what-is-gdpr/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GDPR\"})}),\"), $7,500 per violation (CCPA), or $16,000 per email (CAN-SPAM). Cybersecurity companies face added pressure due to sensitive data.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Key Takeaways:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use consent management systems to track and document user permissions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Minimize data collection with encryption, access controls, and retention policies.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ensure email marketing meets CAN-SPAM standards: sender ID, clear opt-outs, and honest subject lines.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leverage AI tools for lead sourcing and consent tracking while maintaining human oversight.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conduct regular audits and train staff to stay updated on regulations.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Compliance Regulations for B2B Lead Generation\"}),/*#__PURE__*/t(\"h3\",{children:[\"Understanding \",/*#__PURE__*/e(i,{href:\"https://gdpr.eu/what-is-gdpr/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GDPR\"})}),\", \",/*#__PURE__*/e(i,{href:\"https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CCPA\"})}),\", and \",/*#__PURE__*/e(i,{href:\"https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CAN-SPAM\"})})]}),/*#__PURE__*/e(\"img\",{alt:\"GDPR\",className:\"framer-image\",height:\"720\",src:\"https://framerusercontent.com/images/igUBAHpnmeWJhsF0wc93PUn68BU.jpg\",srcSet:\"https://framerusercontent.com/images/igUBAHpnmeWJhsF0wc93PUn68BU.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/igUBAHpnmeWJhsF0wc93PUn68BU.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/igUBAHpnmeWJhsF0wc93PUn68BU.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/igUBAHpnmeWJhsF0wc93PUn68BU.jpg 2560w\",style:{aspectRatio:\"2560 / 1440\"},width:\"1280\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to B2B lead generation, three major regulations shape the landscape:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GDPR\"}),\" (Global/EU): Requires businesses to gain explicit consent, ensure data transparency, and allow users the right to have their data deleted. Non-compliance can result in fines of up to \u20AC20 million or 4% of annual revenue \",/*#__PURE__*/e(i,{href:\"https://www.fundz.net/b2b-leads-blog/ethical-b2b-lead-gen-best-practices-for-transparency-and-compliance\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[5]\"})}),\". \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CCPA\"}),\" (California/US): Grants California residents rights like data access, opt-outs, and full disclosure of how their data is used. Each violation carries a penalty of $7,500 \",/*#__PURE__*/e(i,{href:\"https://customers.ai/privacy-law-compliance/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[1]\"})}),\". \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CAN-SPAM\"}),\" (Email): Focuses on email marketing, requiring clear sender identification, honest subject lines, and easy opt-out options. Violations can lead to fines of up to $16,000 per email \",/*#__PURE__*/e(i,{href:\"https://sopro.io/resources/blog/us-compliant-b2b-emails/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[4]\"})}),\". \"]})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GDPR\"}),\" applies to any company handling the personal data of EU citizens, regardless of where the business is based. It prioritizes user control and transparency, making it a global standard for data privacy \",/*#__PURE__*/e(i,{href:\"https://www.fundz.net/b2b-leads-blog/ethical-b2b-lead-gen-best-practices-for-transparency-and-compliance\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[5]\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CCPA\"}),\", while specific to California, has influenced privacy practices across the U.S. It\u2019s particularly strict on B2B marketing, offering no exemptions for business-to-business communications \",/*#__PURE__*/e(i,{href:\"https://sopro.io/resources/blog/us-compliant-b2b-emails/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[4]\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CAN-SPAM\"}),\" is all about email compliance. It ensures that recipients know who is contacting them and makes opting out straightforward. This is crucial for B2B campaigns, where email outreach is a key strategy \",/*#__PURE__*/e(i,{href:\"https://customers.ai/privacy-law-compliance/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[1]\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"For cybersecurity providers, these regulations add extra layers of complexity, as trust is a cornerstone of their business.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compliance Risks for B2B Cybersecurity Companies\"}),/*#__PURE__*/e(\"p\",{children:\"Failing to comply with these regulations can have serious repercussions for cybersecurity firms. Here\u2019s what\u2019s at stake:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Massive Penalties\"}),\": GDPR fines can reach \u20AC20 million, while CCPA violations cost $7,500 each.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legal Costs\"}),\": Expenses for defending against lawsuits or settling claims can quickly add up.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Damaged Client Relationships\"}),\": Losing trust can result in clients taking their business elsewhere, directly impacting revenue.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Operational Disruptions\"}),\": Audits and necessary process changes can be both time-consuming and expensive.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These risks underscore the importance of the operational strategies discussed in the next section to ensure compliance and protect your business.\"}),/*#__PURE__*/e(\"h2\",{children:\"GDPR-Compliant Lead Generation for B2B\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{\"--aspect-ratio\":\"560 / 315\",aspectRatio:\"560 / 315\",height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:NEd4VmDdsxM3StIUbddO/DDzyuYPF56TuI0bfUu2z/YouTube.js:Youtube\",children:t=>/*#__PURE__*/e(o,{...t,play:\"On\",shouldMute:!1,thumbnail:\"Medium Quality\",url:\"https://youtube.com/watch?v=XlmpSdoz6hw\"})})}),/*#__PURE__*/e(\"h2\",{children:\"Steps to Create a Compliant Lead Generation Framework\"}),/*#__PURE__*/e(\"p\",{children:\"Creating a lead generation framework that meets compliance standards involves balancing regulatory obligations with effective marketing strategies. For cybersecurity providers, this means aligning lead generation efforts with data protection rules.\"}),/*#__PURE__*/e(\"h3\",{children:\"Setting Up Consent Management Systems\"}),/*#__PURE__*/e(\"p\",{children:\"A well-designed consent management system is crucial. It should include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Options for users to grant consent to individual sellers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Records of consent with timestamps\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Clear ways for users to opt out\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Comprehensive documentation of user preferences\"})})]}),/*#__PURE__*/e(\"p\",{children:\"These features help meet GDPR's explicit consent requirements, ensuring transparency and accountability.\"}),/*#__PURE__*/e(\"h3\",{children:\"Protecting Data and Minimizing Collection\"}),/*#__PURE__*/e(\"p\",{children:\"To comply with GDPR's focus on minimizing data collection, cybersecurity providers should implement the following:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Data Protection Element</strong> | <strong>Implementation Strategy</strong> |\\n| --- | --- |\\n| Data Encryption | Apply industry-standard encryption to secure stored lead data |\\n| Access Controls | Limit access to lead data using role-based permissions |\\n| Retention Policies | Define clear timelines for deleting unnecessary data |\\n| Access/Deletion Processes | Establish systems for managing data access and deletion requests |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"These steps help ensure that only necessary data is collected and stored securely.\"}),/*#__PURE__*/e(\"h3\",{children:\"Compliant Strategies for Outreach and Communication for Cybersecurity Teams\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to outreach, striking a balance between compliance and effectiveness is key. Alexandra Krasovec, Partner at Manatt, Phelps & Phillips, LLP, highlights the importance of proper consent:\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/t(\"p\",{children:['\"If you are making marketing outreach, again, get that heightened prior express written consent. It is the laundry list of things that you have to have\" ',/*#__PURE__*/e(i,{href:\"https://activeprospect.com/blog/fcc-lead-generation/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[3]\"})}),\".\"]})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Marketing Best Practices\"}),\": Ensure your email campaigns meet CAN-SPAM requirements by verifying sender identity, providing clear opt-out options, and maintaining updated consent records.\"]}),/*#__PURE__*/t(\"p\",{children:[\"For automated engagement, tools like \",/*#__PURE__*/e(i,{href:\"https://www.intercom.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Intercom\"})}),\" and \",/*#__PURE__*/e(i,{href:\"https://www.hubspot.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"HubSpot\"})}),\" offer solutions that integrate seamlessly with data protection requirements \",/*#__PURE__*/e(i,{href:\"https://www.vendasta.com/blog/lead-automation/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[2]\"})}),\". These platforms can help streamline compliance while maintaining effective communication efforts.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Using AI for Compliant Lead Generation\"}),/*#__PURE__*/e(\"p\",{children:\"AI is transforming how businesses approach lead generation, making it easier to stay compliant while improving efficiency. Unlike manual compliance systems, AI automates these processes, offering faster and more scalable solutions.\"}),/*#__PURE__*/e(\"h3\",{children:\"AI Tools for Sourcing Leads\"}),/*#__PURE__*/e(\"p\",{children:\"AI platforms help businesses find leads while staying on the right side of data laws. They automate tasks like analyzing data in real time and generating leads directly, reducing the need for risky manual data scraping.\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>AI Lead Generation Feature</strong> | <strong>Compliance Advantage</strong> |\\n| --- | --- |\\n| Autonomous Lead Discovery | Avoids risks tied to manual data scraping |\\n| Real-time Data Analysis | Keeps consent status up-to-date |\\n| Automated ICP Detection | Limits unnecessary data collection |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Ensuring AI Compliance with Data Laws\"}),/*#__PURE__*/e(\"p\",{children:\"AI systems are designed to align with regulations like GDPR, which emphasize user consent. These tools now handle permission tracking automatically, ensuring compliance through workflows that manage consent and minimize data use.\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:'\"AI is not a replacement for human judgment, but rather a tool to augment and support decision-making in lead generation.\"'})}),/*#__PURE__*/e(\"h3\",{children:\"Balancing AI Automation with Human Oversight\"}),/*#__PURE__*/e(\"p\",{children:\"When dealing with sensitive data, such as in cybersecurity, human oversight remains essential. It ensures that AI-generated leads meet strict standards for confidentiality and compliance.\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Oversight Element</strong> | <strong>Implementation Strategy</strong> |\\n| --- | --- |\\n| Compliance Audits | Conduct quarterly reviews of AI\u2019s consent tracking systems |\\n| Risk Triggers | Set up automated alerts for unusual data patterns |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"This mix of automated processes and human checks ensures businesses can scale lead generation without compromising on compliance.\"}),/*#__PURE__*/e(\"h2\",{children:\"Ongoing Compliance Monitoring\"}),/*#__PURE__*/e(\"p\",{children:\"Setting up compliant systems is just the beginning. Keeping them running smoothly - especially in cybersecurity - takes constant attention. Sensitive data demands nonstop oversight.\"}),/*#__PURE__*/e(\"h3\",{children:\"Regular Compliance Audits\"}),/*#__PURE__*/e(\"p\",{children:\"Quarterly audits help spot potential problems early, before they grow into bigger issues. These reviews should cover every part of your lead generation process, from how you collect data to how you store and use it.\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| <strong>Audit Component</strong> | <strong>Key Focus Areas</strong> |\\n| --- | --- |\\n| Data Collection Review | Consent methods, form compliance |\\n| Storage Assessment | Retention policies, security |\\n| Process Evaluation | Lead scoring, outreach automation |\\n| Documentation Check | Privacy policies, consent records |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Training Staff on Compliance\"}),/*#__PURE__*/e(\"p\",{children:\"Your team plays a huge role in keeping compliance consistent. That\u2019s why training should focus on real-world applications, not just theory.\"}),/*#__PURE__*/e(\"p\",{children:\"Key training topics include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Workshops on GDPR and CCPA requirements\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Hands-on practice with consent management tools\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Simulations for following security protocols\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Staying Updated on Regulatory Changes\"}),/*#__PURE__*/e(\"p\",{children:\"In cybersecurity, staying current with new data protection standards is critical - especially when working with sensitive client information. Assigning a compliance officer to track updates and integrating real-time alerts into your CRM can help you stay on top of changes. This way, you can adapt quickly and keep your lead generation efforts running smoothly without falling behind on regulations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion: Lead Generation with Compliance in Mind\"}),/*#__PURE__*/e(\"p\",{children:\"Generating B2B leads while staying compliant builds trust and supports revenue growth. With evolving regulations, cybersecurity providers must rethink how they approach lead generation, especially when it comes to managing data privacy.\"}),/*#__PURE__*/e(\"p\",{children:\"As highlighted earlier, modern tools can now automate tasks like consent management, data protection, and lead qualification - all while ensuring compliance. However, human oversight remains essential to verify AI outputs, particularly in cybersecurity, where handling sensitive data demands strict controls.\"}),/*#__PURE__*/e(\"p\",{children:\"To succeed, businesses should implement the consent systems and AI oversight methods discussed in previous sections. Pairing these with the audit processes and training protocols already outlined can help create a reliable framework. This approach not only delivers quality leads but also safeguards a company\u2019s reputation and financial health.\"}),/*#__PURE__*/e(\"p\",{children:\"Aligning operations in this way ensures steady revenue while fostering the trust that cybersecurity providers depend on. By leveraging advanced AI tools and maintaining strong consent management practices, organizations can navigate today\u2019s regulatory challenges and achieve effective, compliant lead generation.\"}),/*#__PURE__*/e(\"h2\",{children:\"Related Blog Posts\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:{pathVariables:{RFL0qxx7v:\"how-to-automate-b2b-lead-generation-step-by-step-guide\"},unresolvedPathSlugs:{RFL0qxx7v:{collectionId:\"uHLUsNn2a\",collectionItemId:\"ofu91F4hz\"}},webPageId:\"UeNnpBozy\"},motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How to Automate B2B Lead Generation: Step-by-Step Guide\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:\"/blog/top-8-outbound-lead-generation-strategies-for-b2b-cybersecurity/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Top 8 Outbound Lead Generation Strategies for B2B Cybersecurity\"})})})})]})]});export const richText3=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"CRM Integration Guide: Maximizing Lead Conversion Rates\"}),/*#__PURE__*/e(\"p\",{children:\"Want to improve lead conversions in B2B cybersecurity sales? Integrating a CRM system is the key. Here\u2019s what you\u2019ll gain:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"18-24% higher conversion rates\"}),\" with AI-powered tools (\",/*#__PURE__*/e(i,{href:\"https://www.forrester.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Forrester\"})}),\" 2024).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Faster workflows\"}),\" by automating lead tracking, scoring, and nurturing.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better sales and marketing alignment\"}),\" for smoother collaboration.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Centralized data\"}),\" for smarter decision-making.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Start by cleaning your CRM data, setting clear goals, and choosing tools like \",/*#__PURE__*/e(i,{href:\"https://www.salesforce.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Salesforce\"})}),\" or \",/*#__PURE__*/e(i,{href:\"https://www.hubspot.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"HubSpot\"})}),\". Then, leverage AI for lead scoring, personalized campaigns, and real-time qualification. Track metrics like lead-to-opportunity ratios and response times to continuously improve.\"]}),/*#__PURE__*/e(\"p\",{children:\"Ready to streamline your sales pipeline? Let\u2019s dive in.\"}),/*#__PURE__*/e(\"h2\",{children:\"Make.com CRM Automations & How to Build A Scalable Sales System\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{\"--aspect-ratio\":\"560 / 315\",aspectRatio:\"560 / 315\",height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:NEd4VmDdsxM3StIUbddO/DDzyuYPF56TuI0bfUu2z/YouTube.js:Youtube\",children:t=>/*#__PURE__*/e(o,{...t,play:\"On\",shouldMute:!1,thumbnail:\"Medium Quality\",url:\"https://youtube.com/watch?v=QJ7Kinz7wgk\"})})}),/*#__PURE__*/e(\"h2\",{children:\"Preparing Your CRM for Integration\"}),/*#__PURE__*/e(\"p\",{children:\"Before diving into advanced lead conversion strategies, it\u2019s important to get your CRM ready. A well-prepared CRM sets the stage for smoother integration and better results.\"}),/*#__PURE__*/e(\"h3\",{children:\"Auditing and Cleaning CRM Data\"}),/*#__PURE__*/e(\"p\",{children:\"Start by auditing your CRM data. Clean, accurate information is the backbone of effective lead scoring and improved conversions. Here\u2019s how to ensure your data is in top shape:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Eliminate duplicate entries\"}),\": Use tools that automatically identify and merge duplicate records.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Update outdated information\"}),\": Double-check email addresses, phone numbers, and company details for accuracy.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standardize data formats\"}),\": Keep fields like phone numbers, addresses, and company names consistent across the board.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Clean data ensures lead scoring models perform as they should.\"}),/*#__PURE__*/e(\"h3\",{children:\"Setting Integration Goals and KPIs\"}),/*#__PURE__*/e(\"p\",{children:\"Clear goals and measurable KPIs are essential for a successful integration. Use this framework to guide your planning:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Metric | Target |\\n| --- | --- |\\n| Lead-to-Opportunity Rate | 10-15% improvement |\\n| Average Sales Cycle Length | 20-30% reduction |\\n| Data Accuracy Score | 95%+ |\\n| Lead Response Time | Under 1 hour |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"These benchmarks help you track progress and make data-driven adjustments.\"}),/*#__PURE__*/e(\"h3\",{children:\"Choosing CRM Tools and Platforms\"}),/*#__PURE__*/e(\"p\",{children:\"Pick CRM tools that fit your goals and work well with your current tech setup. Here\u2019s what to consider when evaluating platforms:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How well it integrates with your existing marketing tools\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Whether it can scale as your business grows\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Availability of built-in AI features\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"How easy it is for your team to adopt\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Platforms like Salesforce, HubSpot, and \",/*#__PURE__*/e(i,{href:\"https://sorva.ai/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Sorva\"})}),\" are popular choices, offering strong integration options tailored to B2B lead conversion. Those with built-in AI features are especially useful for the advanced lead scoring techniques we\u2019ll discuss next.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Using AI for Lead Scoring and Nurturing\"}),/*#__PURE__*/e(\"h3\",{children:\"AI-Driven Lead Scoring\"}),/*#__PURE__*/t(\"p\",{children:[\"Once your CRM data is cleaned and organized, AI can step in to rank leads based on their potential. AI-powered systems analyze multiple data points - like behavior, demographics, and past interactions - to predict which leads are most likely to convert. These systems continuously learn and refine their scoring criteria by observing actual outcomes \",/*#__PURE__*/e(i,{href:\"https://getdatabees.com/lead-scoring-and-crm-integration/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[2]\"})}),\".\"]}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Lead Scoring Component | AI Insights |\\n| --- | --- |\\n| Behavioral Data | Monitors actions like website visits, content downloads, and email clicks |\\n| Demographic Info | Assesses factors such as company size, industry, and location |\\n| Interaction History | Reviews email replies, meeting attendance, and chat activity |\\n| Purchase Intent | Tracks visits to product pages, pricing inquiries, and demo requests |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Personalized Lead Nurture Campaigns\"}),/*#__PURE__*/t(\"p\",{children:[\"AI takes lead nurturing to the next level by delivering tailored messaging at scale. By analyzing engagement patterns, AI can adjust the timing, format, and content of messages to match individual preferences. It considers factors like past interactions, preferred communication channels, industry challenges, and the lead\u2019s current stage in the buying process \",/*#__PURE__*/e(i,{href:\"https://www.eweek.com/artificial-intelligence/ai-for-lead-generation/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[4]\"})}),/*#__PURE__*/e(i,{href:\"https://improvado.io/blog/ai-lead-generation-tools-best-practices\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[3]\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Automating Lead Qualification\"}),/*#__PURE__*/t(\"p\",{children:[\"AI streamlines lead qualification by applying consistent criteria and learning from past results. Tools like \",/*#__PURE__*/e(i,{href:\"https://www.drift.com/platform/conversational-marketing/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Drift\"})}),\" or \",/*#__PURE__*/e(i,{href:\"https://www.intercom.com/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Intercom\"})}),\" integrate with CRMs to engage visitors in real-time, qualifying leads around the clock \",/*#__PURE__*/e(i,{href:\"https://improvado.io/blog/ai-lead-generation-tools-best-practices\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[3]\"})}),\". This automation saves time, ensures uniform evaluations, and provides instant feedback for high-value prospects. The data collected also feeds into conversion tracking metrics, which will be discussed later.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Tracking and Improving CRM Integration\"}),/*#__PURE__*/e(\"h3\",{children:\"Metrics for Lead Conversion\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Metric Type | What to Track | Why It Matters |\\n| --- | --- | --- |\\n| <strong>Conversion Efficiency</strong> | Lead-to-opportunity ratio | Evaluates how effectively leads are qualified |\\n| <strong>Response Time</strong> | Time-to-contact | Reflects team responsiveness and engagement speed |\\n| <strong>Resource Allocation</strong> | Customer acquisition cost | Measures how efficiently resources are used for lead conversion |\\n| <strong>Pipeline Velocity</strong> | Deal cycle duration | Highlights how quickly deals move through the sales process |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"These metrics directly support actionable decisions when reviewed through your CRM's reporting tools.\"}),/*#__PURE__*/e(\"h3\",{children:\"Analyzing Data for Insights\"}),/*#__PURE__*/t(\"p\",{children:[\"CRM analytics reveal patterns that can sharpen your lead conversion efforts. By leveraging AI-driven scoring models, you can connect predictions with real-world outcomes. For instance, analyzing lead scoring data helps pinpoint the factors that most often lead to successful conversions, allowing you to fine-tune your scoring models \",/*#__PURE__*/e(i,{href:\"https://huble.com/blog/hubspot-ai-lead-scoring\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[1]\"})}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Take this example: A cybersecurity company using HubSpot's AI scoring saw a 40% improvement in qualification accuracy after aligning their scoring criteria with historical conversion trends \",/*#__PURE__*/e(i,{href:\"https://huble.com/blog/hubspot-ai-lead-scoring\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[1]\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Strategies for Continuous Improvement\"}),/*#__PURE__*/e(\"p\",{children:\"To maintain and expand the benefits of AI-powered conversions, focus on these strategies:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Quality Management\"}),\": Implement strict data governance to ensure accuracy and reliability.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process Automation\"}),\": Use automation for tasks like predictive follow-ups and prioritizing dynamic workflows.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Team Training\"}),\": Regularly train your team on new CRM tools and best practices.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Keep a close eye on your CRM metrics, reviewing them weekly or monthly. Spotting trends early allows you to make timely adjustments. For example, if certain lead types consistently convert better, update your lead scoring criteria to reflect this \",/*#__PURE__*/e(i,{href:\"https://getdatabees.com/lead-scoring-and-crm-integration/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[2]\"})}),\".\"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/t(\"p\",{children:['\"Regular review and analysis of CRM data is crucial to make informed decisions and drive continuous improvement in lead conversion strategies\", emphasizes a recent industry analysis ',/*#__PURE__*/e(i,{href:\"https://getdatabees.com/lead-scoring-and-crm-integration/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[2]\"})}),/*#__PURE__*/e(i,{href:\"https://partners.caring.com/blog/maximize-lead-efficiency-with-caring-crm-integration/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"[5]\"})}),\".\"]})}),/*#__PURE__*/e(\"h2\",{children:\"Conclusion: Improving Lead Conversion with CRM\"}),/*#__PURE__*/e(\"h3\",{children:\"Key Takeaways\"}),/*#__PURE__*/e(\"p\",{children:\"Integrating CRM systems effectively can transform how B2B cybersecurity companies handle lead conversion. By incorporating AI-powered tools, traditional lead management evolves into a more automated, data-focused process that drives better results.\"}),/*#__PURE__*/t(\"p\",{children:[\"With proper integration, businesses can benefit from more precise lead scoring, tailored nurturing campaigns (as highlighted in the AI-Driven Lead Scoring examples), and smoother workflows that align with sales cycle goals. These advancements directly support the metrics discussed in \",/*#__PURE__*/e(\"em\",{children:\"Tracking and Improving CRM Integration\"}),\", creating a streamlined system for boosting conversions.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Implementation Steps\"}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s a simple breakdown of the process:\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(n,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/HTBsNkEMAb7TUGaO3DBy/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Phase | Actions to Take |\\n| --- | --- |\\n| <strong>Assessment</strong> | Review your current CRM setup and data quality |\\n| <strong>Planning</strong> | Set clear goals and choose the right tools |\\n| <strong>Execution</strong> | Introduce AI-driven lead scoring and automation |\\n| <strong>Optimization</strong> | Continuously analyze performance and refine |\",language:\"JSX\"})})}),/*#__PURE__*/e(\"p\",{children:\"To see the best outcomes, stick to the audit and KPI framework established during the preparation phase. This ensures all efforts are aligned with your broader goals.\"}),/*#__PURE__*/e(\"h2\",{children:\"Related Blog Posts\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:{pathVariables:{RFL0qxx7v:\"how-to-automate-b2b-lead-generation-step-by-step-guide\"},unresolvedPathSlugs:{RFL0qxx7v:{collectionId:\"uHLUsNn2a\",collectionItemId:\"ofu91F4hz\"}},webPageId:\"UeNnpBozy\"},motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How to Automate B2B Lead Generation: Step-by-Step Guide\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(i,{href:\"/blog/5-ways-ai-is-transforming-sales-pipeline-management/\",motionChild:!0,nodeId:\"uHLUsNn2a\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"5 Ways AI is Transforming Sales Pipeline Management\"})})})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "qVAAAA,IAAqZ,IAAMC,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iKAA8KE,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,oFAAoF,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,wBAAqCA,EAAEC,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qJAAkKE,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,yBAAyB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,qIAAgI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4FAA4F,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,iBAAiB,YAAY,YAAY,YAAY,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,sEAAsE,SAASC,GAAgBJ,EAAEK,EAAE,CAAC,GAAGD,EAAE,KAAK,KAAK,WAAW,GAAG,UAAU,iBAAiB,IAAI,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeN,EAAE,KAAK,CAAC,SAAS,CAAC,YAAyBE,EAAEC,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,8CAA8C,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,QAAQ,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4dAA4d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,4NAA4N,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAAgO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+BE,EAAEC,EAAE,CAAC,KAAK,2BAA2B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,uGAAuG,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,0CAA0C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAA6R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,6BAA6B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAiJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,iBAAY,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,OAAO,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kJAA+JE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0BAA0B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,qHAAgH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,mBAAmB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yCAAyC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sKAAmLE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,oVAAoV,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sIAAmJE,EAAEC,EAAE,CAAC,KAAK,mCAAmC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,YAAyBF,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,qCAAkDF,EAAEC,EAAE,CAAC,KAAK,iEAAiE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,2LAA2L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mNAAgOE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,gKAAgK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,qEAAiY,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,wLAAwL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4KE,EAAE,SAAS,CAAC,SAAS,2EAA2E,CAAC,EAAE,oJAAoJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kNAA+NE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,4GAA4G,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,4OAA6O,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA,iEAAmR,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,sDAAsD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAsP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gBAA6BA,EAAEC,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,8BAA8B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8DAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,iDAA8DE,EAAEC,EAAE,CAAC,KAAK,yBAAyB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,aAAa,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,iBAAiB,YAAY,YAAY,YAAY,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,sEAAsE,SAASC,GAAgBJ,EAAEK,EAAE,CAAC,GAAGD,EAAE,KAAK,KAAK,WAAW,GAAG,UAAU,iBAAiB,IAAI,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+BE,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,+BAA+B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,gGAA6GF,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,8HAA2IF,EAAEC,EAAE,CAAC,KAAK,2EAA2E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,wCAAwC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,QAAQ,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAAuJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,gGAA8e,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,wBAAqCE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sBAAsB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,oBAAoB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sMAAmNE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,sBAAmCA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA,yBAA6I,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yGAAsHE,EAAEC,EAAE,CAAC,KAAK,yCAAyC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,UAAuBF,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,mFAAmF,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+DAA0D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iLAAiL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wKAAmK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAAyO,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,kDAAwS,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0GE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,iLAAiL,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,sOAAwO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,+DAAiZ,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA,iFAAiW,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA,4DAAuU,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,wDAAwD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkCE,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,gHAA6HF,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,UAAuBF,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,sBAAmCF,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,sJAA8JF,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,qIAAqI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,iBAA8BE,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,SAAsBF,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,OAAO,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,oOAA4OA,EAAEC,EAAE,CAAC,KAAK,2GAA2G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,8KAA2LA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wLAAqMA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,4MAAyNA,EAAEC,EAAE,CAAC,KAAK,2GAA2G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,mMAA2MA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0MAAuNA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oIAA0H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,kFAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,iBAAiB,YAAY,YAAY,YAAY,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,sEAAsE,SAASC,GAAgBJ,EAAEK,EAAE,CAAC,GAAGD,EAAE,KAAK,KAAK,WAAW,GAAG,UAAU,iBAAiB,IAAI,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,kGAA6b,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,4JAAyKE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,kKAAkK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,2BAA2B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,gFAA6FF,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,qGAAqG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA,kEAAqT,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA,uEAA8P,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,6DAAwU,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iZAAiZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA0T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,wDAAwD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAA4H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,2BAAwCA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8FE,EAAEC,EAAE,CAAC,KAAK,8BAA8B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,OAAoBF,EAAEC,EAAE,CAAC,KAAK,2BAA2B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,sLAAsL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8DAAyD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,iBAAiB,YAAY,YAAY,YAAY,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,sEAAsE,SAASC,GAAgBJ,EAAEK,EAAE,CAAC,GAAGD,EAAE,KAAK,KAAK,WAAW,GAAG,UAAU,iBAAiB,IAAI,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAA+K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAkL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,uCAAkN,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAmI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAEC,EAAE,CAAC,KAAK,oBAAoB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,oNAA+M,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iWAA8WE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,4FAAqa,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iXAAyXE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gHAA6HE,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,OAAoBF,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,2FAAwGF,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,mNAAmN,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,4HAA8iB,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iVAA8VE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,iMAA8ME,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0PAAuQE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,yLAAsME,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gSAA6SE,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gDAA2C,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEG,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBJ,EAAEM,EAAE,CAAC,GAAGF,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,iFAA8W,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,wDAAwD,EAAE,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAW,CAAC,EAAE,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EACn7/FQ,EAAqB,CAAC,QAAU,CAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["init_ssg_sandbox_shims", "richText", "u", "x", "p", "Link", "motion", "ComponentPresetsConsumer", "t", "Youtube", "CodeBlock_default", "richText1", "richText2", "richText3", "__FramerMetadata__"]
}
