.cyber-security-oversight{padding-bottom:88px}.cyber-security-oversight .cyber-security-oversight-container{display:flex;align-items:center}.cyber-security-oversight .cyber-security-oversight-container .title{width:calc(50% - 87px);margin-right:87px;font-family:Montserrat;font-size:48px;font-weight:700}@media(max-width:930px){.cyber-security-oversight .cyber-security-oversight-container .title{font-size:32px}}.cyber-security-oversight .cyber-security-oversight-container .description{width:50%;font-family:Montserrat;font-size:16px;font-weight:400;line-height:1.5}@media(max-width:930px){.cyber-security-oversight .cyber-security-oversight-container .description{font-size:14px}.cyber-security-oversight{padding-bottom:79px}.cyber-security-oversight .cyber-security-oversight-container{flex-direction:column}.cyber-security-oversight .cyber-security-oversight-container .title{width:100%;margin-right:0;padding-bottom:42px}.cyber-security-oversight .cyber-security-oversight-container .description{width:100%}}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container{display:flex}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .left-column{width:50%}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .left-column .title{margin-right:87px;font-family:Montserrat;font-size:48px;font-weight:700}@media(max-width:930px){.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .left-column .title{font-size:32px}}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .right-column{width:50%}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .right-column .description{font-family:Montserrat;font-size:16px;font-weight:400;line-height:1.5;padding-bottom:39px}@media(max-width:930px){.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .right-column .description{font-size:14px}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container{flex-direction:column}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .left-column{width:100%}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .left-column .title{margin-right:0;padding-bottom:42px}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .right-column{width:100%}.cyber-security-tailored-solutions .cyber-security-tailored-solution-container .right-column .description{padding-bottom:42px}}