{"id":21290,"date":"2018-02-26T09:16:31","date_gmt":"2018-02-26T14:16:31","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=21290"},"modified":"2022-05-05T11:14:53","modified_gmt":"2022-05-05T15:14:53","slug":"web-sas","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/web-sas\/","title":{"rendered":"SAS P.S. The business impact of threat discoveries unveiled at the Security Analyst Summit"},"content":{"rendered":"<style>h1 {font-size:14px}.sas-container{background-color:white;width:70%;margin:0 auto;padding:30px 60px}.stripe{width:70%}.webinars{grid-template-columns: 1fr 1fr;width:70%;}.webinars h2{grid-column:1\/3;} #day-5{grid-column:1\/3}@media (max-width: 1560px){.webinars{grid-template-columns: 1fr}.webinars h2{grid-column:1\/2;min-width:450px}.webinars iframe{min-width:410px}#day-5{grid-column:1\/2}.sas-container{padding:30px 15px}}.post_content iframe {background: white;padding: 20px;margin: 0;}@media (max-width: 860px){h1 {font-size:8px}.stripe, .webinars, .sas-container{width:100%}}@media (max-width: 540px){h1 {font-size:5px;line-height:1em!important}}<\/style>\n<div style=\"background-color:white;width:70%;margin:0 auto; padding:60px; position:absolute; top:-30px; left:0; right:0; height:60px; z-index: -1;\"><\/div>\n<div class=\"stripe\" style=\"background-color:white;margin:0 auto; padding:60px;position:absolute;bottom:40px;left:0;right:0;height:60px;z-index: -1;\"><\/div>\n<div class=\"sas-header-img\" style=\"width:100%;position: relative;margin-bottom: -30px;\">\n<img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/02\/28063824\/Web_SAS_logo2.jpg\" style=\"margin:0 auto\">\n<h1 style=\"text-align: center;font-family: 'museo_sans900', sans-serif;color: white;height: 98%;top: 0;width: 100%;display: flex;flex-direction: column;justify-content: center;position: absolute;background: url(https:\/\/sas.kaspersky.com\/wp-content\/themes\/sas\/img\/overlay4.png);\" class=\"sas-heading\"><strong><span style=\"font-size: 2em; line-height: 1.3em;\">Kaspersky <\/span><br><span style=\"font-size: 3.5em;line-height: 1.3em;\">SECURITY ANALYST SUMMIT P.S.<\/span><br><span style=\"font-size: 2.5em;line-height: 1.3em;\">The Business Impact of Threat Discoveries <br>Unveiled at the SAS 2018<\/span><\/strong><\/h1>\n<\/div>\n<div class=\"sas-container\">\n<p style=\"max-width:852px;margin:0 auto\">Welcome to our special \u2018post scriptum\u2019 edition of the Security Analyst Summit \u2013 an annual event featuring cutting-edge research and the latest technologies that encourages debate, information sharing and new ideas for collaboration in the fight against cyber-crime. You can find more on the findings presented at SAS in our <a href=\"http:\/\/securelist.com\" target=\"_blank\" rel=\"noopener noreferrer\">Securelist.com<\/a> blog.<br>\u00a0<br>\nIn SAS P.S., the focus is on money. Your money and how to keep it. Want to know more about the techniques cybercriminals could use against your business? And how you can spot and combat them to keep your company safe?<br>\u00a0<br>\nRegister for one or more of the webinars below and watch them live or on demand.\n<\/p>\n<\/div>\n<div class=\"webinars\" style=\"display: grid;grid-gap: 20px;margin:0 auto;background:white\">\n<div><a href=\"\" id=\"1\"><\/a><a href=\"\" id=\"2\"><\/a><\/div>\n<h2 style=\"text-align:center;margin-bottom: 0;\">Day 1, March 13, 2018:<\/h2>\n<p><iframe width=\"100%\" height=\"450px\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class=\"jsPlayer\" src=\"https:\/\/www.brighttalk.com\/service\/player\/en-US\/theme\/default\/channel\/15591\/webcast\/307101\/standalone?commid=296507&amp;b=89447\" style=\"overflow: hidden;\"><\/iframe><iframe width=\"100%\" height=\"450px\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class=\"jsPlayer\" src=\"https:\/\/www.brighttalk.com\/service\/player\/en-US\/theme\/default\/channel\/15591\/webcast\/307103\/standalone?commid=296507&amp;b=89447\" style=\"overflow: hidden;\"><\/iframe><\/p>\n<div><a href=\"\" id=\"3\"><\/a><a href=\"\" id=\"4\"><\/a><\/div>\n<h2 style=\"text-align:center;margin-bottom: 0;\">Day 2, March 14, 2018:<\/h2>\n<div><iframe width=\"100%\" height=\"490px\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class=\"jsPlayer\" src=\"https:\/\/www.brighttalk.com\/service\/player\/en-US\/theme\/default\/channel\/15591\/webcast\/307105\/standalone?commid=296507&amp;b=89447\" style=\"overflow: hidden;\"><\/iframe><\/div>\n<div><iframe width=\"100%\" height=\"470px\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class=\"jsPlayer\" src=\"https:\/\/www.brighttalk.com\/service\/player\/en-US\/theme\/default\/channel\/15591\/webcast\/307109\/standalone?commid=296507&amp;b=89447\" style=\"overflow: hidden;\"><\/iframe><\/div>\n<div><a href=\"\" id=\"5\"><\/a><\/div>\n<h2 style=\"text-align:center;margin-bottom: 0;\">Day 3, March 15, 2018:<\/h2>\n<div id=\"day-5\"><iframe width=\"100%\" height=\"470px\" scrolling=\"no\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"true\" class=\"jsPlayer\" src=\"https:\/\/www.brighttalk.com\/service\/player\/en-US\/theme\/default\/channel\/15591\/webcast\/307111\/standalone?commid=296507&amp;b=89447\" style=\"overflow: hidden;\"><\/iframe>\n<\/div>\n<\/div>\n<div class=\"sas-container\">\n<p style=\"max-width:852px;margin:0 auto\">Visit the <a target=\"_blank\" href=\"https:\/\/sas.kaspersky.com\/?utm_source=smm_kd&amp;utm_medium=ww_kd_o_010318\" rel=\"noopener noreferrer nofollow\">Kaspersky Security Analyst Summit<\/a> site to learn more about the event\u2019s agenda and participants.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our special &#8216;post scriptum&#8217; edition of the Security Analyst Summit \u2013 an annual event featuring cutting-edge research and the latest technologies that encourages debate, information sharing and new ideas for collaboration in the fight against cyber-crime.<\/p>\n","protected":false},"author":2706,"featured_media":21354,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/legacy-page.php","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-21290","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/web-sas\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21290"}],"version-history":[{"count":87,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21290\/revisions"}],"predecessor-version":[{"id":35187,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21290\/revisions\/35187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21354"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}