The SANS Institute was founded in 1989 to provide IT security and administration information and vendor-neutral training on those subjects. Since its inception, SANS has trained more than 165,000 individuals via in-class courses, training events, and technical conferences held throughout the world; self-paced online training (called SANS OnDemand); and interactive virtual training (called SANS vLive).
Course subjects from the SANS Institute include security essentials, hacking techniques, intrusion detection and incident response, network defense, mobile device security, auditing, digital forensics and related security topics. The “information” component of SANS includes the SANS reading Room, an extensive library of downloadable security research documents; the Internet Storm Center, which monitors and reports on malicious attacks and provides weekly bulletins and alerts; free security policy templates; the CIS Critical Security Controls for cyber defense and more.
SANS formed the Global Information Assurance Certification (GIAC) program to act as the certification arm for its training courses, ensuring that individuals meet knowledge and skills standards in specific areas of IT security. More than 165,000 GIAC credentials have been issued. GIAC certifications are well known and highly respected among employers and the information security industry. Even the United States National Security Agency (NSA) recognizes GIAC certifications.
GIAC offers more than 30 security certifications across introductory, intermediate, advanced and expert levels. According to SANS, GIAC certifications are unique because “they measure specific skills and knowledge areas rather than general infosec knowledge.” That means a typical GIAC certification requires rigorous preparation and hands-on experience. That’s why SANS training comes highly recommended.
Note: Another component of SANS is the SANS Technology Institute, which offers one security-related master’s degree – the Information Security Engineering (MSISE). The SANS Technology Institute also offers five graduate certificate programs focused on Cybersecurity Engineering (CORE), Cyber Defense Operations, Incident Response, Industrial Control Systems Security, and Penetration Testing and Ethical Hacking.
GIAC certifications fall within six specific domains, each with its own certification track:
Another certification “category” is the pinnacle GIAC certification – namely, the GIAC Security Expert (GSE). Some industry officials consider the GSE to be the premier security-related certification available today. Whereas most GIAC certifications can be achieved by passing a single multiple-choice exam, the GSE test includes both a multiple-choice component and a hands-on lab.
SANS offers four levels of certifications, including introductory, intermediate, advanced and expert. The table below is a modified version of the GIAC certification roadmap, which lists each certification by level and certification tracks.
Cyber Defense
Cyber Defense
ICS
Penetration Testing
Digital Forensics and Incident Handling
Management and Leadership
Cyber Defense
ICS
Penetration Testing
Digital Forensics and Incident Response
Developer
Management and Leadership
Other than the GSE, GIAC certifications require passing one test and have no prerequisites. That said, GIAC highly recommends SANS training courses, especially for candidates who don’t have adequate hands-on experience and aren’t able to self-study.
Once an application has been approved, candidates have four months to attempt the associated exam. (GIAC does not administer exams immediately upon conclusion of a training event; candidates must wait at least seven days to sit for the exam.) The cost of each GIAC exam is currently $1,899, which includes two practice exams. The lab test for the GSE is $2,459, and the written test is $499. (Note: Students can purchase and take an test as part of a training course, or they may purchase and take an test by itself.)
To remain certified, credential holders must renew their GIAC certifications every four years by earning 36 continuing professional education (CPE) credits. CPE credits may be earned by completing approved training or certifications, participating in continuing education, publishing a technical paper, completing certain graduate-level courses, getting community or work experience or participating in cyber range activities. A renewal fee of $429 is also required.
GIAC certifications cover the gamut of job roles in IT security today. GIAC-certified professionals work as security analysts or certified (two of the most common roles), information security engineers, network security admins, database administrators, developers, forensic specialists, risk managers and auditors.
Large organizations with security operations centers (SOCs) need SOC analysts, engineers and supervisors, as well as directors of cybersecurity. A bevy of companies also hire employees and consultants who perform incident response, penetration testing and the like.
With almost 314,000 security-related jobs open in the U.S. alone (and 3.5 million globally by 2021), a reasonably educated and experienced person stands a good chance of getting hired fairly quickly. Adding a security certification or two to your resume not only validates your skills, but it may get you noticed by a hiring manager or give you more leverage during salary negotiations.
SANS training courses and events vary in format and price, but candidates can expect to pay around $5,800 to $6,610 for a training course. Although the price tag is high, many candidates recommend SANS training for its quality and depth as well as its usefulness in eventually achieving GIAC certification. SANS instructors are usually industry experts and/or full-time security practitioners, and invariably get glowing reviews from course attendees.
Candidates who attempt GIAC certification exams should consider taking practice questions beforehand. A VCE test mimics an actual test and is, therefore, a terrific study aid. All GIAC certification attempts (except for the GSE) come with two free practice exams. A few practice questions are also included with training courses. Candidates who don’t take training can purchase practice questions for $159 each by clicking a link in their SANS/GIAC portal account.
Ongoing financial challenges, increased efficiency at the executive level and the need to move more quickly with strategic decisions are some of the key reasons health systems across the country are restructuring operations and leadership teams.
Here are six systems shuffling executive leaders or restructuring operations that Becker's Hospital Review has reported on since Jan. 1:
1. Boston-based Mass General Brigham is doing away with CEO titles for its community hospitals, with those leaders operating instead as presidents and COOs. On March 1, David Roberts, MD, president of Salem (Mass.) Hospital, will become senior vice president of community operations, overseeing financial and clinical initiatives for the system's six community hospitals. He will also combine and oversee six employed physician groups under Mass General Brigham Medical Group.
2. Philadelphia-based Jefferson Health plans to go from five divisions to three in an effort to streamline management and Boost efficiency. Under the plan, the 18-hospital system will group its wholly owned hospitals into the northern region. The restructuring will result in job cuts, mainly among executives.
3. Chillicothe, Ohio-based Adena Health System is eliminating 69 positions and sending 340 revenue cycle department employees to Ensemble Health Partners' payroll. Half of the staff in affected positions are qualified to fill open roles at the system, and the remaining employees will be eligible for severance and outplacement assistance.. President and CEO Jeff Graham cited the increased costs for hospital operations and inadequate reimbursement for care as key reasons for the cost-cutting measures.
4. Dallas-based Tenet Healthcare announced nine executive changes that will take place in 2023, including the retirement of Daniel Cancelmi, Tenet's executive vice president and CFO, and Brett Brodnax, president and CEO of United Surgical Partners International. Here are seven other executive moves taking place across the system.
5. El Segundo, Calif.-based Pipeline Health System expects to emerge from bankruptcy in the coming weeks after a monthslong restructuring process that included selling two Chicago hospitals and securing financial agreements with key stakeholders to support its future. Key leadership changes are also taking place. CFO Bob Allen will become CEO, replacing Andrei Soran in the role. Joe Badalian, COO; Traci Bowen, chief human resources officer; and Bob Frank, MD, chief medical officer, will step down from their roles to pursue other opportunities.
6. Gainesville, Fla.-based UF Health Shands promoted two C-suite executives after shuffling some leadership responsibilities. Previously, the chief medical officer and chief of staff responsibilities were combined into one role. Now they will be separate. Timothy Morey, MD, chair of the anesthesiology department, was promoted to chief medical officer. Jennifer Hunt, MD, was tapped for chief of staff, a role she will hold simultaneously with her current role as chair of the department of pathology, immunology and laboratory medicine at UF College of Medicine.
There is an appreciable number of available, high-quality certification programs that focus on digital investigations and forensics. However, there are also many certifications and programs in this area that are far less transparent and widely known.
There’s been a steady demand for digital forensics certifications for the past several years, mainly owing to the following:
As a result, there is a continuing rise of companies that offer digital forensics training and certifications. Alas, many of these are “private label” credentials that are not well recognized. Making sense of all options and finding the right certification for you may be trickier than it seems.
To help choose our top five certifications for 2019, we looked at several popular online job boards to determine the number of advertised positions that require these certifications. While the actual results vary from day to day and by job board, this should give you an idea of the number of digital forensic jobs with specific certification requirements.
Certification | SimplyHired | Indeed | LinkedIn Jobs | LinkUp | Total |
---|---|---|---|---|---|
Vendor neutral | |||||
CFCE (IACIS) | 63 | 82 | 117 | 46 | 308 |
CHFI (EC-Council) | 106 | 140 | 253 | 68 | 567 |
GCFA (SANS GIAC) | 422 | 489 | 857 | 294 | 2,062 |
GCFE (SANS GIAC) | 203 | 226 | 433 | 143 | 1,005 |
Vendor specific | |||||
ACE (AccessData) | 25 | 29 | 31 | 12 | 97 |
EnCE (EnCase) | 110 | 154 | 237 | 114 | 615 |
*We covered two GIAC credentials, presented together in a single GIAC section below.
Digital forensics is a relatively lucrative space for practitioners. The average salary for intermediate digital forensic jobs in the U.S. – $63,959, according to SimpyHired – trails that of network engineers, system administrators and project managers. However, a senior specialist or forensic analyst, whether working in the private industry or government channels, will often earn six figures in major metro areas. We found salaries on the high end running almost $107,000 for forensic analysts and more than $127,000 for digital forensic roles.
AccessData is the maker of the popular Forensic Toolkit (FTK) solution for digital investigations. The company also offers a variety of related products and services, such as AD Lab, AD eDiscovery, AD Enterprise and AD Triage.
The AccessData Certified Examiner (ACE) is worth pursuing for those who already use or plan to use FTK, which enjoys widespread use in law enforcement and private research and consulting firms. The certification requires one exam, which covers the FTK Imager, Registry Viewer, PRTK (Password Recovery Toolkit) and FTK Examiner Application/Case Management Window tools in detail. AccessData recommends basic to moderate forensic knowledge before attempting the exam. This includes an understanding of digital artifacts, Registry files, encrypting and decrypting files, hashing, attack types, using live and index searching, and other topics. See the latest ACE Study Guide for details.
Recertification is required every two years. Credential holders must pass the current ACE exam, which focuses on the most current versions of FTK and other tools, to maintain their credentials.
Certification name | AccessData Certified Examiner (ACE) |
---|---|
Prerequisites and required courses | None; training recommended:
AccessData FTK BootCamp (three-day classroom or live online) FTK Intermediate courses |
Number of exams | One test (ACE 6); includes knowledge-based and practical portions
Registration required to receive a join code to access the testing portal |
Cost per exam | $100 (exam fee includes retakes and recertification exams) |
URL | http://accessdata.com/training/computer-forensics-certification |
Self-study materials | There is a link to the free ACE Study Guide is on the certification webpage. The testing portal includes study videos, lessons in PDF and a VCE test (with an image file). |
The International Association of Computer Investigative certified (IACIS) is the organization behind the Certified Forensic Computer Examiner (CFCE) credential. This organization caters primarily to law enforcement personnel, and you must be employed in law enforcement to qualify for regular IACIS membership.
A formal application form, along with an application fee, is necessary to join IACIS. Regular membership includes current computer/digital forensic practitioners who are current or former government or law enforcement employees or forensic contractors to a government agency. All other practitioners can apply for Associate membership to IACIS, provided they can pass a background check. Membership fees and annual renewal fees are required. IACIS membership is not required to obtain the CFCE credential.
To obtain the CFCE credential, candidates must demonstrate proficiency with CFCE core competencies. One option is IACIS’ Basic Computer Forensic Examiner (BCFE) two-week training course; it meets the 72-hour training requirement, costs $2,995, includes a free laptop and waives the IACIS membership fee for nonmembers. IACIS membership is required to attend the course. Candidates completing the training course can enroll directly in the CFCE program upon completion of the course. Those not attending the BCFE course may meet the 72-hour training requirement with a comparable course (subject to IACIS approval), pay a $750 registration fee, and successfully pass a background check to enroll in the CFCE program and sit for the exam.
The CFCE test is a two-step testing process that includes a peer review and CFCE certification testing:
Upon completion of both the peer review and the certification phase, candidates must submit a notarized form certifying that the practical and written exams were completed independently without assistance from anyone else.
Certificants must recertify every three years to maintain the CFCE credential. Recertification requires proof of at least 40 hours of professional education, a passing score on a proficiency test in the third year, proof of computer/digital forensics work experience, or passing scores on three proficiency tests within three years, and either three years of IACIS membership or payment of a $150 recertification fee.
Despite the time and expense involved in earning a CFCE, this credential has high value and excellent name recognition in the computer forensics field. Many forensics professionals consider the CFCE a necessary merit badge to earn, especially for those who work in or for law enforcement.
Certification name | Certified Forensic Computer Examiner (CFCE) |
---|---|
Prerequisites and required courses | Basic Computer Forensics Examiner (BCFE) training course recommended ($2,995)
72 hours of training in computer/digital forensics comparable to CFCE core competencies; BCFE training course meets training requirement Without BCFE training: take a comparable course, pay $750 registration fee and pass a background check |
Number of exams | Two-part process: Peer review (must pass to proceed to subsequent phase) and certification phase (includes hard-drive practical and written examination) |
Cost per exam | Included in BCFE training; $750 for the entire testing process for those not attending BCFE training |
URL | https://www.iacis.com/certification-2/cfce/ |
Self-study materials | IACIS is the primary conduit for training and study materials for this certification. |
The EC-Council is a well-known training and certification organization that specializes in the areas of anti-hacking, digital forensics and penetration testing. The organization’s Computer Hacking Forensic Investigator (CHFI) certification emphasizes forensics tools, analytical techniques, and procedures involved in obtaining, maintaining, and presenting digital forensic evidence and data in a court of law.
The EC-Council offers training for this credential but permits candidates to challenge the test without taking the course, provided they have a minimum of two years of information security experience and pay a non-refundable $100 eligibility application fee.
The CHFI course covers a wide range of subjects and tools (click the test Blueprint button on the certification webpage). subjects include an overview of digital forensics, in-depth coverage of the computer forensics investigation process, working with digital evidence, anti-forensics, database and cloud forensics, investigating network traffic, mobile and email forensics, and ethics, policies and regulations. Courseware is available, as well as instructor-led classroom training.
The EC-Council offers numerous other certifications of potential value to readers interested in the CHFI. These include the Certified Ethical Hacker (CEH), CEH (Practical), EC-Council Certified Security Analyst (ECSA), ECSA Practical, Certified Network Defender (CND) and Licensed Penetration Tester (LPT), Certified Application Security Engineer (CASE), and Certified Chief Information Security Officer (CCISO). It also offers credentials in related areas such as disaster recovery, encryption and security analysis. Visit the EC-Council site for more info on its popular and respected credentials.
Certification name | Computer Hacking Forensic Investigator (CHFI) v9 |
---|---|
Prerequisites and required courses | Application with resume and current or previous employer info required.
Candidates must agree to the EC-Council Non-Disclosure, Candidate Application and Candidate Certification agreement terms. Training recommended but not required:
To challenge the test without training, you must have two years of information security work experience and/or education to reflect specialization, pay a non-refundable application fee of $100, and complete the Exam Eligibility Application Form. More information on the application process is located on the Application Eligibility Process webpage. |
Number of exams | One exam: EC0 312-49 (150 questions, four hours, passing score 70 percent, multiple choice). Available through the ECC test portal. |
Cost per exam | $500 (plus $100 application fee; candidates who do not participate in training must pay a $650 test fee plus $100 application fee) |
URL | https://www.eccouncil.org/programs/computer-hacking-forensic-investigator-chfi/ |
Self-study materials | Visit the EC-Council Store and search for “CHFI” for preparation materials, including labs. Study guide and test guides are available on Amazon, as well as some practice exams. |
Guidance Software, acquired by OpenText in 2017, is a leader in the forensics tools and services arena. Its well-known and widely used EnCase Forensic software helps professionals acquire data from many different types of devices, complete disk-level examinations and produce reports of their findings. The company also sells software for remote investigations (EnCase Endpoint Investigator), eDiscovery, risk management, mobile investigations and endpoint security.
The company’s certification program includes the Certified Forensic Security Responder (CFSR), EnCase Certified eDiscovery Practitioner (EnCEP) and EnCase Certified Examiner (EnCe). Available to professionals in the public and private sector, the EnCE recognizes an individual’s proficiency using EnCase Forensic software and mastery of computer investigation methodology, including evidence collection, preservation, file verification, file signatures and hashing, first responder activities, and much more.
To achieve EnCe certification, candidates must show proof of a minimum of 64 hours of authorized computer forensic training or 12 months of qualified work experience, complete an application, and then successfully complete a two-phase test that includes a written and practical portion.
EnCE certifications are valid for three years from the date obtained. Recertification requires one of the following:
Certification name | EnCase Certified Examiner (EnCe) |
---|---|
Prerequisites and required courses | Required: 64 hours of authorized computer forensic training or 12 months of work experience in computer forensics
Training options through Guidance Software:
Completion of the EnCE application |
Number of exams | One two-phase exam:
Passing the Phase I test earns an electronic license to complete the Phase II exam. |
Cost per exam | $200 total, or $300 international
$75 renewal fee |
URL | https://www2.guidancesoftware.com/training/Pages/ence-certification-program.aspx |
Self-study materials | Study materials provided in Guidance Software courses. Check Amazon for availability of current and practice exams.
Learning On Demand subscription provides access to 400 courses across the OpenText Learning Services platform. |
SANS is the organization behind the Global Information Assurance Certification (GIAC) program. It is a well-respected and highly regarded player in the information security field in general. SANS not only teaches and researches in this area, it also provides breaking news, operates a security alert service, and serves on all kinds of government, research and academic information security task forces, working groups, and industry organizations.
The organization’s incident response and forensics credentials include the following:
The intermediate GCFE and the more senior GCFA are the focus of this section. Neither credential requires taking SANS courses (which have a strong reputation for being among the best in the cybersecurity community, with high-powered instructors to match), but they are recommended to candidates and often offered before, during or after SANS conferences held around the U.S. at regular intervals.
Both the GCFE and GCFA focus on computer forensics in the context of investigation and incident response, and thus also focus on the skills and knowledge needed to collect and analyze data from Windows and/or Linux computer systems during such activities. Candidates must possess the necessary skills, knowledge, and ability to conduct formal incident investigations and advanced incident handling, including dealing with internal and external data breaches, intrusions, and cyberthreats; collecting and preserving evidence; understanding anti-forensic techniques; and building and documenting advanced digital forensic cases.
Most SANS GIAC credentials are valid for four years. Candidates may recertify for the GCFE and GCFA by earning 36 continuing professional experience (CPE) credits. In addition, credential holders must pay a certification maintenance fee of $429 every four years.
The SANS GIAC program encompasses more than 36 information security certifications across a broad range of subjects and disciplines. IT professionals interested in information security in general, as well as digital forensics, would be well advised to investigate further on the GIAC homepage.
Certification name | GIAC Certified Forensic Examiner (GCFE)
GIAC Certified Forensic Analyst (GCFA) |
---|---|
Prerequisites and required courses | None
GCFE recommended course: FOR500: Windows Forensic Analysis ($6,210) GCFA recommended course: FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting ($6,210) |
Number of exams | One test for each credential (115 questions, three hours, passing score of 71 percent)
Exams proctored by Pearson VUE. Registration with GIAC required to schedule an exam. |
Cost per exam | $769 if part of training/bootcamp
$1,899 (no training – referred to as a certification challenge) Additional details available here. |
URL | www.giac.org |
Self-study materials | Practice tests available on the GIAC test preparation page (two tests included in test fee; additional practice questions are $159 each). Study guides and practice exams can be found on Amazon and other typical channels. |
There are lots of other certification programs that can help to further the careers of IT professionals who work in digital forensics.
One certification we’ve featured in the past is the CyberSecurity Institute’s CyberSecurity Forensic Analyst (CSFA). The CyberSecurity Institute provides digital forensic services aimed at law firms, businesses and individuals, and administers a small but well-respected certification program. The CSFA is designed for security professionals with at least two years of experience performing digital forensic analysis on computers and devices running the Windows operating system and creating investigative reports. Although the certification didn’t generate as many job board hits as our other featured certifications, the CSFA is still worth your attention.
The same goes for the Certified Computer Examiner (CCE) from the International Society of Forensic Computer Examiners, also known as ISFCE. The CCE is well recognized in the industry and in the law enforcement community as a leading credential for digital forensics professionals, but it fell a little short on job board hits during our review this year.
Other good certifications include the Professional Certified Investigator (PCI), a senior-level, vendor-neutral computer investigations and forensics credential available through ASIS International. The organization also offers the Certified Protection Professional (CPP), which includes an investigation component, and the Physical Security Professional (PSP) in its certification program. Forensics candidates can also pursue one of the High Tech Crime Network vendor-neutral certifications – the Certified Computer Crime Investigator or Certified Computer Forensic Technician, both of which have a Basic and an Advanced credential.
If you look around online, you’ll find numerous other forensics hardware and software vendors that offer certifications and plenty of other organizations that didn’t make the cut for the 2019 list of the best digital forensics certifications. But before you wander outside the items mentioned in this article, you might want to research the sponsoring organization’s history and the number of people who’ve earned its credentials, and then determine whether the sponsor not only requires training but stands to profit from its purchase.
You might also want to ask a practicing digital forensics professional if they’ve heard of the certifications you found on your own and, if so, what that professional thinks of those offerings.
John Cleese and the Ministry of Silly Walks is what peak performance looks like.
Kind of.
A new study conducted by Arizona State University professor and Monty Python connoisseur Glenn Gaesser shows that regular walking is all well and fine, but if people replicated the inefficient movements popularized by Mr. Teabag and Mr. Putey from the iconic silly walks sketch of 1970, it could be conducive to a healthy lifestyle.
There's one glaring caveat, though, and that is the demo size of only 13 healthy adults (six women and seven men) who participated in the study, as per a report in the British Medical Journal.
But the results were dramatic — walking in a silly way can become a part of a healthy lifestyle as it could be deemed vigorous exercise.
Speaking to CNN, Gaesser — who studies the effects of exercise for a living — said, "I'm a big fan of Monty Python … and, of course, the 'Ministry of Silly Walks' was one of my favorite skits.
"Anyone who's seen the video knows that, wow, that looks like pretty good physical activity. My colleagues and I got this idea — basically, wouldn't it be fun to see how energetically costly those silly walks actually were. How many calories do they burn?"
The 13 volunteers in the study walked normally, and then copied the silly walk. During both walks, Gaesser and his team measured how much energy the volunteers used and how many calories they burned.
The way John Cleese walks in Monty Python, with his leg stretched out almost as high as his head, was two-and-a-half times as intense as walking normally.
"This is a humorous study," Gaesser said.
No kidding.
Watch the "Ministry of Silly Walks" sketch right here:
Bruce Willis attends a movie premiere in New York on Friday, Oct. 11, 2019. Nearly a year after Bruce Willis' family announced that he would step away from acting after being diagnosed with aphasia, his family says his "condition has progressed." In a statement posted Thursday, his family said Willis has a more specific diagnosis of frontotemporal dementia. Charles Sykes/Charles Sykes/Invision/AP hide caption
"+n+" "),i=""+a+r;return l.default.createElement("div",null,l.default.createElement("div",{className:"gs-u-vh qa-visually-hidden-title",dangerouslySetInnerHTML:{__html:i}}),l.default.createElement("div",{className:"lx-stream-post-quote__body gs-u-mb qa-blockquote",dangerouslySetInnerHTML:{__html:t},"aria-hidden":"true"}))}return l.default.createElement("div",null,l.default.createElement("span",{className:"gs-u-vh qa-visually-hidden-title"},o),l.default.createElement("div",{className:"lx-stream-post-quote__body gs-u-mb qa-blockquote","aria-hidden":"true"},l.default.createElement("p",{dangerouslySetInnerHTML:{__html:t}})))},m=function(e){var t=e.element.children,n=e.element.name,r=(0,d.default)(n),a=c.default.findFirst(t,r.textLocator),s=e.renderChildrenToStaticMarkup(a),u=c.default.findText(t,r.sourceLocator),p=c.default.findFirst(t,r.sourceLocator),m=(0,i.default)(["lx-stream-post-quote","lx-stream-post-quote--"+r.className,"gs-u-mb-alt","gs-u-mr-alt+","gs-u-ml-alt+","gs-u-mr-alt++@m","gs-u-ml-alt++@m"]),h=(0,i.default)(["gs-u-mr","lx-stream-post-quote__icon","lx-stream-post-quote__icon--"+r.icon,"gel-icon","gel-icon-"+r.gelIconClass]),g=void 0,v=void 0;p&&p.attributes&&(g=c.default.findFirst(p.attributes,"title").value)&&(v=l.default.createElement("span",{className:"lx-stream-post-quote__cite-profession qa-blockquote-source-profession"},g));var b=void 0!==g?g:"",y=e.getTranslationFor("from"),_="string"==typeof u?y+" "+u+" "+b:"",P=e.getTranslationFor(r.hiddenTitleText)+":";return l.default.createElement("blockquote",o({},e.attributes,{className:m}),f(n,s,P,_),l.default.createElement("footer",{className:"lx-stream-post-quote__cite gel-brevier gel-brevier-bold","aria-hidden":"true"},l.default.createElement("cite",{className:"lx-stream-post-quote__cite-name qa-blockquote-source"},u),v),l.default.createElement("div",{className:h},r.iconSvg))};m.displayName="Blockquote",m.propTypes={attributes:l.default.PropTypes.object.isRequired,renderChildrenToStaticMarkup:l.default.PropTypes.func.isRequired,element:l.default.PropTypes.object.isRequired},t.default=m,e.exports=t.default},function(e,t,n){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var r=n(0),o=function(e){return e&&e.__esModule?e:{default:e}}(r),a={sms:{hiddenTitleText:"sms_message",gelIconClass:"sms",icon:"mobile",className:"sms",textLocator:"smsText",sourceLocator:"smsSource",iconSvg:o.default.createElement("svg",{width:"32",height:"32",viewBox:"0 0 32 32"},o.default.createElement("path",{d:"M22 0v2H6v30h20V0h-4zm-9 28h-3v-2h3v2zm0-4h-3v-2h3v2zm0-4h-3v-2h3v2zm5 8h-4v-2h4v2zm0-4h-4v-2h4v2zm0-4h-4v-2h4v2zm4 8h-3v-2h3v2zm0-4h-3v-2h3v2zm0-4h-3v-2h3v2zm0-5H10V6h12v9z"}))},quote:{hiddenTitleText:"quote_message",gelIconClass:"quote",icon:"quote",className:"default",textLocator:"quoteText",sourceLocator:"quoteSource",iconSvg:o.default.createElement("svg",{width:"32",height:"32",viewBox:"0 0 32 32"},o.default.createElement("path",{d:"M0 17v15h15V17H7c.2-5.9 2.4-8.8 8-9.9V0C6.7 1.2.2 8.3 0 17zM32 7.1V0c-8.3 1.2-14.8 8.3-15 17v15h15V17h-8c.2-5.9 2.4-8.8 8-9.9z"}))},email:{hiddenTitleText:"email_message",gelIconClass:"email",icon:"email",className:"email",textLocator:"emailText",sourceLocator:"emailSource",iconSvg:o.default.createElement("svg",{width:"32",height:"32",viewBox:"0 0 32 32"},o.default.createElement("path",{d:"M16 19.4l16-15V3H0v26h32V8l-4 4v13H4V8.2l12 11.2zm0-2.8L5.8 7h20.4L16 16.6z"}))}},i=function(e){return a[e]||a.quote};t.default=i,e.exports=t.default},function(e,t,n){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var r=Object.assign||function(e){for(var t=1;t