<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecuritygrowth.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cybersecuritygrowth.com/webcasts/</loc>
		<lastmod>2026-02-18T20:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/how-to-wfh-and-keep-your-digital-self-safe/</loc>
		<lastmod>2021-04-01T17:28:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/transforming-the-soc-building-tomorrows-security-operations-today/</loc>
		<lastmod>2021-04-01T17:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2021/01/Screen-Shot-2021-01-12-at-11.28.09-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/literal-cybersecurity-rockstars/</loc>
		<lastmod>2021-04-01T17:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/commencing-a-new-decade-2020-predictions/</loc>
		<lastmod>2021-04-01T17:29:37+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2021/01/Screen-Shot-2021-01-12-at-10.57.46-AM-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/what-does-2019-have-in-store-for-cybersecurity-a-cisos-perspective/</loc>
		<lastmod>2021-04-01T17:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/reflection-after-twenty-two-years/</loc>
		<lastmod>2021-04-01T17:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/facing-the-future-rapid7s-2019-security-predictions/</loc>
		<lastmod>2021-04-01T17:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/how-angry-is-that-bird/</loc>
		<lastmod>2021-04-01T17:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cyber-training-introduction-to-android-forensics-security-testing/</loc>
		<lastmod>2021-04-01T17:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/hreader-ios-mobile-application-security-audit/</loc>
		<lastmod>2021-04-01T17:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/android-secure-application-development-guidance-for-dod/</loc>
		<lastmod>2021-04-01T17:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/imas-ios-mobile-application-security/</loc>
		<lastmod>2021-04-01T17:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cloud-iam-webinar/</loc>
		<lastmod>2021-04-05T14:46:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/ma-and-cybersecurity/</loc>
		<lastmod>2021-04-15T14:46:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/the-world-of-online-platform-abuse-and-fraud/</loc>
		<lastmod>2021-04-27T19:36:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/take-a-chance-on-someone-this-week/</loc>
		<lastmod>2022-12-23T14:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/keeping-a-security-mindset/</loc>
		<lastmod>2022-12-23T14:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/android-forensics-security-testing/</loc>
		<lastmod>2022-12-23T15:17:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/so-you-wanna-be-a-ciso/</loc>
		<lastmod>2023-02-07T17:48:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/zero-trust/</loc>
		<lastmod>2023-02-07T17:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cspm-cloud-security-posture-management/</loc>
		<lastmod>2024-03-19T15:02:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/casb-cloud-access-security-broker/</loc>
		<lastmod>2024-03-19T15:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/white-house-national-cybersecurity-strategy/</loc>
		<lastmod>2024-03-19T15:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cloud-security-101/</loc>
		<lastmod>2024-03-19T15:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/sspm-saas-security-posture-management/</loc>
		<lastmod>2024-03-19T15:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cwpp-cloud-workload-protection-platform/</loc>
		<lastmod>2024-03-19T15:12:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cnapp-cloud-native-application-protection-platform/</loc>
		<lastmod>2024-03-19T15:14:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/nist-csf-2-0/</loc>
		<lastmod>2024-03-19T15:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/fbi-2023-internet-crime-report-and-more/</loc>
		<lastmod>2024-04-03T15:38:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/building-a-soc-where-do-i-start/</loc>
		<lastmod>2024-11-14T17:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/saas-sprawl/</loc>
		<lastmod>2024-12-05T19:41:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/12/DALL%C2%B7E-2024-12-05-14.40.25-An-engaging-and-professional-illustration-representing-SaaS-sprawl-in-enterprises.-The-image-features-a-network-of-interconnected-cloud-applications-w-e1733427708335.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/united-healthgroup-and-the-backlash-of-mfa-not-everywhere/</loc>
		<lastmod>2024-12-06T00:24:05+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/11/DALL%C2%B7E-2024-12-05-19.22.55-A-professional-blog-header-image-titled-United-HealthGroup-and-the-Backlash-of-MFA-not-Everywhere.-The-visual-features-a-secure-login-interface-with-e1733444685870.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/2024-verizon-dbir/</loc>
		<lastmod>2024-12-16T14:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/12/DALL%C2%B7E-2024-12-16-08.59.42-A-visually-striking-image-representing-the-2024-Verizon-Data-Breach-Investigations-Report-DBIR.-The-image-features-a-digital-shield-symbolizing-cybe.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/the-breach-blizzard-of-2024/</loc>
		<lastmod>2024-12-22T13:45:44+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/12/DALL%C2%B7E-2024-12-22-08.44.54-A-dramatic-digital-illustration-representing-the-Snowflake-Breach-Blizzard-concept.-The-image-features-a-swirling-snowstorm-with-symbolic-elements-l.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/security-awareness-training-part-1/</loc>
		<lastmod>2024-12-30T14:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/12/DALL%C2%B7E-2024-12-30-09.08.43-A-high-impact-professional-image-for-Security-Awareness-Training-promotion.-The-central-focus-is-a-glowing-shield-icon-representing-cybersecurity-sur-e1736183445676.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/security-awareness-training-part-2/</loc>
		<lastmod>2025-01-06T17:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2024/12/DALL%C2%B7E-2024-12-30-09.08.43-A-high-impact-professional-image-for-Security-Awareness-Training-promotion.-The-central-focus-is-a-glowing-shield-icon-representing-cybersecurity-sur-e1736183445676.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/secure-controls-framework-part-1/</loc>
		<lastmod>2025-01-09T14:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2023/01/scf-domains-principles.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/practical-uses-for-the-secure-controls-framework-part-2/</loc>
		<lastmod>2025-01-09T14:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2023/01/scf-funnel-statutory-regulatory-contractual-cybersecurity-requirements.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/2024-cybersecurity-wrap-up-2025-look-ahead/</loc>
		<lastmod>2025-01-20T18:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/01/DALL%C2%B7E-2025-01-20-13.57.00-A-visually-striking-split-panel-digital-illustration-depicting-cybersecurity-in-2024-on-the-left-side-and-a-futuristic-vision-for-2025-on-the-right-si.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/security-risk-management/</loc>
		<lastmod>2025-01-31T20:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/01/DALL%C2%B7E-2025-01-08-09.59.00-A-sleek-and-modern-visual-representing-Risk-Management-Assessments.-The-scene-features-a-futuristic-digital-workspace-with-a-holographic-display-o-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/level-up-your-career-with-training-certifications/</loc>
		<lastmod>2025-02-03T14:16:16+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/02/DALL%C2%B7E-2025-02-03-09.14.50-A-cybersecurity-professional-standing-at-a-crossroads-with-multiple-signposts-pointing-in-different-directions-each-labeled-with-popular-Information-.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cybersecurity-growth-what-weve-been-up-to-in-2025/</loc>
		<lastmod>2025-02-25T15:34:56+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/02/Screenshot-2025-02-25-at-9.28.49%E2%80%AFAM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/real-ciso-problems-why-its-often-a-little-c-and-not-a-big-c/</loc>
		<lastmod>2025-03-27T11:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/03/Screenshot-2024-12-07-at-2.46.45%E2%80%AFPM-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/live-resume-review-breach-headlines/</loc>
		<lastmod>2025-04-07T14:23:24+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/04/YTCover-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/2024-cybersecurity-wrap-up-2025-look-ahead-2/</loc>
		<lastmod>2025-10-15T19:48:45+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/10/Screenshot-2025-01-04-at-2.59.09-PM-scaled-e1760557711989.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/return-to-office-a-cybersecurity-perspective-for-2025/</loc>
		<lastmod>2025-10-17T11:46:23+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/10/CSG29-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/cybersecurity-communities/</loc>
		<lastmod>2025-10-20T12:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/03/AdobeStock_1144050954-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/this-week-in-cyber-disney-disa-and-orange-hit-by-major-security-incidents/</loc>
		<lastmod>2025-10-20T12:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2025/10/DBIR-2025-video-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/white-house-cybersecurity-executive-order-14144/</loc>
		<lastmod>2026-01-20T14:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2026/01/Screenshot-2026-01-20-at-9.42.00-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/what-burnout-taught-me-about-the-ciso-role/</loc>
		<lastmod>2026-01-31T14:25:04+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2026/01/Burnout.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2026/01/Burnout.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecuritygrowth.com/resume-workshop-2/</loc>
		<lastmod>2026-02-18T20:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecuritygrowth.com/wp-content/uploads/2026/02/Screenshot-2026-02-18-at-3.29.04-PM.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->