<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://infosecalways.com/2019/11/28/free-kindle-book-about-the-value-of-your-employees/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2019/11/61467059_kindle-ready-front-cover-jpeg_6774483.jpg</image:loc><image:title>61467059_Kindle Ready Front Cover JPEG_6774483</image:title><image:caption>Too Skilled</image:caption></image:image><lastmod>2020-08-09T22:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2017/03/31/missing-security-product-managers/</loc><lastmod>2017-03-31T03:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2014/12/31/the-benefits-of-threat-driven-security-automation/</loc><lastmod>2014-12-31T12:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/papers/</loc><lastmod>2014-02-16T20:17:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://infosecalways.com/2014/02/16/rodger-wille-mentoring-sans-forensics-windows-in-depth/</loc><lastmod>2014-02-16T19:59:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2008/06/06/risk-based-security-plan-whitepaper/</loc><lastmod>2014-01-07T16:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/05/24/hackers-agents/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/05/backer_only_2.png</image:loc><image:title>HackerAgentBack</image:title></image:image><lastmod>2014-01-07T16:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/03/05/security-program-development-fundamentals-of-staffing/</loc><lastmod>2014-01-07T16:34:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2014/01/05/2013-the-year-of-the-agents/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/agenttshirt.png</image:loc><image:title>AgentTshirt</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/header.png</image:loc><image:title>Header</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/bgg_cornerlogo.png</image:loc><image:title>bgg_cornerlogo</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/naquadah_seller.png</image:loc><image:title>naquadah_seller</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/deckcon-shop-ad.png</image:loc><image:title>DeckCon Shop Ad</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/hack_agent_store_praetorian.png</image:loc><image:title>Hack_Agent_store_Praetorian</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2014/01/agent-read-email_design.png</image:loc><image:title>agent-read-email_design</image:title></image:image><lastmod>2014-01-05T17:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/12/31/security-next-gen-soc-or-sof/</loc><lastmod>2013-12-31T13:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/11/17/csaw-2013-and-threads/</loc><lastmod>2013-11-17T12:53:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/links/</loc><lastmod>2019-01-14T19:53:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://infosecalways.com/2013/04/05/healthcare-the-next-major-cyber-attack-target/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2013/04/fireeye-stats.png</image:loc><image:title>FireEye Stats</image:title></image:image><lastmod>2013-04-05T22:28:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/04/02/7-ways-to-optimize-your-security-technology-investments/</loc><lastmod>2013-04-02T23:34:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/03/05/building-the-security-operations-center-soc/</loc><lastmod>2013-07-06T08:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/02/22/get-your-daily-security-feed/</loc><lastmod>2013-02-22T12:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/02/20/shmoocon-2013-review-malware-persistence-and-shmooganography/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2013/02/shmooganography.jpg</image:loc><image:title>Shmooganography</image:title></image:image><lastmod>2014-07-15T02:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2013/02/02/to-trust-or-not-to-trust/</loc><lastmod>2013-02-02T08:07:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/11/06/new-to-lockpicking/</loc><lastmod>2013-01-22T19:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/11/04/disaster-recovery-distance-gasoline-and-hurricane-sandy/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/11/police-gas-blog-1.png</image:loc><image:title>Police Gas Station</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/11/night-line-blog-1.png</image:loc><image:title>Long Gas Lines</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/11/night-gas-blog-1.png</image:loc><image:title>Gas Station Line at Night</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/11/gas-station-night-1.png</image:loc><image:title>Gas Station Line</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/11/daytime-gas-blog-1.png</image:loc><image:title>Daytime Gas Wait</image:title></image:image><lastmod>2012-11-04T00:55:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/10/30/pumpcon-2012-review-blueray-hacking-and-bacnet/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/10/photo.jpg</image:loc><image:title>PumpCon 2012</image:title><image:caption>PumpCon</image:caption></image:image><lastmod>2012-10-30T16:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/10/03/ownd-by-exif-understand-what-you-leave-behind/</loc><lastmod>2012-10-03T23:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/01/30/authoritative-list-of-compliance-documents/</loc><lastmod>2012-09-27T18:40:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/09/27/hacker-shirt-design/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/09/hacker-shirt-blog.png</image:loc><image:title>hacker Shirt - blog</image:title><image:caption>Hacker Shirt</image:caption></image:image><lastmod>2014-04-03T23:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/09/21/social-engineering-framework-persuasion-mapping/</loc><lastmod>2014-09-28T07:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/09/21/social-engineering-influence/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/09/influence.png</image:loc><image:title>Influence</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/09/influence-book1.jpg</image:loc><image:title>Influence Book</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2012/09/influence-book.jpg</image:loc><image:title>Influence Book</image:title></image:image><lastmod>2012-09-21T00:57:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/03/04/hipaa-and-the-stimulus-bill/</loc><lastmod>2012-09-20T23:32:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2010/02/04/what-is-the-best-starting-point-to-embrace-risk-management/</loc><lastmod>2012-09-20T23:32:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/08/07/bits-shared-assessments-useful-or-not/</loc><lastmod>2018-08-19T03:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/01/12/working-toward-iso-1779927001-business-continuity-management-compliance/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2009/01/bcp-iso31.gif</image:loc><image:title>bcp-iso31</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2009/01/bcp-iso21.gif</image:loc><image:title>bcp-iso21</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2009/01/bcp-iso1.gif</image:loc><image:title>bcp-iso1</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2007/05/artofsteal.jpg</image:loc><image:title>ArtofSteal</image:title></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2007/05/secretsbusiness.jpg</image:loc><image:title>secretsbusiness.jpg</image:title></image:image><lastmod>2013-06-05T20:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/05/19/more-on-staffing-and-governance/</loc><lastmod>2012-09-20T23:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/03/17/96/</loc><lastmod>2012-09-20T23:31:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2011/04/19/crypto-encryption-dlp-and-privacy-laws/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2011/04/dlp-map.jpg</image:loc><image:title>DLP Map</image:title></image:image><lastmod>2012-09-20T23:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/07/19/mta-nyc-explosion-poor-business-continuity/</loc><lastmod>2014-03-08T19:53:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/09/27/phin-20-requirements/</loc><lastmod>2012-09-20T23:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/12/19/disaster-recovery-%e2%80%93-alternate-site-geographical-distance/</loc><lastmod>2012-09-20T23:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/04/12/upcoming-privacy-and-security-panel-in-las-vegas/</loc><lastmod>2012-09-20T23:27:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/05/23/privacy-and-identity-theft/</loc><lastmod>2012-09-20T23:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/06/20/good-hipaa-risk-assessment-topics/</loc><lastmod>2014-07-31T17:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/07/12/security-threat-statistics-resources/</loc><lastmod>2014-04-30T03:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/03/11/what-is-better-process-or-asset-risk-assessment/</loc><lastmod>2019-07-29T20:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/03/22/perspectives-on-obtaining-management-support/</loc><lastmod>2012-09-20T23:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/05/04/new-links-page-policy-and-standards/</loc><lastmod>2012-09-20T23:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/04/13/writing-effective-policies-part-i/</loc><lastmod>2014-09-23T01:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/05/25/iso-17799-27001-control-or-standard/</loc><lastmod>2012-09-20T23:19:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/05/08/roles-responsibilities-in-policy/</loc><lastmod>2014-07-04T19:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/05/30/humor-personal-security-risk-assessment/</loc><lastmod>2014-10-09T04:56:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/06/18/new-links-added-risk-assessment/</loc><lastmod>2012-09-20T23:18:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/08/03/bs-31100-code-of-practice-for-risk-management/</loc><lastmod>2017-07-26T22:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/08/03/bs-25999-2-business-continuity-management/</loc><lastmod>2012-09-20T23:16:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/10/16/security-spending-how-much-of-it-budget/</loc><lastmod>2014-08-05T01:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2008/05/09/information-security-staffing-%e2%80%93-skills-identification-and-training-budget/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2008/05/skillsandcerts.gif</image:loc><image:title>skillsandcerts</image:title></image:image><lastmod>2012-09-20T23:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/09/21/extreme-social-engineering-paper/</loc><lastmod>2012-09-20T23:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2008/09/10/it-security-spending-10-of-it-operating-budget/</loc><lastmod>2012-09-20T23:13:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/09/12/hacker-agent-and-the-brain-tank/</loc><lastmod>2013-08-29T15:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2011/11/01/security-conference-list-wikipedia-rocks/</loc><lastmod>2012-09-20T23:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/04/17/application-risk-assessments/</loc><lastmod>2012-09-20T23:11:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/06/16/recon-2012-review-exploit-the-magic-school-bus-to-success/</loc><lastmod>2013-01-09T07:03:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/09/17/the-brain-tank-con-review-2012/</loc><lastmod>2012-09-20T23:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2012/08/14/lock-picking-a-security-professional-must/</loc><lastmod>2012-09-20T21:25:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/07/26/broken-links/</loc><lastmod>2012-08-21T01:18:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/09/19/data-leak-what-not-to-do/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2007/09/ken.gif</image:loc><image:title>Ken</image:title></image:image><lastmod>2012-08-21T01:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/11/30/the-chinese-hack-attack/</loc><lastmod>2012-08-21T01:08:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/12/26/army-says-mac%e2%80%99s-are-more-secure-are-they/</loc><lastmod>2012-08-21T01:04:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2008/08/19/the-top-ten-convention-information-security-measures/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2008/08/5_12-dual-its-room-v2-sda1.jpg</image:loc><image:title>5_12-dual-its-room-v2-sda1</image:title><image:caption>RNC Network</image:caption></image:image><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2008/08/5_12-dual-its-room-v2-sda.jpg</image:loc><image:title>RNC Network</image:title><image:caption>RNC Network</image:caption></image:image><lastmod>2012-08-21T00:53:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/03/19/do-qsa%e2%80%99s-understand-pci/</loc><image:image><image:loc>https://infosecalways.com/wp-content/uploads/2009/03/pci-compliance.png</image:loc><image:title>pci-compliance</image:title></image:image><lastmod>2012-08-21T00:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2010/08/24/penetration-testing-risks/</loc><lastmod>2020-04-28T22:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2011/10/30/is-your-3rd-party-provider-secure/</loc><lastmod>2015-01-29T16:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2009/03/19/security-survey-polls-added/</loc><lastmod>2009-03-19T13:45:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2008/11/05/new-foundstone-free-tool-dire-software-security/</loc><lastmod>2008-11-05T19:29:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/12/28/more-on-mac-security/</loc><lastmod>2008-06-11T17:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/12/07/test-your-anti-virus-or-re-install/</loc><lastmod>2007-12-07T18:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/11/08/ip-address-blacklist/</loc><lastmod>2014-05-07T05:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/11/13/malware-embedded-in-advertising-%e2%80%93-what-is-the-solution/</loc><lastmod>2007-11-20T20:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/11/01/new-foundstone-blog/</loc><lastmod>2012-09-20T23:44:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/04/11/ism-community-nyc-chapter-board-established/</loc><lastmod>2010-05-15T23:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com/2007/03/06/enemy-1-2-passwords-and-patches/</loc><lastmod>2007-05-03T17:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecalways.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-08-09T22:27:14+00:00</lastmod></url></urlset>
