<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//staging.cubic-consulting.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/16/navigating-cybersecurity-stefanie-drysdales-executive-protection-revolution/topic/data-protection/</loc>
		<lastmod>2024-04-16T08:22:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/podcast-badge4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/25/navigating-the-dynamic-landscape-of-cybersecurity-lessons-from-an-experienced-ciso/podcast/</loc>
		<lastmod>2024-05-13T12:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/podcast-badge2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/03/how-companies-recruit-executives-and-essential-considerations-for-candidates/topic/cybersecurity-talent-management/</loc>
		<lastmod>2024-05-27T14:39:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/podcast-badge3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/video_btn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/05/28/navigating-the-dora-series-unraveling-third-party-risks-and-resilience-in-cybersecurity/podcast/</loc>
		<lastmod>2024-05-28T13:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/podcast-badge7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/06/10/must-read-see-yourself-in-cyber-book-review-with-author-ed-adams-2/podcast/</loc>
		<lastmod>2024-06-11T08:18:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/06/podcast-badge8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/11/dora-regulation-explained/podcast/</loc>
		<lastmod>2024-06-14T13:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/podcast-badge1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/06/13/mastering-crisis-management-in-cybersecurity-with-marie-emmanuelle-py-2/podcast/</loc>
		<lastmod>2024-07-13T14:55:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/06/podcast-badge9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc4-ql5534fld5jl9aexu483jd6zlfxbiva84n1iyp874w.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc2-ql5531m2snfqagj1al07tvwltab7vrz14932ivcdnk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc3-ql5532jwzhh0m2ho53euedo2eo6l3h2rgdqk05azhc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/elementor/thumbs/pc5-ql5q48ho83z2u4nztvt0et80ve7oi5yvw003v8ndb4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/02/cost-guide/blog/</loc>
		<lastmod>2024-07-29T12:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo5-data-flow.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/13/what-is-the-python-based-legion-credential-attack/blog/</loc>
		<lastmod>2024-07-29T12:31:27+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/blog7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b7-hand2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/07/who-are-the-top-10-ransomware-groups-in-2024/blog/</loc>
		<lastmod>2024-07-29T12:32:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/blog6-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b6-thinking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/01/what-are-the-expected-changes-and-challenges-regarding-cyber-threat-and-risk-management-in-2024/blog/</loc>
		<lastmod>2024-07-29T12:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/blog6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/android-board.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/ai-android2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b5-business_challenge-300x199.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b5-costs-300x188.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b5-screenlock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/02/22/top-2024-cybersecurity-predictions-a-thorough-analysis-into-ransomware-and-generative-ai-attacks/blog/</loc>
		<lastmod>2024-07-29T12:33:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/blog4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/notebook-padlock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/password-300x197.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/ai-android-300x211.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/chatbot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/02/07/how-can-the-board-of-directors-increase-their-knowledge-of-cybersecurity-risk-and-compliance/blog/</loc>
		<lastmod>2024-07-29T12:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/blog3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/board-bird-view-300x193.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/empty-chair-300x193.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/02/07/how-have-recent-security-incidents-changed-the-board-of-directors-committee-agenda/blog/</loc>
		<lastmod>2024-07-29T12:34:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/blog2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/investigating-300x202.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/regulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/cyber-insurance.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/02/06/executive-board-members-seeking-greater-security-discussion-with-cisos/blog/</loc>
		<lastmod>2024-07-29T12:35:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/blog1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/board-presentation-300x149.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/misalignment-150x150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/23/the-role-of-a-vciso-post-pandemic/blog/</loc>
		<lastmod>2024-07-29T12:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo2-vciso.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo2-vciso-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/16/cloud-security-consultants/blog/</loc>
		<lastmod>2024-07-29T12:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo3-cloud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo3-graph.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/09/ransomware-attack/blog/</loc>
		<lastmod>2024-07-29T12:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo4-ransomware-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo4-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/30/do-smes-need-a-ciso-amid-rising-cyberattacks/blog/</loc>
		<lastmod>2024-07-30T16:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/bo1-ciso-for-sme.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/07/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2022/09/bo1-ciso.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/12/20/invest-in-data-security-now-to-avoid-costly-gdpr-fines/blog/</loc>
		<lastmod>2024-08-11T10:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/08/bo6-gdpr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/19/what-are-the-top-cybersecurity-predictions-for-2024/blog/</loc>
		<lastmod>2026-03-29T10:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/blog8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b8-globe-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b8-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b8-cyber-bullying-300x200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b8-elections.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b8-supply-chain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/28/how-is-cyber-essentials-basic-plus-certification-critical-to-uk-and-eu-members/blog/</loc>
		<lastmod>2026-03-29T10:08:42+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/blog9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b9-questionnaire.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/b9-rbac-300x197.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/04/how-does-the-board-of-directors-oversight-validate-the-organizations-cybersecurity-strategy/blog/</loc>
		<lastmod>2026-03-29T10:10:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/blog10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/blog10-fingers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/blog10-crack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/blog10-screen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/02/bloggers-commentary-241x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2025/11/19/wake-up_call_for_smes/blog/</loc>
		<lastmod>2026-03-29T10:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/11/wake-up-call-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/11/wake-up-call-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/11/wake-up-call-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/test-guy2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2025/12/15/business-leadership-on-a-global-stage-guy-marong-at-the-cxo-2-0-conference-dubai/blog/</loc>
		<lastmod>2026-03-29T12:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/12/CXO2025.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/blog3b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/12/CXO2025-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2025/12/CXO2025-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/test-guy2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2026/03/12/nis2/blog/</loc>
		<lastmod>2026-03-29T12:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/titel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/blog_nis2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2026/03/test-guy2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/06/27/top-red-teaming-mistakes-to-avoid-with-expert-sharon/video/</loc>
		<lastmod>2026-03-29T13:32:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/06/Short-Version-Sharath-Unni-10-Mistakes-to-Avoid-with-Red-Teaming.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/10/27/cybersecurity-lessons-uncovered-insights-from-an-industry-veteran/video/</loc>
		<lastmod>2026-03-29T13:33:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/11/eng.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/10/31/launching-a-new-era-of-cybersecurity-insights-from-cubic-consulting-and-payatus-penetration-testing-experts/video/</loc>
		<lastmod>2026-03-29T13:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/10/vidpost41.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/10/31/penetration-test-intro/video/</loc>
		<lastmod>2026-03-29T13:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/10/vidpost40.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/11/20/how-to-order-an-express-penetration-test-in-7-steps/video/</loc>
		<lastmod>2026-03-29T13:35:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/11/vidpost42-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/12/12/how-to-order-a-standard-penetration-test-in-5-steps/topic/application-security/</loc>
		<lastmod>2026-03-29T13:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/12/vidpost43.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/05/14/understanding-dora-a-deep-dive-into-the-digital-operational-resiliency-act/video/</loc>
		<lastmod>2026-03-29T13:41:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost37.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/05/28/from-chaos-to-control-managing-the-sony-pictures-hack/video/</loc>
		<lastmod>2026-03-29T13:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/Managing-the-Sony-Pictures-Hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/05/28/a-business-guide-to-eu-cybersecurity-interview-with-guy-marong/video/</loc>
		<lastmod>2026-03-29T13:42:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/06/John-Gormally-Interview-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/30/how-to-handle-incident-response-with-dora-in-the-financial-sector/video/</loc>
		<lastmod>2026-03-29T13:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost35.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/23/the-father-of-appsec-the-career-journey-of-ed-adams/video/</loc>
		<lastmod>2026-03-29T13:43:55+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost26.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/06/14/securing-your-online-footprint-insights-from-stefanie-drysdale/video/</loc>
		<lastmod>2026-03-29T13:44:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/06/Stefanie-Drysdale-exect-protection-short-version-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/09/dora-and-incident-response-with-pierre-noel/video/</loc>
		<lastmod>2026-03-29T13:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/18/security-standards-with-benoit-heyndrickx/video/</loc>
		<lastmod>2026-03-29T13:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/25/women-in-cybersecurity-insights-career-tips-and-tech-trends-candid-discussion-with-penny-wong/video/</loc>
		<lastmod>2026-03-29T13:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost13.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/26/ai-in-cybersecurity-defending-against-emerging-threats/video/</loc>
		<lastmod>2026-03-29T13:48:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost17.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/02/must-read-see-yourself-in-cyber-book-review-with-author-ed-adams/video/</loc>
		<lastmod>2026-03-29T13:49:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost21.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/04/16/how-to-manage-third-parties-with-dora/video/</loc>
		<lastmod>2026-03-29T13:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost23.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/02/red-teaming-mistakes-to-avoid-with-sharath-unni/video/</loc>
		<lastmod>2026-03-29T13:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/08/how-companies-recruit-cybersecurity-executives/video/</loc>
		<lastmod>2026-03-29T13:55:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/podcast_btn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/09/career-guidance-in-information-security-with-benoit-heynderickx/video/</loc>
		<lastmod>2026-03-29T13:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/09/essential-considerations-for-cyber-security-candidates-with-juliet-kasko/video/</loc>
		<lastmod>2026-03-29T13:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/09/mastering-crisis-management-in-cybersecurity-with-marie-emmanuelle-py/video/</loc>
		<lastmod>2026-03-29T13:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/03/09/mastering-the-cybersecurity-career-landscape-with-nick-vigier/video/</loc>
		<lastmod>2026-03-29T13:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/12/11/exploring-a-career-in-application-security-insights-from-a-red-team-expert/video/</loc>
		<lastmod>2026-03-29T15:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost31.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/12/20/dora-and-third-party-a-deep-dive-into-third-party-risk-management/video/</loc>
		<lastmod>2026-03-29T15:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost30.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/12/27/how-to-build-a-career-in-risk-management-sachin-nairs/video/</loc>
		<lastmod>2026-03-29T15:02:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost18.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/09/securing-executives-in-the-digital-age-with-stefanie-drysdale/video/</loc>
		<lastmod>2026-03-29T15:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost12.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/16/empowering-women-in-cybersecurity-with-stefanie-drysdale-stevan-bernard/video/</loc>
		<lastmod>2026-03-29T15:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2024/01/23/navigating-team-performance-in-crisis-a-navy-veterans-journey-and-insights-marie-emmanuelle-py/video/</loc>
		<lastmod>2026-03-29T15:04:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/12/08/fortifying-fintech-careers-in-financial-cybersecurity/video/</loc>
		<lastmod>2026-03-29T15:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost32.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/11/08/building-resilience-key-strategies-for-long-term-success/video/</loc>
		<lastmod>2026-03-29T15:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost19.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/10/30/navigating-forensic-cybersecurity-challenges-insights-from-a-forensic-expert/video/</loc>
		<lastmod>2026-03-29T15:10:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2023/09/vidpost28.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/10/23/expert-insights-on-third-party-risk-simplifying-cybersecurity-complexities/video/</loc>
		<lastmod>2026-03-29T15:10:29+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost33.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/10/05/expert-insights-cloud-migration-mastery/video/</loc>
		<lastmod>2026-03-29T15:10:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/Steven-Vercauteren-Cloud-Migration-Thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/10/19/truly-global-cybersecurity-achievements-pierre-noels-career-path/video/</loc>
		<lastmod>2026-03-29T15:11:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost36.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/19/navigating-third-party-risk-management-in-the-digital-age-expert-insights-2/video/</loc>
		<lastmod>2026-03-29T15:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost24.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/19/steven-vercauterens-cybersecurity-career-from-pc-assembly-to-cloud-security-global-expert/video/</loc>
		<lastmod>2026-03-29T15:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost34.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/19/mastering-risk-management-in-cybersecurity-insights-from-industry-expert-salil-aroskar/video/</loc>
		<lastmod>2026-03-29T15:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost38.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/20/chaos-to-triumph-inside-sony-pictures-epic-battle-against-a-destructive-nation-state-cyberattack-with-stevan-bernard/video/</loc>
		<lastmod>2026-03-29T15:14:28+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost16.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/21/best-practices-and-strategies-for-third-party-risk-management/video/</loc>
		<lastmod>2026-03-29T15:14:38+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost29.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/15/from-bytes-to-breaches-career-insights-with-forensic-cybersecurity-expert-jared-greenhill/video/</loc>
		<lastmod>2026-03-29T15:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/03/vidpost15.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/07/career-growth-in-application-security-tips-and-wisdom-from-a-seasoned-professional/topic/cybersecurity-talent-management/</loc>
		<lastmod>2026-03-29T15:17:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost22.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/08/11/how-to-find-and-protect-your-data-unlocking-the-power-of-itsmine/video/</loc>
		<lastmod>2026-03-29T15:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/05/vidpost39.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.cubic-consulting.com/2023/09/15/global-risk-expert-reveals-keys-to-career-success-with-stevan-bernard-ceo-of-bernard-global-llc/video/</loc>
		<lastmod>2026-03-29T15:17:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.cubic-consulting.com/wp-content/uploads/2024/04/vidpost20.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->