<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://seguri.io/events/BlueTeamCon2024/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/CarolinaCon2025/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/DistrictCon2026/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/RSTCon2025/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/SecureWV2024/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/Your-Event-Here/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Prioritize-Your-Security-Roadmap-with-Threat-Modelling/</loc>
<lastmod>2024-08-06T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/From-plan-to-playbook/</loc>
<lastmod>2024-08-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Crafting-a-Tailored-Security-Architecture-Framework/</loc>
<lastmod>2024-08-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Why-Your-Security-Program-Needs-a-Resource-Plan/</loc>
<lastmod>2024-08-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Mergers-and-Acquistions/</loc>
<lastmod>2024-09-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Mergers-and-Acquisitions/</loc>
<lastmod>2024-09-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Usability-is-Security/</loc>
<lastmod>2024-09-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Startups/</loc>
<lastmod>2024-09-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Starting-your-Application-Security-Program/</loc>
<lastmod>2024-09-25T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Building-a-Strong-Security-Awareness-Program/</loc>
<lastmod>2024-10-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Minimum-Viable-Security-Product/</loc>
<lastmod>2024-10-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Cyber-Incident-Reporting-for-Critical-Infrastructure-Act-CIRCIA/</loc>
<lastmod>2024-10-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Posture-Management/</loc>
<lastmod>2024-10-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Posture-Management-Attack-Path-Mapping/</loc>
<lastmod>2024-10-30T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Measuring-Security-Awareness-Training-Success/</loc>
<lastmod>2024-11-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/MVSP-Implementation-Roadmap/</loc>
<lastmod>2024-11-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Continuous-Security-Posture-Assessment/</loc>
<lastmod>2024-11-22T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Why-Your-Phishing-Simulations-Might-Be-Hurting-More-Than-Helping/</loc>
<lastmod>2024-12-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Operational-Technology-Security-Posture-Management/</loc>
<lastmod>2024-12-19T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Shmoocon-2025-Key-Takeaways-for-Security-Leaders/</loc>
<lastmod>2025-01-08T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Managed-Detection-and-Response-Beyond-the-Marketing-Hype/</loc>
<lastmod>2025-01-14T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Detection-and-Response-Beyond-Intrusion-Detection/</loc>
<lastmod>2025-01-23T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Building-Effective-Network-Detection-Response-Programs/</loc>
<lastmod>2025-01-30T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/MDR-Contract-Negotiations-What-Actually-Matters/</loc>
<lastmod>2025-02-04T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Integrating-MDR-and-NDR-for-Complete-Threat-Visibility/</loc>
<lastmod>2025-02-18T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Industrial-Protocol-Security-EtherNet-IP-CIP-GE-SRTP/</loc>
<lastmod>2025-02-21T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Unified-Security-Operations-MDR-NDR-SPM-Integration/</loc>
<lastmod>2025-02-27T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/OT-Managed-Detection-Response-Unique-Requirements/</loc>
<lastmod>2025-03-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Security-Assessments-Beyond-Vulnerability-Scanning/</loc>
<lastmod>2025-03-11T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Access-Management-Security-Assessments/</loc>
<lastmod>2025-03-20T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Active-Directory-Security-Assessment-Deep-Dive/</loc>
<lastmod>2025-03-26T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Access-Management-Operational-Technology-Environments/</loc>
<lastmod>2025-04-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/AI-Security-Reality-Check-Same-Problems-New-Hype/</loc>
<lastmod>2025-04-10T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Focused-MDR-Beyond-Network-Endpoint-Monitoring/</loc>
<lastmod>2025-04-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Industry-Burnout-Beyond-Work-Life-Balance/</loc>
<lastmod>2025-04-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Detection-Response-Operational-Technology-Environments/</loc>
<lastmod>2025-05-06T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Using-AI-Augment-Security-Teams-Practical-Applications/</loc>
<lastmod>2025-05-14T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Focused-MDR-Beyond-Endpoint-Centric-Monitoring/</loc>
<lastmod>2025-05-22T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Metrics-That-Actually-Drive-Improvement/</loc>
<lastmod>2025-05-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/active-directory-assessment-deep-dive/</loc>
<lastmod>2025-06-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/mdr-evolution-beyond-traditional-monitoring/</loc>
<lastmod>2025-06-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/advanced-attack-path-mapping-strategies/</loc>
<lastmod>2025-06-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/modern-network-security-assessments-beyond-perimeter/</loc>
<lastmod>2025-07-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/mdr-threat-intelligence-integration-strategic-advantage/</loc>
<lastmod>2025-07-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/attack-path-mapping-integration-comprehensive-security-framework/</loc>
<lastmod>2025-07-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/securing-ot-remote-access-after-vpn-vulnerabilities/</loc>
<lastmod>2025-08-05T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/ot-incident-response-planning-beyond-traditional-playbooks/</loc>
<lastmod>2025-08-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/iam-challenges-mergers-acquisitions-identity-integration/</loc>
<lastmod>2025-08-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/bsideslv-2025-debrief-hacker-summer-camp-insights/</loc>
<lastmod>2025-08-28T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/SPM-attack-path-mapping-informed-risk-assessments/</loc>
<lastmod>2025-09-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/HIPAA-CFR-safe-harbor-data-classification-configuration/</loc>
<lastmod>2025-09-11T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/data-centric-security-posture-management-beyond-infrastructure/</loc>
<lastmod>2025-09-19T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/meta-guide-seguri-blog-series-comprehensive-security-topics/</loc>
<lastmod>2025-09-24T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/building-a-data-taxonomy-foundation-for-security/</loc>
<lastmod>2025-10-01T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part1-honeypot-fundamentals/</loc>
<lastmod>2025-10-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part2-hands-on-honeypot-deployment/</loc>
<lastmod>2025-10-16T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part3-advanced-deception-operations/</loc>
<lastmod>2025-10-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-trailblazers-cliff-stoll-and-the-first-cyber-manhunt/</loc>
<lastmod>2025-11-06T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-visionaries-dorothy-denning-and-the-science-of-intrusion-detection/</loc>
<lastmod>2025-11-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-innovators-rebecca-bace-and-commercial-cybersecurity/</loc>
<lastmod>2025-11-20T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/identity-access-management/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/incident-response-planning/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/mergers-acquisitions/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/network-security-assessments/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/ot-managed-detection-response/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/threat-modelling-attack-path-mapping/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/active-directory-security-training/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/custom-training/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/detection-engineering-bootcamp/</loc>
<lastmod>2025-11-25T18:12:43-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/contact/</loc>
</url>
<url>
<loc>https://seguri.io/events/</loc>
</url>
<url>
<loc>https://seguri.io/blog/</loc>
</url>
<url>
<loc>https://seguri.io/</loc>
</url>
<url>
<loc>https://seguri.io/privacy/</loc>
<lastmod>2024-07-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/</loc>
</url>
<url>
<loc>https://seguri.io/terms/</loc>
<lastmod>2024-07-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page2/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page3/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page4/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page5/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page6/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page7/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page8/</loc>
</url>
</urlset>
