<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://seguri.io/events/BlueTeamCon2024/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/CarolinaCon2025/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/DistrictCon2026/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/RSTCon2025/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/SecureWV2024/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/events/Your-Event-Here/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Prioritize-Your-Security-Roadmap-with-Threat-Modelling/</loc>
<lastmod>2024-08-06T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/From-plan-to-playbook/</loc>
<lastmod>2024-08-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Crafting-a-Tailored-Security-Architecture-Framework/</loc>
<lastmod>2024-08-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Why-Your-Security-Program-Needs-a-Resource-Plan/</loc>
<lastmod>2024-08-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Mergers-and-Acquistions/</loc>
<lastmod>2024-09-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Mergers-and-Acquisitions/</loc>
<lastmod>2024-09-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Usability-is-Security/</loc>
<lastmod>2024-09-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Securing-Startups/</loc>
<lastmod>2024-09-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Starting-your-Application-Security-Program/</loc>
<lastmod>2024-09-25T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Building-a-Strong-Security-Awareness-Program/</loc>
<lastmod>2024-10-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Minimum-Viable-Security-Product/</loc>
<lastmod>2024-10-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Cyber-Incident-Reporting-for-Critical-Infrastructure-Act-CIRCIA/</loc>
<lastmod>2024-10-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Posture-Management/</loc>
<lastmod>2024-10-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Posture-Management-Attack-Path-Mapping/</loc>
<lastmod>2024-10-30T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Measuring-Security-Awareness-Training-Success/</loc>
<lastmod>2024-11-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/MVSP-Implementation-Roadmap/</loc>
<lastmod>2024-11-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Continuous-Security-Posture-Assessment/</loc>
<lastmod>2024-11-22T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Why-Your-Phishing-Simulations-Might-Be-Hurting-More-Than-Helping/</loc>
<lastmod>2024-12-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Operational-Technology-Security-Posture-Management/</loc>
<lastmod>2024-12-19T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Shmoocon-2025-Key-Takeaways-for-Security-Leaders/</loc>
<lastmod>2025-01-08T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Managed-Detection-and-Response-Beyond-the-Marketing-Hype/</loc>
<lastmod>2025-01-14T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Detection-and-Response-Beyond-Intrusion-Detection/</loc>
<lastmod>2025-01-23T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Building-Effective-Network-Detection-Response-Programs/</loc>
<lastmod>2025-01-30T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/MDR-Contract-Negotiations-What-Actually-Matters/</loc>
<lastmod>2025-02-04T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Integrating-MDR-and-NDR-for-Complete-Threat-Visibility/</loc>
<lastmod>2025-02-18T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Industrial-Protocol-Security-EtherNet-IP-CIP-GE-SRTP/</loc>
<lastmod>2025-02-21T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Unified-Security-Operations-MDR-NDR-SPM-Integration/</loc>
<lastmod>2025-02-27T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/OT-Managed-Detection-Response-Unique-Requirements/</loc>
<lastmod>2025-03-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Security-Assessments-Beyond-Vulnerability-Scanning/</loc>
<lastmod>2025-03-11T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Access-Management-Security-Assessments/</loc>
<lastmod>2025-03-20T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Active-Directory-Security-Assessment-Deep-Dive/</loc>
<lastmod>2025-03-26T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Access-Management-Operational-Technology-Environments/</loc>
<lastmod>2025-04-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/AI-Security-Reality-Check-Same-Problems-New-Hype/</loc>
<lastmod>2025-04-10T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Identity-Focused-MDR-Beyond-Network-Endpoint-Monitoring/</loc>
<lastmod>2025-04-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Industry-Burnout-Beyond-Work-Life-Balance/</loc>
<lastmod>2025-04-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Detection-Response-Operational-Technology-Environments/</loc>
<lastmod>2025-05-06T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Using-AI-Augment-Security-Teams-Practical-Applications/</loc>
<lastmod>2025-05-14T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Network-Focused-MDR-Beyond-Endpoint-Centric-Monitoring/</loc>
<lastmod>2025-05-22T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/Security-Metrics-That-Actually-Drive-Improvement/</loc>
<lastmod>2025-05-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/active-directory-assessment-deep-dive/</loc>
<lastmod>2025-06-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/mdr-evolution-beyond-traditional-monitoring/</loc>
<lastmod>2025-06-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/advanced-attack-path-mapping-strategies/</loc>
<lastmod>2025-06-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/modern-network-security-assessments-beyond-perimeter/</loc>
<lastmod>2025-07-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/mdr-threat-intelligence-integration-strategic-advantage/</loc>
<lastmod>2025-07-17T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/attack-path-mapping-integration-comprehensive-security-framework/</loc>
<lastmod>2025-07-29T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/securing-ot-remote-access-after-vpn-vulnerabilities/</loc>
<lastmod>2025-08-05T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/ot-incident-response-planning-beyond-traditional-playbooks/</loc>
<lastmod>2025-08-12T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/iam-challenges-mergers-acquisitions-identity-integration/</loc>
<lastmod>2025-08-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/bsideslv-2025-debrief-hacker-summer-camp-insights/</loc>
<lastmod>2025-08-28T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/SPM-attack-path-mapping-informed-risk-assessments/</loc>
<lastmod>2025-09-03T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/HIPAA-CFR-safe-harbor-data-classification-configuration/</loc>
<lastmod>2025-09-11T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/data-centric-security-posture-management-beyond-infrastructure/</loc>
<lastmod>2025-09-19T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/meta-guide-seguri-blog-series-comprehensive-security-topics/</loc>
<lastmod>2025-09-24T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/building-a-data-taxonomy-foundation-for-security/</loc>
<lastmod>2025-10-01T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part1-honeypot-fundamentals/</loc>
<lastmod>2025-10-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part2-hands-on-honeypot-deployment/</loc>
<lastmod>2025-10-16T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/preparing-tricks-for-attackers-part3-advanced-deception-operations/</loc>
<lastmod>2025-10-23T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-trailblazers-cliff-stoll-and-the-first-cyber-manhunt/</loc>
<lastmod>2025-11-06T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-visionaries-dorothy-denning-and-the-science-of-intrusion-detection/</loc>
<lastmod>2025-11-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/thankful-for-innovators-rebecca-bace-and-commercial-cybersecurity/</loc>
<lastmod>2025-11-20T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/security-planning-for-2026-part1-evidence-based-threat-modeling/</loc>
<lastmod>2025-12-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/security-planning-for-2026-part2-comprehensive-risk-assessment/</loc>
<lastmod>2025-12-12T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/security-planning-for-2026-part3-coverage-heat-maps-and-implementation/</loc>
<lastmod>2025-12-19T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/seguri-blog-2025-year-in-review-security-insights/</loc>
<lastmod>2025-12-26T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/zero-trust-architecture-moving-from-concept-to-implementation/</loc>
<lastmod>2026-01-02T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/cloud-security-posture-management-beyond-checkbox-compliance/</loc>
<lastmod>2026-01-08T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/devsecops-integration-security-without-slowing-development/</loc>
<lastmod>2026-01-14T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/supply-chain-security-lessons-from-recent-software-incidents/</loc>
<lastmod>2026-01-20T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/ransomware-resilience-beyond-backup-and-recovery/</loc>
<lastmod>2026-01-26T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/vulnerability-management-maturity-risk-based-prioritization/</loc>
<lastmod>2026-02-01T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/soc-optimization-reducing-alert-fatigue-analyst-burnout/</loc>
<lastmod>2026-02-07T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/threat-hunting-building-a-proactive-security-capability/</loc>
<lastmod>2026-02-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/business-email-compromise-defending-against-ai-enhanced-attacks/</loc>
<lastmod>2026-02-19T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/tabletop-exercises-designing-scenarios-that-improve-response/</loc>
<lastmod>2026-02-25T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/nist-csf-2-0-what-is-new-and-why-it-matters/</loc>
<lastmod>2026-03-03T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/cis-controls-v8-practitioner-prioritization-guide/</loc>
<lastmod>2026-03-09T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/privileged-access-management-securing-your-crown-jewels/</loc>
<lastmod>2026-03-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/multi-factor-authentication-balancing-security-and-usability/</loc>
<lastmod>2026-03-21T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/api-security-the-often-overlooked-attack-surface/</loc>
<lastmod>2026-03-27T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/container-and-kubernetes-security-practical-hardening-guide/</loc>
<lastmod>2026-04-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/third-party-risk-management-building-effective-tprm-program/</loc>
<lastmod>2026-04-08T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/data-loss-prevention-practical-implementation-without-false-positives/</loc>
<lastmod>2026-04-14T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/patch-management-strategy-risk-based-approaches-that-actually-work/</loc>
<lastmod>2026-04-20T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/blog/security-awareness-maturity-beyond-annual-phishing-simulations/</loc>
<lastmod>2026-04-26T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/identity-access-management/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/incident-response-planning/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/mergers-acquisitions/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/network-security-assessments/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/ot-managed-detection-response/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/threat-modelling-attack-path-mapping/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/active-directory-security-training/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/custom-training/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/detection-engineering-bootcamp/</loc>
<lastmod>2026-04-27T14:29:58-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/contact/</loc>
</url>
<url>
<loc>https://seguri.io/events/</loc>
</url>
<url>
<loc>https://seguri.io/blog/</loc>
</url>
<url>
<loc>https://seguri.io/</loc>
</url>
<url>
<loc>https://seguri.io/privacy/</loc>
<lastmod>2024-07-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/services/</loc>
</url>
<url>
<loc>https://seguri.io/terms/</loc>
<lastmod>2024-07-15T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://seguri.io/training/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page2/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page3/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page4/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page5/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page6/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page7/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page8/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page9/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page10/</loc>
</url>
<url>
<loc>https://seguri.io/blog/page11/</loc>
</url>
</urlset>
