<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersecrighthere.com/2025/02/23/economy-of-scale-master-of-none/</loc><lastmod>2025-02-23T12:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2024/04/13/saying-the-quite-part-out-loud/</loc><lastmod>2024-04-13T11:27:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2022/12/31/the-empathetic-ciso/</loc><lastmod>2022-12-31T18:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2020/01/04/people-are-hardly-the-weakest-link-in-security/</loc><lastmod>2021-03-05T20:27:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2019/10/19/the-supply-chain-shouldnt-be-zero-trust/</loc><lastmod>2019-10-19T13:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2019/01/26/sso-what-maybe-single-sign-on-isnt-always-appropriate/</loc><lastmod>2019-01-26T12:04:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2018/12/25/forget-your-password/</loc><lastmod>2018-12-25T10:30:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2018/02/04/the-engineers-get-busy-the-spectre-meltdown-patch-roller-coaster/</loc><lastmod>2018-02-04T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/01/13/how-stupid-do-they-have-to-be/</loc><lastmod>2017-12-23T12:24:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/12/02/your-breach-notification-will-arrive-in-525600-minutes-uber/</loc><lastmod>2017-12-08T21:18:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/09/25/how-about-just-being-nuts/</loc><lastmod>2017-09-26T10:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/09/17/a-recent-really-big-breach-reporting-relationships-and-college-degrees/</loc><lastmod>2017-09-17T14:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/05/13/depends-what-you-mean-by-guest-and-other-musings-about-wifi/</loc><image:image><image:loc>https://cybersecrighthere.com/wp-content/uploads/2017/05/20170512_110726.jpg</image:loc><image:title>20170512_110726</image:title></image:image><lastmod>2017-08-27T10:41:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/06/23/one-hand-washing-the-other/</loc><lastmod>2017-07-04T09:57:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/07/02/patch-yours/</loc><lastmod>2017-07-02T11:20:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/06/04/awareness-training-always-has-an-attitude/</loc><lastmod>2017-06-04T20:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2017/02/26/the-cisos-oxymoron/</loc><lastmod>2017-02-26T12:27:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/me-elsewhere/</loc><lastmod>2017-02-04T10:43:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecrighthere.com/2015/05/25/big-data-and-the-paleolithic/</loc><lastmod>2016-09-05T16:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2016/01/24/the-big-risk-transfer/</loc><lastmod>2016-08-05T15:33:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2016/06/13/the-internet-is-not-a-highway-but-security-is-like-driving-a-car/</loc><lastmod>2016-06-14T08:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2016/02/27/misuse-of-the-word-firewall/</loc><lastmod>2016-02-27T13:13:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/12/20/when-is-a-breach-notification-not-a-breach-notification-part-three/</loc><lastmod>2016-01-16T13:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/10/31/i-am-not-a-number-i-am-a-data-point-2/</loc><lastmod>2016-02-14T08:30:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/11/27/security-and-privacy-walk-into-a-bar/</loc><lastmod>2015-11-03T16:14:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/slipping-its-moorings/</loc><image:image><image:loc>https://cybersecrighthere.com/wp-content/uploads/2014/08/castel-nuovo.jpg</image:loc><image:title>Castel Nuovo</image:title></image:image><lastmod>2015-11-02T20:22:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecrighthere.com/2015/09/13/big-data-ebook-free-to-download/</loc><image:image><image:loc>https://cybersecrighthere.com/wp-content/uploads/2015/09/point-beside-the-point-1.jpg</image:loc><image:title>point beside the point 1</image:title></image:image><lastmod>2015-09-17T08:34:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/08/23/the-hack-that-maybe-wasnt-ashley-madison/</loc><lastmod>2015-09-10T19:46:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/09/06/how-to-lie-with-risk-analyses/</loc><lastmod>2016-08-05T13:55:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/01/18/dedomeno/</loc><lastmod>2015-08-26T09:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/05/02/everyones-whitepaperever-a-how-to/</loc><lastmod>2015-05-02T14:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/03/22/bookish-security/</loc><lastmod>2015-03-22T11:19:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/02/14/hooked-on-hacks/</loc><lastmod>2015-02-16T15:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/02/01/when-it-talks-back/</loc><lastmod>2015-02-01T14:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/principles-of-data-privacy-security/</loc><lastmod>2015-01-25T12:05:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecrighthere.com/2012/10/25/swat-teams-power-rangers-and-nerds-with-an-edge/</loc><lastmod>2015-01-24T12:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/01/19/when-is-a-breach-notification-not-a-breach-notification-revisited/</loc><lastmod>2015-01-19T12:02:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2015/01/11/aggregation-is-biased-towards-anonymity/</loc><lastmod>2015-01-11T11:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/27/hack-on-south-carolina-data-criminal-act-of-international-cyber-terrorism-huh/</loc><lastmod>2014-12-30T13:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/04/06/the-winter-of-our-discontent/</loc><lastmod>2014-12-12T13:43:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/12/06/im-certain-that-too-much-certainty-is-certain-failure/</loc><lastmod>2014-12-06T19:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/10/31/in-defense-of-compliance/</loc><lastmod>2014-10-31T21:36:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/06/07/bestpracticesever/</loc><image:image><image:loc>https://cybersecrighthere.com/wp-content/uploads/2014/06/hipaa-mat.png</image:loc><image:title>HIPAA MAT</image:title></image:image><lastmod>2014-09-12T08:20:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/08/11/where-chicken-little-went-wrong/</loc><lastmod>2014-07-24T17:57:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/11/30/lets-stop-measuring-risk/</loc><lastmod>2014-07-24T17:56:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/03/02/the-other-shoe-drops-nist-issues-version-1-0-of-the-framework-for-improving-critical-infrastructure-cybersecurity/</loc><lastmod>2014-07-24T17:55:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/10/25/dont-blame-the-boy-who-cried-wolf/</loc><image:image><image:loc>https://cybersecrighthere.com/wp-content/uploads/2013/10/keep-calm1.png</image:loc><image:title>KEEP CALM</image:title></image:image><lastmod>2014-07-24T17:55:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/07/11/a-new-role-in-data-privacy-the-searcher/</loc><lastmod>2014-07-13T11:30:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/me-elsewhere/about/</loc><lastmod>2014-04-26T12:54:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecrighthere.com/2014/03/08/one-thought-on-the-phrase-critical-infrastructure/</loc><lastmod>2014-03-08T12:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/02/08/pure-customer-service/</loc><lastmod>2014-02-26T13:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2014/01/20/thats-what-im-talking-about/</loc><lastmod>2014-01-20T16:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/07/27/when-is-a-breach-notification-not-a-breach-notification/</loc><lastmod>2014-01-17T15:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/12/25/adequately-revisited/</loc><lastmod>2014-01-10T19:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/09/15/a-change-is-gonna-come/</loc><lastmod>2013-12-05T15:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/25/106/</loc><lastmod>2013-10-06T13:16:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/17/reflections-on-certification-part-1-2/</loc><lastmod>2013-09-30T13:16:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/08/18/the-4th-e-state-of-denial/</loc><lastmod>2013-08-28T02:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/10/most-e-mailed-article/</loc><lastmod>2013-08-12T18:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/05/01/why-isnt-this-blog-more-technical/</loc><lastmod>2013-05-02T09:14:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/04/16/most-e-mailed-article-2/</loc><lastmod>2013-04-16T07:16:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/02/27/cyber-security-professionals-need-to-help-stop-cyberbullying/</loc><lastmod>2013-02-27T11:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/02/16/honest-mom-lots-of-kids-failed-that-test/</loc><lastmod>2013-02-17T13:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/02/16/ciso-as-consumer/</loc><lastmod>2013-02-16T12:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2013/01/21/raising-the-stakes-by-lowering-them/</loc><lastmod>2013-02-08T00:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/05/be-the-change-you-want-to-see-in-your-password/</loc><lastmod>2013-01-27T21:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/12/15/press-release-pass-through-an-interesting-case/</loc><lastmod>2012-12-16T19:54:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/01/reflections-on-certification-part-1/</loc><lastmod>2013-01-31T23:53:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/12/06/patient-privacy-monitoring-where-health-care-it-and-compliance-collaborate/</loc><lastmod>2012-12-06T15:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/28/adequately/</loc><lastmod>2012-11-29T10:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/23/of-codes-and-pigeons/</loc><lastmod>2012-11-23T21:36:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/11/02/84/</loc><lastmod>2013-10-25T10:31:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/26/tellers-of-tales-and-debunkers-of-myths/</loc><lastmod>2012-11-02T16:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/26/us-privacy-law-chaos/</loc><lastmod>2012-10-26T10:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/16/been-a-lot-of-places-and-im-going-to-be-from-here/</loc><lastmod>2013-10-06T11:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/16/encryption-efficiency/</loc><lastmod>2012-10-16T10:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/13/identity-management-in-health-care/</loc><lastmod>2012-10-13T16:12:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/12/got-your-cyber-security-right-here/</loc><lastmod>2012-10-13T13:45:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/12/visibility-v-privacy/</loc><lastmod>2012-10-13T13:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com/2012/10/13/is-all-risk-worth-insuring/</loc><lastmod>2012-10-13T13:43:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecrighthere.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-02-23T12:02:03+00:00</lastmod></url></urlset>
