<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.370security.com/2024/10/15/navigating-the-first-90-180-days-in-a-new-ciso-role/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/10/a-business-person-sitting-at-a-desk-writing-a-to-do-list-on-a-notepad.jpg</image:loc><image:title>a business person sitting at a desk writing a to do list on a notepad</image:title></image:image><lastmod>2025-06-26T19:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/09/24/should-the-security-be-an-approver-for-it-and-business-requests/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/09/designer-43.png</image:loc><image:title>Designer-43</image:title></image:image><lastmod>2025-03-25T17:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/10/08/build-a-proactive-security-program-by-focusing-on-the-fundamentals/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/10/conceptually-representing-proactivity.jpg</image:loc><image:title>conceptually representing proactivity</image:title></image:image><lastmod>2024-10-10T15:52:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/10/01/is-agile-and-devops-holding-back-your-security-program/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/09/designer-44.png</image:loc><image:title>Designer-44</image:title></image:image><lastmod>2024-09-30T01:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/08/20/following-snowflake-cloud-providers-need-to-shift-to-secure-by-default/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/designer-16.png</image:loc><image:title>Designer-16</image:title></image:image><lastmod>2024-08-20T02:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/08/13/navigating-the-ciso-job-market/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/designer-15.png</image:loc><image:title>Designer-15</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-a-depression-era-cartoon-image-of-someone-with-a-2.png</image:loc><image:title>create-a-depression-era-cartoon-image-of-someone-with-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-a-depression-era-cartoon-image-of-someone-with-a-1.png</image:loc><image:title>create-a-depression-era-cartoon-image-of-someone-with-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-a-depression-era-cartoon-image-of-someone-with-a.png</image:loc><image:title>create-a-depression-era-cartoon-image-of-someone-with-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-13T03:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/08/06/should-companies-be-held-liable-for-software-flaws/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/designer-42.png</image:loc><image:title>Designer-42</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-an-image-of-police-arresting-a-criminal.png</image:loc><image:title>create-an-image-of-police-arresting-a-criminal</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-an-image-of-police-arresting-a-criminal-wearing-a-1.png</image:loc><image:title>create-an-image-of-police-arresting-a-criminal-wearing-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-an-image-of-police-arresting-a-criminal-wearing-a.png</image:loc><image:title>create-an-image-of-police-arresting-a-criminal-wearing-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-an-image-of-police-arresting-a-criminal-in-a-1.png</image:loc><image:title>create-an-image-of-police-arresting-a-criminal-in-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/create-an-image-of-police-arresting-a-criminal-in-a.png</image:loc><image:title>create-an-image-of-police-arresting-a-criminal-in-a</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-06T02:16:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/07/31/how-cios-ctos-and-the-rest-of-the-c-suite-can-better-support-cisos/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/designer-40.png</image:loc><image:title>Designer-40</image:title></image:image><lastmod>2024-07-31T04:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/07/23/a-cisos-analysis-of-the-crowdstrike-global-outage/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-an-image-of-a-digital-mushroom-cloud.png</image:loc><image:title>create-an-image-of-a-digital-mushroom-cloud</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion-5.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion-4.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion-3.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion-2.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion-1.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-a-cartoon-image-of-a-nuclear-explosion.png</image:loc><image:title>create-a-cartoon-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/create-an-image-of-a-nuclear-explosion.png</image:loc><image:title>create-an-image-of-a-nuclear-explosion</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-23T03:23:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/07/16/tips-for-managing-anxiety-stress-burnout-and-mental-health/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer-36.png</image:loc><image:title>Designer-36</image:title></image:image><lastmod>2024-07-16T02:16:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/07/10/how-should-cisos-think-about-risk/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/designer-35.png</image:loc><image:title>Designer-35</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/07/stacked-risk-chart.png</image:loc><image:title>Stacked Risk Chart</image:title></image:image><lastmod>2024-07-09T20:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/07/02/should-cisos-be-technical/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-14.png</image:loc><image:title>Designer-14</image:title></image:image><lastmod>2024-06-30T22:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/videos/</loc><lastmod>2024-06-30T22:05:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.370security.com/2024/06/18/are-security-certifications-worth-renewing/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/06/designer-34.png</image:loc><image:title>Designer-34</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/06/cert-renew-flow.png</image:loc><image:title>cert-renew-flow</image:title></image:image><lastmod>2024-06-18T02:49:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/talks-presentations/</loc><lastmod>2024-06-17T15:00:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.370security.com/2024/06/04/navigating-hardware-supply-chain-security/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-29.png</image:loc><image:title>Designer-29</image:title></image:image><lastmod>2024-06-04T02:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/05/28/accelerate-your-ciso-career-by-investing-in-your-brand/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-27.png</image:loc><image:title>Designer-27</image:title></image:image><lastmod>2024-05-29T02:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/05/21/whats-the-difference-between-a-cso-and-ciso/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/twins_twins_cso.jpg</image:loc><image:title>twins_twins_cso</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-26.png</image:loc><image:title>Designer-26</image:title></image:image><lastmod>2024-05-21T13:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/05/14/when-evaluating-a-new-ciso-role-dont-forget-the-sec-10-k-and-other-governance-forms/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-25.png</image:loc><image:title>Designer-25</image:title></image:image><lastmod>2024-05-11T23:26:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/about-me/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/lee-headshot.jpg</image:loc><image:title>(c) Lee Vorthman lee@vorthman.com</image:title><image:caption>(c) Lee Vorthman lee@vorthman.com</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/88ffe6e1-9160-427d-b277-d7eac7187b8e-1.png</image:loc><image:title>88ffe6e1-9160-427d-b277-d7eac7187b8e-1</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/88ffe6e1-9160-427d-b277-d7eac7187b8e.png</image:loc><image:title>88ffe6e1-9160-427d-b277-d7eac7187b8e</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/certified-information-systems-security-professional-cissp.png</image:loc><image:title>certified-information-systems-security-professional-cissp</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/cciso_3db19abba7e9-1.png</image:loc><image:title>cciso_3db19abba7e9-1</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/cciso_3db19abba7e9.png</image:loc><image:title>cciso_3db19abba7e9</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-05-11T15:33:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.370security.com/2024/05/07/start-preparing-for-your-next-role-during-your-current-role/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/05/designer-24.png</image:loc><image:title>Designer-24</image:title></image:image><lastmod>2024-06-04T15:50:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/04/30/whats-better-complete-coverage-with-multiple-tools-or-partial-coverage-with-one-tool/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer-4.png</image:loc><image:title>Designer-4</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/defense-in-depth.png</image:loc><image:title>defense-in-depth</image:title></image:image><lastmod>2024-04-30T00:35:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/04/23/if-data-is-our-most-valuable-asset-why-arent-we-treating-it-that-way/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer-21.png</image:loc><image:title>Designer-21</image:title></image:image><lastmod>2024-04-23T04:22:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/04/16/security-considerations-for-ma-and-divestitures/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer-3.png</image:loc><image:title>Designer-3</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer-2.png</image:loc><image:title>Designer-2</image:title></image:image><lastmod>2024-04-18T15:11:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/03/12/are-traditional-it-roles-still-relevant-in-todays-modern-security-org/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/03/designer-4.png</image:loc><image:title>Designer-4</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/03/xaas-pic.png</image:loc><image:title>xaas-pic</image:title></image:image><lastmod>2024-04-12T14:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/04/09/should-there-be-a-professional-ciso-certification-and-organization/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/04/designer.png</image:loc><image:title>Designer</image:title></image:image><lastmod>2024-04-09T01:27:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/04/02/are-we-peak-ciso/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/03/49c673b8-4edf-4780-9066-41df4595a779.jpg</image:loc><image:title>_49c673b8-4edf-4780-9066-41df4595a779</image:title></image:image><lastmod>2024-03-30T14:10:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/03/26/security-theater-is-the-worst/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/03/designer-13.png</image:loc><image:title>Designer-13</image:title></image:image><lastmod>2024-03-23T17:53:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/03/19/whats-the-relationship-between-security-governance-and-organizational-maturity/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/03/designer-10.png</image:loc><image:title>Designer-10</image:title></image:image><lastmod>2024-03-20T17:26:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/03/05/the-dichotomy-of-security/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/07/designer-3.png</image:loc><image:title>Designer-3</image:title></image:image><lastmod>2024-03-05T04:27:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/02/27/we-are-drowning-in-patches-and-what-to-do-about-it/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/designer-2.png</image:loc><image:title>Designer-2</image:title></image:image><lastmod>2024-02-27T03:55:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/02/22/are-phishing-campaigns-worth-it/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/designer-5.png</image:loc><image:title>Designer (5)</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/gemini_generated_image-1.jpeg</image:loc><image:title>Gemini_Generated_Image (1)</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/gemini_generated_image.jpeg</image:loc><image:title>Gemini_Generated_Image</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/gemini_generated_image-2.jpeg</image:loc><image:title>Gemini_Generated_Image (2)</image:title></image:image><lastmod>2024-02-23T05:01:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/02/13/using-exceptions-as-a-discovery-tool/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/pexels-photo-7788350.jpeg</image:loc><image:title>yellow background with magnifier</image:title><image:caption>Photo by Ivan Babydov on &lt;a href="https://www.pexels.com/photo/yellow-background-with-magnifier-7788350/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/pexels-photo-802412.jpeg</image:loc><image:title>man looking in binoculars during sunset</image:title><image:caption>Photo by Francis Seura on &lt;a href="https://www.pexels.com/photo/man-looking-in-binoculars-during-sunset-802412/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-02-13T14:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/02/06/defining-your-security-front-door/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/02/pexels-photo-277559.jpeg</image:loc><image:title>closed door and lighted light sconce</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/closed-door-and-lighted-light-sconce-277559/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-02-03T17:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/01/30/annual-planning-for-cisos/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/01/pexels-photo-5386754.jpeg</image:loc><image:title>brown framed eyeglasses on a calendar</image:title><image:caption>Photo by Leeloo The First on &lt;a href="https://www.pexels.com/photo/brown-framed-eyeglasses-on-a-calendar-5386754/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-01-30T15:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/01/23/career-options-post-ciso/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/01/pexels-photo-277593-1.jpeg</image:loc><image:title>seven white closed doors</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/seven-white-closed-doors-277593/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/01/pexels-photo-277593.jpeg</image:loc><image:title>seven white closed doors</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/seven-white-closed-doors-277593/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/01/pexels-photo-1578750.jpeg</image:loc><image:title>photo of pathway surrounded by fir trees</image:title><image:caption>Photo by James Wheeler on &lt;a href="https://www.pexels.com/photo/photo-of-pathway-surrounded-by-fir-trees-1578750/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-01-23T02:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2024/01/16/2023-end-of-year-review-2024-look-ahead/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2024/01/pexels-photo-1387577.jpeg</image:loc><image:title>photo of fireworks</image:title><image:caption>Photo by Anna-Louise on &lt;a href="https://www.pexels.com/photo/photo-of-fireworks-1387577/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-01-16T17:06:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/12/07/opsec-during-incidents/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/10/security-protection-anti-virus-software-60504.jpeg</image:loc><image:title>security logo</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/security-logo-60504/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-12-07T05:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/11/14/will-cvss-4-0-help-companies-manage-vulnerabilities-better/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/11/pexels-photo-546819.jpeg</image:loc><image:title>close up photo of programming of codes</image:title><image:caption>Photo by luis gomes on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-programming-of-codes-546819/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-11-14T04:29:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/11/07/chief-incident-scapegoat-officer-ciso/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/11/goat-animal-horns-black-and-white-86594.jpeg</image:loc><image:title>animal black and white royalty free goat</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/animal-black-and-white-royalty-free-goat-86594/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-11-07T15:13:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/10/17/exploring-the-advantages-and-disadvantages-of-centralized-vs-decentralized-teams/</loc><lastmod>2023-10-16T03:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/10/11/what-causes-ciso-burnout/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/10/match-matches-sticks-lighter-67823.jpeg</image:loc><image:title>white matchstick</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/white-matchstick-67823/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-10-11T12:52:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/10/03/what-happens-post-incident/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/09/train-wreck-steam-locomotive-locomotive-railway-73821.jpeg</image:loc><image:title>accident disaster steam locomotive train wreck</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/accident-disaster-steam-locomotive-train-wreck-73821/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-10-03T15:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/09/25/compliance-corner-series-building-a-successful-security-compliance-program/</loc><lastmod>2023-09-25T11:55:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/09/19/the-most-powerful-word-a-cso-can-say-is-no/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/09/pexels-photo-3825273.jpeg</image:loc><image:title>person holding white chalk</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/person-holding-white-chalk-3825273/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-09-19T13:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/09/05/compliance-corner-series-compliance-landscape-2023/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/09/milan-lee-compliance-corner.jpg</image:loc><image:title>Milan-Lee Compliance Corner</image:title></image:image><lastmod>2023-09-05T15:53:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/08/31/software-supply-chain-security-considerations/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/08/pexels-photo-2226458.jpeg</image:loc><image:title>birds eye view photo of freight containers</image:title><image:caption>Photo by Tom Fisk on &lt;a href="https://www.pexels.com/photo/birds-eye-view-photo-of-freight-containers-2226458/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-08-31T13:40:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/08/23/can-risk-truly-be-measured/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/parachute-skydiving-parachuting-jumping-38447.jpeg</image:loc><image:title>parachuters taking off from plane</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/parachuters-taking-off-from-plane-38447/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-08-23T13:50:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/08/10/security-vendor-questionnaires-too-much-or-not-enough/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/08/pexels-photo-5668869.jpeg</image:loc><image:title>focused woman writing in clipboard while hiring candidate</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/focused-woman-writing-in-clipboard-while-hiring-candidate-5668869/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/08/pexels-photo-5699456.jpeg</image:loc><image:title>crop ethnic psychologist writing on clipboard during session</image:title><image:caption>Photo by Alex Green on &lt;a href="https://www.pexels.com/photo/crop-ethnic-psychologist-writing-on-clipboard-during-session-5699456/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/08/pexels-photo-7821686.jpeg</image:loc><image:title>close up shot of a person filling out a questionnaire</image:title><image:caption>Photo by RDNE Stock project on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-a-person-filling-out-a-questionnaire-7821686/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-08-10T12:59:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/07/28/the-problem-with-vulnerability-scanners/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/pexels-photo-803939.jpeg</image:loc><image:title>black stelar binocular with bag</image:title><image:caption>Photo by Eneida Nieves on &lt;a href="https://www.pexels.com/photo/black-stelar-binocular-with-bag-803939/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-28T15:09:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/07/20/the-different-states-of-a-security-program/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/07/pexels-photo-1437493.jpeg</image:loc><image:title>photo of skyscrapers surrounded with clouds</image:title><image:caption>Photo by Aleksandar Pasaric on &lt;a href="https://www.pexels.com/photo/photo-of-skyscrapers-surrounded-with-clouds-1437493/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-20T14:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/07/11/should-compensation-be-tied-to-security-performance/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/07/pexels-karolina-grabowska-4475524.jpg</image:loc><image:title>pexels-karolina-grabowska-4475524</image:title></image:image><lastmod>2023-07-11T13:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/06/27/vendors-if-you-want-to-reach-cisos-stop-all-the-noise/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/06/pexels-ketut-subiyanto-4584457.jpg</image:loc><image:title>pexels-ketut-subiyanto-4584457</image:title></image:image><lastmod>2023-06-27T04:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/06/20/when-risk-management-goes-wrong/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/06/pexels-pixabay-78793.jpg</image:loc><image:title>pexels-pixabay-78793</image:title></image:image><lastmod>2023-06-20T02:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/06/06/a-ciso-primer-on-navigating-build-vs-buy-decisions/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/06/pexels-jiyoung-kim-4513940.jpg</image:loc><image:title>pexels-jiyoung-kim-4513940</image:title></image:image><lastmod>2023-06-07T01:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/05/31/why-veterans-make-great-security-team-members/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/05/pexels-brett-sayles-1340504.jpg</image:loc><image:title>pexels-brett-sayles-1340504</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/05/pexels-pixabay-40830.jpg</image:loc><image:title>pexels-pixabay-40830</image:title></image:image><lastmod>2023-05-31T02:03:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/05/16/centralized-vs-de-centralized-security-team/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/05/pexels-markus-spiske-1679618.jpg</image:loc><image:title>pexels-markus-spiske-1679618</image:title></image:image><lastmod>2023-05-15T23:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/05/09/leadership-during-an-incident/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-pixabay-260367.jpg</image:loc><image:title>pexels-pixabay-260367</image:title></image:image><lastmod>2023-05-09T00:38:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/18/legal-privilege/</loc><lastmod>2023-05-09T00:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2022/12/12/welcome-to-370security/</loc><lastmod>2023-05-09T00:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/04/18/do-you-need-a-degree-to-work-in-cyber/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-pixabay-267885.jpg</image:loc><image:title>pexels-pixabay-267885</image:title></image:image><lastmod>2023-04-18T00:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/04/11/techniques-for-influencing-changing-security-culture/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-nothing-ahead-4502492.jpg</image:loc><image:title>pexels-nothing-ahead-4502492</image:title></image:image><lastmod>2023-04-11T01:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/04/04/chip-war-book-afterthoughts/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-pixabay-51165.jpg</image:loc><image:title>pexels-pixabay-51165</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-pok-rie-1432673.jpg</image:loc><image:title>pexels-pok-rie-1432673</image:title></image:image><lastmod>2023-04-04T01:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/03/28/your-ciso-has-career-goals-too/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-khwanchai-phanthong-4175028.jpg</image:loc><image:title>pexels-khwanchai-phanthong-4175028</image:title></image:image><lastmod>2023-03-28T00:49:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/03/21/defining-your-security-organization/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-pixabay-163064.jpg</image:loc><image:title>pexels-pixabay-163064</image:title></image:image><lastmod>2023-03-21T15:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/03/15/proposed-sec-rule-changes-for-cyber/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/pexels-mark-youso-15116670.jpg</image:loc><image:title>pexels-mark-youso-15116670</image:title></image:image><lastmod>2023-03-15T00:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/03/07/five-take-aways-from-the-new-2023-national-cybersecurity-strategy/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-christian-catamo-14320543.jpg</image:loc><image:title>pexels-christian-catamo-14320543</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/03/pexels-aaron-kittredge-129112.jpg</image:loc><image:title>pexels-aaron-kittredge-129112</image:title></image:image><lastmod>2023-03-07T15:22:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/02/28/thinking-about-compensation/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/reward-vs-prob.png</image:loc><image:title>Reward vs Prob</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/reward-vs-risk.png</image:loc><image:title>Reward vs Risk</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-alexander-mils-2068975.jpg</image:loc><image:title>pexels-alexander-mils-2068975</image:title></image:image><lastmod>2023-02-25T22:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/02/21/how-playing-video-games-can-help-your-career-in-security/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/pexels-stas-knop-1298601.jpg</image:loc><image:title>pexels-stas-knop-1298601</image:title></image:image><lastmod>2023-02-20T22:31:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/02/14/how-security-evolves-as-organizations-move-from-the-datacenter-to-the-cloud-and-beyond/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/cloud-container.png</image:loc><image:title>cloud-container</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/cloud.png</image:loc><image:title>cloud</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/virtualization.png</image:loc><image:title>virtualization</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/data-center-model.png</image:loc><image:title>data-center-model</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/pexels-pixabay-531767.jpg</image:loc><image:title>pexels-pixabay-531767</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/02/pexels-pixabay-52531.jpg</image:loc><image:title>pexels-pixabay-52531</image:title></image:image><lastmod>2023-02-13T04:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/grid-of-posts-3x2/</loc><lastmod>2023-02-08T21:44:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.370security.com/2023/02/07/conquering-impostor-syndrome/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-nathan-cowley-897817.jpg</image:loc><image:title>pexels-nathan-cowley-897817</image:title></image:image><lastmod>2023-02-07T15:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/30/building-a-security-budget-to-address-risk/</loc><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-tima-miroshnichenko-6693661-1.jpg</image:loc><image:title>pexels-tima-miroshnichenko-6693661-1</image:title></image:image><image:image><image:loc>https://blog.370security.com/wp-content/uploads/2023/01/pexels-tima-miroshnichenko-6693661.jpg</image:loc><image:title>pexels-tima-miroshnichenko-6693661</image:title></image:image><lastmod>2023-01-30T04:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/24/how-will-the-cso-role-change-post-uber/</loc><lastmod>2023-01-24T14:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/home/</loc><lastmod>2023-01-24T03:08:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.370security.com/2022/12/12/security-team-assemble/</loc><lastmod>2023-01-24T02:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2022/12/15/building-a-strategic-plan/</loc><lastmod>2023-01-24T02:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/03/cultural-change-agent-part-1-what-doesnt-work/</loc><lastmod>2023-01-24T01:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/04/cultural-change-agent-part-2-what-does-work/</loc><lastmod>2023-01-24T01:56:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com/2023/01/09/giving-a-presentation-to-the-board/</loc><lastmod>2023-01-24T01:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.370security.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-06-26T19:25:35+00:00</lastmod></url></urlset>
