<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1508517294965-C9HF7J00OWAQD0JRZWTJ/neko.jpg</image:loc>
      <image:title>Episodes</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2019/1/29/why-controlling-time-matters-an-interview-with-arun-sood-scit-labs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1548799927121-1UHGFXV0GAE4VWN8C8V4/Arun+Sood+Interview.jpg</image:loc>
      <image:title>Episodes - Why Controlling Time Matters</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/23/on-the-internet-nobody-knows-if-youre-a-dog-an-interview-with-christian-folini</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1546537856318-TR6FDHSMWFH2YN1NSW9I/portrait_christian_folini_2_thumb.jpeg</image:loc>
      <image:title>Episodes - On The Internet, Nobody Knows If You’re A Dog - An Interview with Christian Folini</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/9/10/are-patient-records-really-private-an-interview-with-stephanie-crabb-founder-of-immersive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1536603967935-NV9QPRJRUUJDH4O6WRZP/Stephanie-Crabb+Cyber+Security+Dispatch+Interview.jpg</image:loc>
      <image:title>Episodes - Are Patient Records Really Private? An Interview with Stephanie Crabb, Founder of Immersive</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/8/28/keeping-cyber-attacks-from-blowing-stuff-up-with-efran-ibrahim-ceo-of-the-bit-bazaar</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1535560061133-NLHWJF064L862F3V3GR1/Erfan+Ibrahim+CEO+BitBazaar+Cyber+Security+Dispatch.jpg</image:loc>
      <image:title>Episodes - Keeping Cyber Attacks from Blowing Stuff Up-An Interview with Erfan Ibrahim, CEO of The Bit Bazaar</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/23/template-title-an-interview-with-first-last-position-of-association-9w3gn-ckrak</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-13</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/7/11/peering-into-the-dark-places-an-interview-with-michael-marriott-of-digital-shadows</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1531323614406-7GZ6E3HA9X6CC770YWL3/Michael+Marriott.JPG</image:loc>
      <image:title>Episodes - Peering Into the Dark Places - An Interview with Michael Marriott of Digital Shadows</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/7/6/three-pillars-of-data-protection-transparency-and-control-an-interview-with-eve-maler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-09</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/7/2/using-the-new-toys-to-solve-the-legacy-issues-an-interview-with-scott-laliberte</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1530124184263-0UI72X454E4VAEQH8M60/Scott+Laliberte+-+Protivity+Philly+%28hi+res%29.jpg</image:loc>
      <image:title>Episodes - Using the New Toys to Solve the Legacy Issues - An Interview with Scott Laliberte of Protiviti</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/29/cisos-are-goal-keepers-all-guts-no-glory-an-interview-with-giovanni-vigna-of-lastline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1530050416994-9K42J2UD7H70GYMU9ZOO/Giovanni+Vigna.jpg</image:loc>
      <image:title>Episodes - CISO’s are Goal Keepers, All Guts No Glory - An Interview with Giovanni Vigna of Lastline</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/27/who-is-watching-the-watchers-an-interview-with-marton-illes-of-balabit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1530037772076-8NMIM1W8ELB1SX8ILJRA/Marton_Illes_Balabit_400-300x300.jpg</image:loc>
      <image:title>Episodes - Who is Watching the Watchers - An Interview with Marton Illes of Balabit.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/18/the-cloudbased-browser-an-interview-with-scott-petry-ceo-of-authentic8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-21</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/15/everybodys-phishing-an-interview-with-joe-gray-of-advanced-persistent-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1529362441136-VX6VNDAXOHO9EAM4X3ZE/Joe+Gray.jpeg</image:loc>
      <image:title>Episodes - Everybody’s Phishing - An Interview with Joe Gray of Advanced Persistent Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/14/treat-the-disease-an-interview-with-jason-brevnic-cto-of-nss-labs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-14</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/12/privacy-within-the-digital-ecosystem-an-interview-with-pam-dixon-of-world-privacy-forum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1528826973980-F6O52AJ6043V2GCJDOYW/Pam_Dixon.JPG</image:loc>
      <image:title>Episodes - Privacy Within the Digital Ecosystem - An Interview with Pam Dixon of World Privacy Forum</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/7/how-bad-is-iot-security-an-interview-with-stephen-cobb-and-tony-anscombe-from-eset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1528318662744-RW2P5326YXK933M0NSV0/Tony+Anscombe.jpeg</image:loc>
      <image:title>Episodes - How Bad is IOT Security? - An Interview with Stephen Cobb and Tony Anscombe from ESET</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1528318608732-G9UEQ6UKWR3LLRZU9SMW/image-asset.jpeg</image:loc>
      <image:title>Episodes - How Bad is IOT Security? - An Interview with Stephen Cobb and Tony Anscombe from ESET</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/6/4/security-in-the-cloud-an-interview-with-ratinder-ahuja-ceo-of-shieldx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1528141333787-ZBV4G08TEA3ZX7HKB9TV/Ratinder_Ahuja.jpg</image:loc>
      <image:title>Episodes - Security in the Cloud - An Interview with Ratinder Ahuja, CEO of ShieldX</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1528239849527-F2H9Y0G4DWYW9W8U5JUR/RIchness+vs+Readiness+for+Cloud+Buisnesses.jpg</image:loc>
      <image:title>Episodes - Security in the Cloud - An Interview with Ratinder Ahuja, CEO of ShieldX</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/30/from-one-ciso-to-another-get-back-to-the-basics-an-interview-with-jaya-baloo-ciso-of-kpn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526066724105-US59CK5UMCSOMSNH9A3I/jaya_v6.png</image:loc>
      <image:title>Episodes - From One CISO to Another, Get Back to the Basics - An Interview with Jaya Baloo CISO of KPN</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/29/the-making-of-a-cyber-hero-an-interview-with-gary-berman-ceo-of-cyberman-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1527613399385-S4D6KQXY8FTVQELSQOXS/Cyberhero+Comic+Cover.jpeg</image:loc>
      <image:title>Episodes - The Making of a Cyber Hero - An Interview with Gary Berman, CEO of CyberMan Security.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1527613736985-O365QH0VNRXHI8GD3ZXL/CyberHero+Phisher+Depiction.jpeg</image:loc>
      <image:title>Episodes - The Making of a Cyber Hero - An Interview with Gary Berman, CEO of CyberMan Security.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1527613637195-B2IIWJIT0YFAKDRN6K10/CyberHero+Wannacry+Depiction.jpeg</image:loc>
      <image:title>Episodes - The Making of a Cyber Hero - An Interview with Gary Berman, CEO of CyberMan Security.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1527613485663-6AXO091Z4ORQYY9B4YN0/CyberHero+Rat+Depiction</image:loc>
      <image:title>Episodes - The Making of a Cyber Hero - An Interview with Gary Berman, CEO of CyberMan Security.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/7/hacking-the-pentagon-an-interview-with-lisa-wiswell-of-grimm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526330584033-UN4N7ZLUY50AJCEB66XR/grimm-100718928-large.jpg</image:loc>
      <image:title>Episodes - Hacking The Pentagon - An Interview with Lisa Wiswell of Grimm &amp; HackerOne</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/14/avalon-analyst-platform-an-interview-with-john-cassidy-ceo-and-founder-of-king-union</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526067751000-DILSO70ZSS9IQ63GW0MD/John+Cassidy+2.jpeg</image:loc>
      <image:title>Episodes - How to Make Security Analysts' Lives Easier - An Interview with John Cassidy CEO and founder of King &amp; Union</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/7/the-black-report-the-human-behind-the-hack-an-interview-with-david-smith-of-nuix</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526067607037-2Q96OB1K42C54BQ10F08/david-smith-200x250.jpg</image:loc>
      <image:title>Episodes - The Black Report, The Human Behind the Hack - An Interview with David Smith of Nuix.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/9/preserving-your-social-brand-the-new-threat-factor-an-interview-with-mike-price-cto-and-co-founder-of-zerofox</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1525720868865-EZUGHICAAHZDMKZKQRJT/mike-price.jpg</image:loc>
      <image:title>Episodes - Preserving Your Social Brand: The New Threat Factor - An Interview with Mike Price, CTO of ZeroFox</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/7/cisos-on-the-tight-rope-an-interview-with-simon-gibson-ciso-at-gigamon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1525720853211-E0BMELNM3QK9HTRU77E0/simon-gibson.jpg</image:loc>
      <image:title>Episodes - CISOs On the Tight Rope Balancing Act- An Interview with Simon Gibson, CISO at Gigamon</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/5/7/keeping-the-lights-on-an-interview-witharthur-house-chief-risk-officer-for-the-state-of-connecticut7</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1525715938940-7ZD676ZE2APMMI4NJCX1/Arthur+House+Interview+Cyber+Security+Dispatch.JPG</image:loc>
      <image:title>Episodes - Keeping the Lights On - An Interview with Arthur House, Chief Risk Officer for The State of Connecticut.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/4/30/a-postcard-from-the-future-an-interview-with-dr-ron-ross</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1525132191123-P36AM4UFVYBE79YX9IEK/Dr+Ron+Ross+Cyber+Security+Dispatch+Interview.jpg</image:loc>
      <image:title>Episodes - A Postcard From the Future - An Interview with Dr. Ron Ross</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/4/6/stefano-zanero-roberto-clapis-iot-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1522010928857-QA57UTL9DIJU9VER7EQU/Roberto+Clapis+%26+Stefano+Zanero+_CSD+Interview.jpg</image:loc>
      <image:title>Episodes - The Nightmare of IOT Vulnerabilities - An Interview with Stefano Zanero &amp; Roberto Clapis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/3/25/air-gaps-are-like-unicorns-an-interview-with-galina-antinova</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1522008897821-XJ11B0FAFIU9EIKJTTRF/Galina_Antova_Cyber_Security_Dispatch_Interview.jpg</image:loc>
      <image:title>Episodes - Air Gaps Are Like Unicorns - An Interview With Galina Antova</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/3/5/csd-interview-with-justin-berman-from-zenefits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1520273639287-ETCJVF6TDYOFOYQRYY3H/Justin+Zenefits.jpg</image:loc>
      <image:title>Episodes - Focusing on What Matters an Interview with Justin Berman CISO of Zenefits</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/2/2/csd-interview-with-rick-moy-from-acalvio</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1517600681813-JX2GNM77FZA66OV2TQE8/Rick+Moy+-+Live.png</image:loc>
      <image:title>Episodes - Deception as A Strategy An Interview with Rick Moy from Acalvio</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/2/12/csd-interview-with-andrea-little-limbago-chief-social-scientist-at-endgame</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1518471878846-H18N6FXOHIVEIHMY6SXR/Andrea+Little+Limbago.jpg</image:loc>
      <image:title>Episodes - What The Future Of The Internet Looks Like and How We Can Secure It Humanely - An Interview with Andrea Little Limbago, Chief Social Scientist at Endgame</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/2/12/csd-interview-with-joe-slowik-adversary-hunter-at-dragos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1518469882971-NSSD2OAF72ESBE0L9EFT/Joe+Slowik.jpg</image:loc>
      <image:title>Episodes - The Current State Of Protecting Industrial Systems and Safeguarding Civilization Today-An Interview with Joe Slowik, Adversary Hunter at Dragos</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/2/2/csd-interview-with-steve-orrin-cto-of-intel-federal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1518470795610-2LR5OW0ODBCDZD63AC5J/Steve+Orrin.jpg</image:loc>
      <image:title>Episodes - Uncle Sam is Learning New Tricks - An Interview with Steve Orrin, CTO of Intel Federal</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/1/18/csd-interview-with-ray-mastre-director-at-pwc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1517599945329-6TTS1A9B14ZRJ3FCXA0V/Ray+Mastre+-+Live.png</image:loc>
      <image:title>Episodes - CSD Interview with Ray Mastre - Director at PwC</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/2/12/csd-interview-with-internet-hall-of-famer-paul-vixie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1518468664220-OVH47NR2Q6NQS804LE1O/Paul+Vixie.jpg</image:loc>
      <image:title>Episodes - What We Didn't Predict, Can Still Hurt Us, An Interview with Internet Hall of Famer Paul Vixie</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/1/18/csd-interview-with-alya-elena-from-aleada-consulting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1516380056743-ECFRC3O1L5AJY90VBZ3Y/Interview+6.png</image:loc>
      <image:title>Episodes - CSD Interview with Alya &amp; Elena from Aleada Consulting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/1/18/csd-interview-with-randy-henry-senior-gre-specialist-at-sofi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1516380137353-N0A9YP86EPKSHZ24F9PA/Interview+3.png</image:loc>
      <image:title>Episodes - CSD Interview with Randy Henry - Senior GRC Specialist at SoFi</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/1/18/csd-interview-with-marta-oshea-svp-it-audit-director-at-wells-fargo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1516380252253-ZY8YFQBSVP2RKEYXYOJT/Interview+2.png</image:loc>
      <image:title>Episodes - CSD Interview with Marta O'Shea - SVP &amp; IT Audit Director at Wells Fargo</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2018/1/18/csd-interview-with-raj-patel-palo-alto-ciso</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1516380308306-K1PIVMP0YHB3KMYZ9JUV/Interview+1.png</image:loc>
      <image:title>Episodes - CSD Interview with Raj Patel - Palo Alto CISO</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2017/10/19/top-articles-from-the-week</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2017/10/20/last-week-in-cyber-security-10-04-17</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-20</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2017/10/20/corporate-espionage-and-the-new-war-on-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/2017/10/20/conducting-business-across-borders</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/category/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Scoring+of+America+Report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Vulnerability+Identification</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/cyber+startup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/bug+bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Iot+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Access+Privilege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Feature</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Hack+the+Pentagon</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/hack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Cybercrime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Cyber+Skills+Shortage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Andy+Anderson</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Black+Report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Dark+Web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/CISOs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/cybertheft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Live</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Pen+Test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/handling+vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Readiness+of+Solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Steve+Orrin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Vulnerability+Awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Security+Privileges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/CyberHero+Comic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Return+on+Investment+Visualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/GDPR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Data+Privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Teaching+Cyber</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Richness+of+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Featured</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Machine+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Joe+Slowik</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Risk+Management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Multi-cloud-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Startup+Advice</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Cyber</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Ash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/East-West+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Data+Standards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Paul+Vixie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Diversifying+Cyber+Culture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Government</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Election+Hack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Microservice+Architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Personally+Identifiable+Information</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Voting+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Back+to+Basics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Our+Next+Generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Data+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Dara+Standards</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Ashwin+Krishnan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/Legacy+Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/dispatch/tag/emerging+threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/index</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2018-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526680707137-GO8YMH6USJAH25GIGNY5/GooglePlayMusicLogo.png</image:loc>
      <image:title>Index</image:title>
      <image:caption>Listen on GooglePlayMusic</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526680734709-53XFS81F2WAAA6J7F427/image-asset.png</image:loc>
      <image:title>Index</image:title>
      <image:caption>Listen on PlayerFM</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1526680670423-KZRL5U30WKFZPLRQZP74/iTunesLogo.png</image:loc>
      <image:title>Index</image:title>
      <image:caption>Listen on iTunes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1516304505588-3A0NCBM053MI0UPLWCIR/cameras+.png</image:loc>
      <image:title>Index</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1531842525268-ZOSEPX5P5ZU6UCPIGJXA/exploading+globe.png</image:loc>
      <image:title>Index</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1527280841858-GQK067CNC4XG5IQ4UF5B/Ways+to+Listen.jpg</image:loc>
      <image:title>Index</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-10-19</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1508442197806-1MDTDUW3CN7IJKSOBIAX/Cyber_Security_Dispatch_Border.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/59e8f5f6f14aa135c0f504d3/1525890530964-KNYIKYXIB6XMF06ACS1Q/Ashwin+Krishnan+Headshot</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/conferences</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-19</lastmod>
  </url>
  <url>
    <loc>https://cybersecuritydispatch.com/interviews</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
</urlset>

