<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <url>
    <loc>https://www.cyfenders.com/</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/assessment-and-compliance-advisory</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/cyber-risk-governance</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/executive-security-advisory</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/incident-readiness</loc>
  </url>
  <url>
    <loc>https://www.cyfenders.com/services/leadership/post-acquisition-cyber-risk-assessment</loc>
  </url>


  <url>
    <loc>https://www.cyfenders.com/services/leadership/policy-and-standards-development</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/security-strategy-program-design</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/leadership/vciso-services</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations/hands-on-security-support</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations/msp-security-oversight</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations/secure-development-guidance</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations/security-program-oversight</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/operations/vulnerability-management-oversight</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/application-security-review</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/attack-simulations</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/cloud-and-infrastructure-security-assessment</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/compliance-readiness-and-gap-assessment</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/ot-and-ics-risk-assessment</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/penetration-testing</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/assurance/third-party-and-vendor-risk-assessment</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/advanced-secure-development</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/application-security-awareness</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/cloud-security</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/cyber-security-awareness</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/cyber-security-management</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/cyber-security-threats-executives</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/ethical-hacking</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/preventing-ransomware</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/secure-development</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/services/training/security-code-reviews</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings/assessments-compliance</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings/cyber-risk</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings/executive-security-advisory</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings/incident-readiness</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/executive-briefings/security-strategy</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/attack-simulations</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/penetration-testing</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/choosing-between-penetration-testing-attack-simulations-and-red-teaming</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/determining-security-testing-frequency</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/how-to-decide-what-should-be-in-scope</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/how-to-tell-if-your-organization-is-ready-for-advanced-testing</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/how-to-use-penetration-test-findings-as-intelligence-instead-of-grades</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/signs-that-your-security-program-is-not-ready-for-meaningful-results</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/using-penetration-test-results-to-drive-improvement</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/what-a-clean-penetration-test-report-does-not-mean</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/what-security-testing-cannot-compensate-for</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/what-to-do-after-a-penetration-test</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/what-to-do-before-your-first-penetration-test</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/why-comparing-penetration-test-results-year-over-year-is-often-misleading</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/resources/quick-guides/why-second-order-effects-often-matter-more-than-vulnerabilities</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/about</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/privacypolicy</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/referrals</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/referrals_program_terms</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/posts/2020/04/14/socially_distancing_our_devices</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/posts/2021/05/12/cyberattack_against_colonial_pipeline</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/posts/2025/03/21/the_pentesting_paradox</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/posts/2025/04/01/performative_security</loc>
  </url>

  <url>
    <loc>https://www.cyfenders.com/posts/2025/04/21/artificial_intelligences_waze_problem</loc>
  </url>

</urlset>
