<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://leberconsultingllc.com/services/</loc><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2024/01/benjamin-child-gwe0dlvd9e0-unsplash.jpg</image:loc><image:title>benjamin-child-gwe0dlvd9e0-unsplash</image:title></image:image><lastmod>2026-01-12T15:47:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://leberconsultingllc.com/portfolio/</loc><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2026/01/memphis-tigers-logo-1795192840.png</image:loc><image:title>memphis-tigers-logo-1795192840</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/05/gmc_masterlogofullcolor.png</image:loc><image:title>GMC_MasterLogoFullColor</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/05/oip.jpg</image:loc><image:title>OIP</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/03/ale.jpg</image:loc><image:title>ALE</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/02/force-protect-security-consultants-1.webp</image:loc><image:title>Force Protect Security Consultants</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/02/force-protect-security-consultants.webp</image:loc><image:title>Force Protect Security Consultants</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2024/10/lurie-childrens-logo-rgb-ii.webp</image:loc><image:title>lurie-childrens-logo-rgb-ii</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2024/07/stp-2.png</image:loc><image:title>stp</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2024/07/ah-1.jpg</image:loc><image:title>ah</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2024/07/ah.jpg</image:loc><image:title>ah</image:title></image:image><lastmod>2026-01-12T15:46:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://leberconsultingllc.com/about/</loc><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/03/02-service-disabled-veteran-owned-business-dak-resources-300x273-1.webp</image:loc><image:title>02-Service-Disabled-Veteran-Owned-Business-Dak-Resources-300x273</image:title></image:image><image:image><image:loc>https://leberconsultingllc.com/wp-content/uploads/2025/02/certified-information-systems-security-professional-cissp.png</image:loc><image:title>certified-information-systems-security-professional-cissp</image:title></image:image><lastmod>2025-03-20T15:21:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://leberconsultingllc.com/contact/</loc><lastmod>2024-01-18T19:44:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://leberconsultingllc.com/2018/01/07/watch-peertalk-moving-to-information-security-career-on-youtube-panel-i-had-the-honor-to-be-a-part-of-i-am-hosting-a-few-more-this-year/</loc><lastmod>2024-01-13T15:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/24/software-defined-perimeters-challenge-the-corporate-vpn-on-security/</loc><lastmod>2019-05-24T13:39:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/23/forbes-cisos-stop-focusing-on-cybersecurity/</loc><lastmod>2019-05-23T14:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/22/5-threat-detection-and-response-technologies-are-coming-together-cso-online/</loc><lastmod>2019-05-22T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/21/utilizing-the-osi-model-to-kick-start-your-security-strategy-or-you-got-to-start-somewhere-dennis-leber/</loc><lastmod>2019-05-22T00:43:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/21/new-cybersecurity-report-warns-cios-if-youre-breached-or-hacked-its-your-own-fault/</loc><lastmod>2019-05-21T14:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/19/the-cybersecurity-202-a-list-of-things-the-us-government-most-needs-to-protect-against-cyberattacks-sfgate/</loc><lastmod>2019-05-19T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/18/key-findings-on-the-state-of-operational-technology-and-cybersecurity-cso-online/</loc><lastmod>2019-05-18T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/17/companies-stock-value-dropped-7-5-after-data-breaches-infosecurity-magazine/</loc><lastmod>2019-05-17T15:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/17/techspot-us-marine-corps-seeks-volunteers-for-civilian-cybersecurity-team/</loc><lastmod>2019-05-17T14:39:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/17/ibm-security-exec-ai-presents-opportunities-but-also-challenges-for-cyber-risk-media-entertainment-services-alliance/</loc><lastmod>2019-05-17T14:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/16/the-dangers-of-unsecured-medical-devices-healthcareinfosecurity/</loc><lastmod>2019-05-16T14:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/13/does-your-organization-view-cybersecurity-as-a-competitive-advantage/</loc><lastmod>2019-05-15T22:32:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/15/how-to-raise-the-level-of-appsec-competency-in-your/</loc><lastmod>2019-05-15T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/14/cyber-security-risk-assessments-for-business-cert-nz/</loc><lastmod>2019-05-14T14:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/13/take-these-five-steps-to-really-mitigate-your-data-breach-risks-security-boulevard/</loc><lastmod>2019-05-13T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/13/lawyers-and-cybersecurity-in-2019-how-does-your-firm-compare-above-the-law/</loc><lastmod>2019-05-13T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/12/can-the-position-of-ciso-really-help-your-organisation-2/</loc><lastmod>2019-05-12T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/12/industry-puts-cybersecurity-pros-in-charge-axios/</loc><lastmod>2019-05-12T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/22/ciso-are-needed-for-every-bank/</loc><lastmod>2019-05-11T14:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/11/how-to-reconstruct-your-businesss-value-chain-for-the-digital-world-cio/</loc><lastmod>2019-05-11T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/11/council-post-operationalizing-cybersecurity-evolution-seamlessness-and-holistic-thinking-as-key-drivers/</loc><lastmod>2019-05-11T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/11/can-the-position-of-ciso-really-help-your-organisation/</loc><lastmod>2019-05-11T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/10/the-economic-side-of-cyber-security-risk-management-cyber-security-hub/</loc><lastmod>2019-05-10T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/23/the-state-of-corporate-cybersecurity-paranoia-hopelessness/</loc><lastmod>2019-05-09T14:40:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/09/cnbc-a-malware-attack-against-accounting-software-giant-wolters-kluwer-is-causing-a-quiet-panic-at-accounting-firms/</loc><lastmod>2019-05-09T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/09/attention-cisos-five-steps-to-get-the-security-funding-you-need-help-net-security/</loc><lastmod>2019-05-09T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/08/from-fox-news-baltimore-hit-by-ransomware-attack-forcing-officials-to-shut-down-citys-servers/</loc><lastmod>2019-05-09T00:44:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/09/cyber-security-digital-summit-2018/</loc><lastmod>2019-05-08T18:19:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/08/wipro-breach-lessons-for-cisos-express-computer/</loc><lastmod>2019-05-08T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/07/improving-government-and-commercial-cyber-security/</loc><lastmod>2019-05-07T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/06/part-two-how-healthcare-cybersecurity-can-enable-innovation-security-boulevard/</loc><lastmod>2019-05-06T14:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/05/army-researchers-identify-new-way-to-improve-cybersecurity/</loc><lastmod>2019-05-05T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/05/just-how-much-are-financial-institutions-spending-on-cybersecurity-an-average-of-about-2300-per-employee-deloitte-survey-finds/</loc><lastmod>2019-05-05T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/04/zdnet-a-hacker-is-wiping-git-repositories-and-asking-for-a-ransom/</loc><lastmod>2019-05-04T16:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/04/this-windows-malware-is-evolving-to-catch-out-firms-with-poor-cybersecurity/</loc><lastmod>2019-05-04T15:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/04/cybersecurity-policy-academy-highlights-importance-of-state-local-collaboration/</loc><lastmod>2019-05-04T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/04/the-cybersecurity-202-this-is-the-biggest-problem-with-cybersecurity-research-the-washington-post/</loc><lastmod>2019-05-04T14:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/03/a-mysterious-hacker-group-is-on-a-supply-chain-hijacking-spree/</loc><lastmod>2019-05-03T21:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/21/gao-flags-new-cybersecurity-issues-for-upcoming-census/</loc><lastmod>2019-05-03T15:07:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/03/financial-firms-spend-up-to-3000-per-employee-on-cybersecurity-american-banker/</loc><lastmod>2019-05-03T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/03/ten-must-have-ciso-skills/</loc><lastmod>2019-05-03T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/02/zdnet-dell-laptops-and-computers-vulnerable-to-remote-hijacks/</loc><lastmod>2019-05-02T21:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/02/map-your-cyber-risks-to-business-outcomes-with-kris-security-boulevard/</loc><lastmod>2019-05-02T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/02/techcrunch-hackers-went-undetected-in-citrixs-internal-network-for-six-months/</loc><lastmod>2019-05-02T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/20/how-to-help-your-board-navigate-cybersecuritys-legal-risks/</loc><lastmod>2019-05-01T14:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/05/01/want-to-stress-out-your-ciso-heres-how-security-boulevard/</loc><lastmod>2019-05-01T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/30/usa-today-massive-data-breach-exposes-ages-addresses-income-on-80-million-u-s-families/</loc><lastmod>2019-04-30T14:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/30/a-5-step-hipaa-compliance-checklist/</loc><lastmod>2019-04-30T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/29/android-police-new-inception-bar-phishing-method-spoofs-chromes-address-bar-when-you-scroll/</loc><lastmod>2019-04-29T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/29/why-security-it-alignment-still-fails-cso-online/</loc><lastmod>2019-04-29T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/28/the-single-cybersecurity-question-every-ciso-should/</loc><lastmod>2019-04-28T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/27/how-can-automation-be-used-in-cybersecurity-incident-response-capitol-technology-university/</loc><lastmod>2019-04-27T14:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/27/computerworld-fedex-cio-its-time-to-mandate-blockchain-for-international-shipping/</loc><lastmod>2019-04-27T14:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/26/back-to-basics-cybersecurity-starts-at-the-service-desk-gcn/</loc><lastmod>2019-04-26T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/25/3-enemies-the-96b-in-cyber-crime-that-nobody-wants-to-talk-about-att-cybersecurity/</loc><lastmod>2019-04-25T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/24/firms-failing-to-implement-watertight-cyber-security-incident-response-plans-it-pro/</loc><lastmod>2019-04-24T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/23/why-cyber-security-is-key-to-enterprise-risk-management-for-all-organizations-security-boulevard/</loc><lastmod>2019-04-23T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/22/council-post-build-a-strong-cybersecurity-posture-with-these-10-best-practices/</loc><lastmod>2019-04-22T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/21/techradar-major-vulnerabilities-found-in-new-wifi-standard/</loc><lastmod>2019-04-21T14:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/20/11-tech-jobs-where-you-can-earn-a-salary-of-over-200k-techrepublic/</loc><lastmod>2019-04-20T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/20/investors-are-betting-early-on-cybersecurity-startups/</loc><lastmod>2019-04-20T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/19/cybersecurity-is-a-science-not-an-art-says-fortinet-ciso-siliconangle/</loc><lastmod>2019-04-19T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/19/fbi-head-of-cybersecurity-in-san-francisco-warns-look-to-inside-threats/</loc><lastmod>2019-04-19T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/18/why-every-leadership-meeting-should-include-a-cybersecurity-update/</loc><lastmod>2019-04-18T14:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/18/the-roles-and-responsibilities-of-the-ciso-at-mckesson/</loc><lastmod>2019-04-18T14:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/18/cisco-veteran-cyber-scholarship-program/</loc><lastmod>2019-04-18T13:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/17/is-effective-cybersecurity-expensive-infosecurity-magazine/</loc><lastmod>2019-04-17T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/22/cybersecurity-is-a-team-sport-why-a-fractional-ciso-makes-sense-to-manage-cyber-risk-sera-brynn-jdsupra/</loc><lastmod>2019-04-17T13:38:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/16/management-guide-for-cisos-responsibilities-strategies-and-best-practices/</loc><lastmod>2019-04-16T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/15/hybrid-cloud-cheatsheet/</loc><lastmod>2019-04-15T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/15/bill-would-create-cybersecurity-grant-program-for-state-and-local-governments/</loc><lastmod>2019-04-15T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/14/5-ways-for-cisos-to-show-executives-real-results-techrepublic/</loc><lastmod>2019-04-14T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/14/network-world-govt-warns-on-vpn-security-bug-in-cisco-palo-alto-f5-pulse-software/</loc><lastmod>2019-04-14T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/13/should-cyber-security-be-more-chameleon-less-rhino-bbc-news/</loc><lastmod>2019-04-13T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/12/interview-ubers-ciso-reveals-lessons-learned-from-breaches/</loc><lastmod>2019-04-12T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/12/ars-technica-serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/</loc><lastmod>2019-04-12T14:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/11/5-cybersecurity-myths-banks-should-stop-believing/</loc><lastmod>2019-04-11T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/09/35-powerful-cybersecurity-statistics-to-know-in-2019/</loc><lastmod>2019-04-09T14:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/08/technology-in-the-boardroom-five-things-directors-should-be-thinking-about/</loc><lastmod>2019-04-08T14:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/08/security-cheatsheets-for-developers/</loc><lastmod>2019-04-08T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/08/buca-di-beppo-and-planet-hollywood-card-breach-what-you-should-do-next-experian/</loc><lastmod>2019-04-08T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/07/agency-cisos-plan-for-new-programs-partnerships-personnel-in-2019/</loc><lastmod>2019-04-07T14:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/06/best-practices-for-automation-in-cyber-security-security-boulevard/</loc><lastmod>2019-04-06T14:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/05/25-ways-to-reduce-the-frustration-of-vulnerability-management-ciso-security-vendor-relationship-podcast-and-series-ciso-series/</loc><lastmod>2019-04-05T14:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/05/the-cybersecurity-technology-consolidation-conundrum-cso-online/</loc><lastmod>2019-04-05T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/04/the-effective-ciso-needs-more-than-a-control-framework/</loc><lastmod>2019-04-04T14:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/04/cyberseek-close-the-cyber-security-skills-gap-with-these-tools/</loc><lastmod>2019-04-03T14:04:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/03/blurred-lines-the-evolution-of-leadership-in-information-risk-and-cybersecurity/</loc><lastmod>2019-04-03T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/02/top-five-application-security-pitfalls-to-avoid-sc-media/</loc><lastmod>2019-04-02T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/01/taking-on-the-leading-role-in-cyber-security-cyber-security-hub/</loc><lastmod>2019-04-01T14:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/31/playing-the-long-game-how-cisos-can-get-ahead-intelligent-cio-europe/</loc><lastmod>2019-03-31T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/30/the-4-pillars-of-a-lasting-cyber-security-transformation/</loc><lastmod>2019-03-30T14:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/30/zdnet-toyota-announces-second-security-breach-in-the-last-five-weeks/</loc><lastmod>2019-03-30T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/29/forbes-visa-the-undocumented-security-problem-inside-intel-what-you-need-to-know/</loc><lastmod>2019-03-29T20:54:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/29/darpa-is-building-a-secure-voting-system/</loc><lastmod>2019-03-29T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/29/ars-technica-uk-cyber-security-officials-report-huaweis-security-practices-are-a-mess/</loc><lastmod>2019-03-29T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/28/the-digital-transformation-of-the-ciso-from-backroom-to-boardroom-techradar/</loc><lastmod>2019-03-28T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/27/under-gdpr-can-a-ciso-be-the-dpo-sc-media/</loc><lastmod>2019-03-27T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/26/new-hire-onboarding-checklist-a-cisos-perspective-security-boulevard/</loc><lastmod>2019-03-26T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/25/why-cisos-need-partners-for-security-success-bankinfosecurity/</loc><lastmod>2019-03-25T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/04/03/is-cybersecurity-a-part-of-your-business-strategy-it-should-be/</loc><lastmod>2019-03-25T13:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/24/naked-security-sacked-it-guy-annihilates-23-of-his-ex-employers-aws-servers/</loc><lastmod>2019-03-24T14:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/24/5-reasons-youre-not-reading-this-cybersecurity-article/</loc><lastmod>2019-03-24T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/23/30-security-vendor-behaviors-that-set-off-a-cisos-bs-detector-ciso-security-vendor-relationship-podcast-and-series-ciso-series/</loc><lastmod>2019-03-23T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/23/council-post-challenges-that-cause-cisos-to-fail/</loc><lastmod>2019-03-23T14:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/22/council-post-continuous-risk-security-and-compliance-for-cybersecurity-posture-management-a-unified-approach/</loc><lastmod>2019-03-22T13:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/21/bloomberg-big-norwegian-aluminum-producer-suffers-extensive-cyber-attack/</loc><lastmod>2019-03-21T14:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/21/googles-chronicle-unveils-its-first-cybersecurity-product-fortune/</loc><lastmod>2019-03-21T13:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/20/consortium-develops-set-of-recommended-practices-surrounding-cybersecurity-medical-plastics-news/</loc><lastmod>2019-03-20T13:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/19/dxc-technology-are-your-cybersecurity-foundations-in-place-cloud-computing-gigabit/</loc><lastmod>2019-03-19T13:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/18/venturebeat-cisos-you-need-to-manage-by-walking-around/</loc><lastmod>2019-03-18T14:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/17/cisos-guide-to-an-effective-post-incident-board-report-help-net-security/</loc><lastmod>2019-03-17T13:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/16/role-of-the-ciso-top-3-questions/</loc><lastmod>2019-03-16T13:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/15/failure-to-plan-3-unexpected-security-challenges-that-undermine-your-ciso-security-boulevard/</loc><lastmod>2019-03-15T13:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/26/crowdsourcing-metrics-enough-of-discussing-lets-make-a-wiki-and-a-resource-by-dennis-leber/</loc><lastmod>2019-03-14T15:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/14/why-the-ciso-should-report-direct-to-the-ceo-techhq/</loc><lastmod>2019-03-14T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/14/enterprises-need-to-embrace-top-down-cybersecurity-management-cso-online/</loc><lastmod>2019-03-14T13:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/13/council-post-the-top-five-cybersecurity-strategies-for-cloud/</loc><lastmod>2019-03-13T14:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/13/password-managers-have-a-security-flaw-heres-how-to-avoid-it/</loc><lastmod>2019-03-13T13:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/12/the-world-wide-web-is-30-years-old-and-its-inventor-has-a-warning-for-us/</loc><lastmod>2019-03-12T21:34:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/12/why-the-cybersecurity-talent-shortage-is-the-greatest-threat-businesses-face-today-information-security-buzz/</loc><lastmod>2019-03-12T13:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/12/ai-creates-new-skills-gap-in-cybersecurity-study/</loc><lastmod>2019-03-12T13:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/11/rsa-2019-understanding-the-value-of-a-ciso-biztech-magazine/</loc><lastmod>2019-03-11T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/11/cybersecurity-risks-in-automotive-industry-highlighted-in-new-study/</loc><lastmod>2019-03-11T13:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/10/pcmag-google-phishing-attacks-that-can-beat-two-factor-are-on-the-rise/</loc><lastmod>2019-03-10T13:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/10/forbesbook-authorvoice-cybersecurity-skills-for-top-performance-beyond-technical-skills/</loc><lastmod>2019-03-10T13:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/09/a-cybersecurity-guide-for-small-businesses-protonmail-blog/</loc><lastmod>2019-03-09T15:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/08/cybersecurity-should-be-a-source-of-hope-not-fear-here-are-5-reasons-why-world-economic-forum/</loc><lastmod>2019-03-08T15:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/08/how-to-save-thousands-with-these-free-cybersecurity-programs-ecampus-news/</loc><lastmod>2019-03-08T15:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/09/join-the-discussion-on-including-cybersecurity-in-employee-evaluations-a-core-competency-that-deserves-equal-attention/</loc><lastmod>2019-03-08T12:43:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/07/why-cisos-must-get-better-at-connecting-to-the-rest-of-the-company/</loc><lastmod>2019-03-07T15:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/07/ceos-the-weakest-link-in-cybersecurity-cso-the-resource-for-data-security-executives/</loc><lastmod>2019-03-07T15:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/06/6-steps-every-new-ciso-should-take-to-set-their-company-up-for-success/</loc><lastmod>2019-03-06T15:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/05/dhs-state-local-cyber-task-force-tackles-preparedness-mitigation/</loc><lastmod>2019-03-05T15:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/06/a-ceo-cheat-sheet-for-the-cybersecurity-big-one/</loc><lastmod>2019-03-05T14:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/04/uconn-creating-new-cybersecurity-lab-hartfordbusiness-com/</loc><lastmod>2019-03-04T15:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/04/is-cybersecurity-more-important-than-cost-schedule-or-performance/</loc><lastmod>2019-03-04T15:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/03/microsoft-unveils-cloud-based-ai-cybersecurity-tools-healthcare-it-news-2-2/</loc><lastmod>2019-03-03T15:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/03/microsoft-unveils-cloud-based-ai-cybersecurity-tools-healthcare-it-news-2/</loc><lastmod>2019-03-03T15:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/03/rethinking-cybersecurity-as-a-business-priority/</loc><lastmod>2019-03-03T15:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/02/why-risk-based-security-is-the-key-to-driving-business-value-in-2019-techradar/</loc><lastmod>2019-03-02T15:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/01/national-pen-test-execution-standard-would-improve-network-security-network-world/</loc><lastmod>2019-03-01T15:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/28/threat-intelligence-and-dynamic-risk-management-cyber-security-hub/</loc><lastmod>2019-02-28T15:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/28/what-does-success-with-the-baldrige-cybersecurity-excellence-builder-look-like-nist/</loc><lastmod>2019-02-28T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/27/why-cybersecurity-is-essential-to-an-organization/</loc><lastmod>2019-02-27T15:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/26/the-complete-list-of-infosec-related-cheat-sheets-by-claus-cramon-houmann-mobile-application-pentesting-python-for-pentesting/</loc><lastmod>2019-02-26T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/25/zdnet-new-browser-attack-lets-hackers-run-bad-code-even-after-users-leave-a-web-page/</loc><lastmod>2019-02-26T02:38:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/26/join-the-free-cyber-security-digital-summit-and-learn-from-great-cyber-security-pros/</loc><lastmod>2019-02-26T01:37:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/25/u-s-senate-banking-committee-invites-feedback-on-information-security-issues-in-financial-sector-employment-screening-resources/</loc><lastmod>2019-02-25T15:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/25/techrepublic-3-enterprise-cybersecurity-trends-cisos-must-pay-attention-to/</loc><lastmod>2019-02-25T15:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/24/an-interview-with-ciso-billy-spears-making-a-case-for-machine-identity-protection-security-boulevard/</loc><lastmod>2019-02-24T15:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/24/from-fox-news-bmw-daimler-teaming-up-on-car-sharing-tech/</loc><lastmod>2019-02-24T15:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/24/hawaii-it-bills-would-create-cdo-unify-data-management/</loc><lastmod>2019-02-24T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/23/free-nist-csf-maturity-tool-security-boulevard/</loc><lastmod>2019-02-23T15:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/23/techrepublic-how-to-help-cisos-understand-their-role-in-cloud-security/</loc><lastmod>2019-02-23T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/22/ciso-hiring-guides-find-and-engage-cybersecurity-talent-cso-online/</loc><lastmod>2019-02-22T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/21/zdnet-norelationship-phishing-attack-dances-around-microsoft-office-365-email-filters/</loc><lastmod>2019-02-21T15:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/21/how-to-be-an-infosec-thought-leader-alienvault/</loc><lastmod>2019-02-21T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/03/18/how-to-help-cisos-understand-their-role-in-cloud-security-techrepublic/</loc><lastmod>2019-02-21T14:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/22/a-multitiered-approach-to-legal-it-security-legaltech-news/</loc><lastmod>2019-02-21T14:44:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/20/why-corporates-should-recruit-a-ciso-to-the-board-cio-new-zealand/</loc><lastmod>2019-02-20T15:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/19/davey-winder-the-key-ingredients-for-a-good-chief-information-security-officer-ciso/</loc><lastmod>2019-02-19T15:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/18/marriott-ceo-hospitality-business-not-sensitive-to-national-security/</loc><lastmod>2019-02-18T15:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/17/security-trends-to-pay-attention-to-in-2019-and-beyond-google-cloud-blog/</loc><lastmod>2019-02-17T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/16/we-need-action-on-personal-cybersecurity-thehill/</loc><lastmod>2019-02-16T15:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/15/u-s-ceos-worry-more-about-cybersecurity-than-a-recession-survey-fortune/</loc><lastmod>2019-02-15T15:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/14/the-ciso-view-on-devops-new-report-highlights-approaches-to-reduce-cyber-security-risk-business-wire/</loc><lastmod>2019-02-14T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/13/security-is-a-critical-factor-in-determining-where-enterprises-will-run-their-application-security-boulevard/</loc><lastmod>2019-02-13T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/12/cybersecurity-and-data-privacy-considerations-in-due-diligence-lexology/</loc><lastmod>2019-02-12T15:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/12/devops-com-death-of-the-release-the-move-to-continuous-delivery-and-experimentation/</loc><lastmod>2019-02-12T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/11/large-firms-what-role-for-the-group-ciso/</loc><lastmod>2019-02-11T15:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/11/many-companies-lack-cisos-amid-steeper-compliance-demands-security-boulevard/</loc><lastmod>2019-02-11T15:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/10/risk-management-in-the-digital-age-security-boulevard/</loc><lastmod>2019-02-10T15:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/09/5-tools-for-employee-compliance-and-cybersecurity/</loc><lastmod>2019-02-09T15:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/08/do-your-ceo-and-cfo-underinvest-in-cybersecurity-heres-why-and-what-to-do-about-it-healthcare-finance-news/</loc><lastmod>2019-02-08T15:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/07/does-a-board-realize-whats-needed-for-the-cybersecurity-of-their-company/</loc><lastmod>2019-02-07T15:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/06/cybersecurity-must-be-top-priority-for-2020-presidential-candidates/</loc><lastmod>2019-02-06T15:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/05/second-community-ebook-essentials-of-cybersecurity-by-limor-elbaz-information-security-cissp-telecom-security/</loc><lastmod>2019-02-05T15:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/05/what-is-a-ciso-responsibilities-and-requirements-for-this-vital-role-itworld/</loc><lastmod>2019-02-05T15:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/04/why-security-by-design-and-security-devops-are-so-critical-to-success-help-net-security/</loc><lastmod>2019-02-04T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/03/how-digital-transformation-changes-security-needs/</loc><lastmod>2019-02-03T15:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/02/why-smart-cisos-focus-first-on-trust/</loc><lastmod>2019-02-02T15:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/02/information-security-no-longer-the-department-of-no-security-boulevard/</loc><lastmod>2019-02-02T15:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/02/01/start-with-the-why-a-strategic-lifecycle-for-information-security-isaca-now/</loc><lastmod>2019-02-01T15:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/31/official-idaho-needs-a-cybersecurity-expert-for-elections-kifi/</loc><lastmod>2019-01-31T15:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/30/cyber-security-fud-fear-and-the-growth-of-the-infosec-industry-security-boulevard/</loc><lastmod>2019-01-30T15:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/29/why-fixing-the-internet-isnt-that-hard-information-security-buzz/</loc><lastmod>2019-01-29T15:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/28/the-role-of-a-ciso-during-digitization-security-boulevard/</loc><lastmod>2019-01-28T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/27/cx-and-cybersecurity-dont-treat-your-customers-like-criminals/</loc><lastmod>2019-01-27T15:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/26/if-you-wanna-learn-from-the-it-security-blunders-committed-by-hacked-hospital-group-heres-some-weekend-reading-the-register/</loc><lastmod>2019-01-26T15:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/25/4-things-cisos-get-wrong-about-appsec/</loc><lastmod>2019-01-25T15:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/24/3-urgent-areas-of-action-to-address-cybersecurity-risks/</loc><lastmod>2019-01-24T15:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/23/modern-ciso-challenges-implementing-devsecops-improving-security-operations-help-net-security/</loc><lastmod>2019-01-23T15:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/22/four-trends-that-will-shape-the-cybersecurity-landscape-in-2019-information-security-buzz/</loc><lastmod>2019-01-22T15:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/21/advanced-cyber-security-center-report-identifies-need-for-board-level-cyber-risk-management-standard-newstage/</loc><lastmod>2019-01-21T15:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/20/the-shutdowns-cybersecurity-costs-axios/</loc><lastmod>2019-01-20T15:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/19/2018-sees-record-number-of-online-retail-data-breaches-alienvault/</loc><lastmod>2019-01-19T15:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/19/forbes-chief-information-security-officer-priorities-for-2019/</loc><lastmod>2019-01-19T15:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/18/create-a-cyber-security-policy-for-your-business-cert-nz/</loc><lastmod>2019-01-18T15:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/18/state-cybersecurity-centers-nurture-solutions-and-relationships-statetech-magazine/</loc><lastmod>2019-01-18T15:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/17/fortnite-check-point-researchers-discover-big-cybersecurity-flaw-fortune/</loc><lastmod>2019-01-17T18:06:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/17/cyber-security-conferences-to-attend-in-2019-security-boulevard/</loc><lastmod>2019-01-17T15:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/17/cyber-security-is-not-an-easy-game-its-an-absolute-endgame-by-bhuvanesh-prabhakaran-threat-actors-threat-modeling-ciso/</loc><lastmod>2019-01-17T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/16/most-popular-cybersecurity-blog-posts-from-2018-security-boulevard/</loc><lastmod>2019-01-16T15:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/16/threat-data-and-threat-intelligence-whats-the-difference-by-dflabs-threat-intelligence-and-detection-security-teams-cyber-security/</loc><lastmod>2019-01-16T15:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/15/7-habits-of-a-highly-effective-ciso-2019-data-security-resolutions-security-boulevard/</loc><lastmod>2019-01-15T15:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/15/open-discussion-what-is-the-best-advice-you-would-give-to-a-new-ciso-by-chiheb-chebbi-linkedin/</loc><lastmod>2019-01-14T17:15:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/14/deal-breaker-cyber-security-risk-in-health-care-transactions-polsinelli-jdsupra/</loc><lastmod>2019-01-14T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/13/2019-it-security-employment-outlook-the-hottest-skills-and-markets/</loc><lastmod>2019-01-13T15:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/12/product-development-the-ciso/</loc><lastmod>2019-01-12T15:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/11/hhs-releases-best-practice-healthcare-cybersecurity-guidelines/</loc><lastmod>2019-01-11T15:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/10/call-for-nist-cybersecurity-content-during-the-shutdown-by-rob-black-government-community-access/</loc><lastmod>2019-01-11T03:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/10/four-big-questions-for-cybersecurity-in-2019/</loc><lastmod>2019-01-10T15:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/09/how-to-recover-from-cybersecurity-incidents-a-5-step-plan-techrepublic/</loc><lastmod>2019-01-09T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/08/cybersecurity-and-insurance-hackaday/</loc><lastmod>2019-01-08T15:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/08/2019-osint-guide-by-tenacioustek-by-chiheb-chebbi/</loc><lastmod>2019-01-08T15:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/07/cyber-security-a-non-traditional-security-threat-expert-legal-review/</loc><lastmod>2019-01-07T15:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/05/8-phishing-emails-and-why-youll-fall-for-them-or-not-cso-online/</loc><lastmod>2019-01-05T15:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/04/people-within-smart-city-framework-must-understand-cybersecurity/</loc><lastmod>2019-01-04T15:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/03/the-cso-guide-to-top-security-conferences-2019-cso-online/</loc><lastmod>2019-01-03T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/02/the-value-of-a-hacked-email-account-krebs-on-security/</loc><lastmod>2019-01-02T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/01/what-the-marriott-breach-says-about-security-krebs-on-security/</loc><lastmod>2019-01-01T15:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/31/acumin-jobs-cyber-security-it-security-pen-testing-infosec-jobs/</loc><lastmod>2018-12-31T15:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/30/former-federal-ciso-advocates-zero-trust-security/</loc><lastmod>2018-12-30T15:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/29/web-application-penetration-testing-tools-and-techniques-for-security-auditing-by-shaquib-izhar-cybersecurity-ethical-hacking-web-app-security/</loc><lastmod>2018-12-29T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/29/our-favorite-cybersecurity-resources-legal-talk-network/</loc><lastmod>2018-12-29T15:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2019/01/06/top-30-chief-information-security-officer-ciso-interview-questions-and-answers-for-2018/</loc><lastmod>2018-12-28T17:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/28/cybersecurity-remains-top-trend-for-2019-matrix-integration/</loc><lastmod>2018-12-27T23:12:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/27/cybersecurity-is-providing-information-and-solutions-not-selling-fear/</loc><lastmod>2018-12-27T15:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/27/the-top-19-security-industry-predictions-for-2019-by-dan-lohrmann-industrial-internet-of-things-industrial-control-systems-artificial-intelligence/</loc><lastmod>2018-12-27T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/26/balancing-cybersecurity-and-regulatory-compliance-cso-online/</loc><lastmod>2018-12-26T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/24/suse-expert-on-what-cisos-should-be-prioritising-in-2019-intelligent-cio-africa/</loc><lastmod>2018-12-24T15:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/23/fbi-kicks-some-of-the-worst-ddos-for-hire-sites-off-the-internet-techcrunch/</loc><lastmod>2018-12-23T15:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/22/how-industry-leaders-should-think-about-cybersecurity/</loc><lastmod>2018-12-22T15:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/20/every-cisos-security-mantra-in-the-cloud-environment-cxotoday-com/</loc><lastmod>2018-12-20T15:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/21/9-key-players-for-a-winning-security-team-security-boulevard/</loc><lastmod>2018-12-19T14:24:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/19/a-chief-security-concern-for-executive-teams/</loc><lastmod>2018-12-19T14:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/16/why-youre-doing-cybersecurity-risk-measurement-wrong/</loc><lastmod>2018-12-16T15:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/15/despite-breaches-many-organizations-struggle-to-to-quantify-cyber-risks-to-business/</loc><lastmod>2018-12-14T22:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/12/7-tips-for-cxos-to-combat-cybersecurity-risks-in-2019-and-beyond-techrepublic/</loc><lastmod>2018-12-12T15:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/11/the-data-exfiltration-wiki-by-chiheb-chebbi/</loc><lastmod>2018-12-11T15:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/10/we-need-to-talk-about-nists-new-password-management-recommendations/</loc><lastmod>2018-12-10T16:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/10/ciso-series-strengthen-your-organizational-immune-system-with-cybersecurity-hygiene-security-boulevard/</loc><lastmod>2018-12-10T15:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/10/no-more-predictions-lets-start-acting-by-peerlyst/</loc><lastmod>2018-12-09T16:33:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/13/how-do-you-handle-cybersecurity-threats-ecampus-news/</loc><lastmod>2018-12-09T15:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/08/us-government-interested-in-tracking-privacy-coins-new-document-shows-coindesk/</loc><lastmod>2018-12-08T15:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/07/cyber-security-all-i-want-for-xmas/</loc><lastmod>2018-12-07T22:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/07/zdnet-most-atms-can-be-hacked-in-under-20-minutes/</loc><lastmod>2018-12-07T15:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/11/the-10-coolest-new-cybersecurity-tools-of-2018/</loc><lastmod>2018-12-07T14:56:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/09/solving-the-cybersecurity-skills-gap-through-employee-crosswalking-security-boulevard/</loc><lastmod>2018-12-07T14:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/06/new-unknown-data-scraper-breach/</loc><lastmod>2018-12-06T22:36:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/06/how-do-you-select-security-champions-by-jared-ablon-cybersecurity-security-culture-cybersecurity-threats/</loc><lastmod>2018-12-06T20:53:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/06/why-cisos-need-to-teach-everyone-to-own-risk/</loc><lastmod>2018-12-06T10:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/06/to-cyber-insure-or-not-by-michalis-kamprianis/</loc><lastmod>2018-12-05T23:08:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/05/how-to-deal-with-technical-debt-a-must-read-twitter-thread/</loc><lastmod>2018-12-05T15:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/04/could-a-ciso-become-your-next-ceo-cso-the-resource-for-data-security-executives/</loc><lastmod>2018-12-04T15:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/04/resource-kali-linux-tutorials-tools-and-experts-to-follow-actively-updated-by-chiheb-chebbi/</loc><lastmod>2018-12-03T15:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/02/theres-a-real-risk-of-not-taking-cybersecurity-seriously-and-its-not-just-hacked-elections/</loc><lastmod>2018-12-02T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/01/how-to-improve-governance-risk-and-compliance/</loc><lastmod>2018-12-01T15:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/03/rise-of-the-cdpo-how-data-protection-officers-became-its-hottest-property-by-pete-sanders/</loc><lastmod>2018-11-30T17:34:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/30/relaxed-anxious-ignorant-our-attitudes-towards-cybersecurity-are-making-the-problem-worse/</loc><lastmod>2018-11-30T15:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/29/kaspersky-86-of-cisos-say-breaches-are-inevitable-but-companies-refuse-to-see-it-as-budget-priority-back-end-news/</loc><lastmod>2018-11-29T15:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/02/moodys-to-build-business-hacking-risk-into-credit-ratings/</loc><lastmod>2018-11-28T23:16:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/28/whats-your-security-maturity-level-krebs-on-security/</loc><lastmod>2018-11-28T15:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/01/it-disaster-recovery-business-continuity-by-armin-roth/</loc><lastmod>2018-11-28T14:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/30/how-to-configure-your-firewall-for-maximum-effectiveness-by-manageengine-itom/</loc><lastmod>2018-11-28T01:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/29/achieving-privacy-online-in-the-digital-age-a-practical-resource-guide-by-ian-barwise-crowdsourcing-ebook/</loc><lastmod>2018-11-28T01:26:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/12/03/entering-the-new-age-of-the-ciso/</loc><lastmod>2018-11-27T15:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/27/free-data-security-resource-for-merchants-launches-from-securitymetrics/</loc><lastmod>2018-11-27T15:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/28/update-track-people-on-the-internet-trape-by-cyberpunk/</loc><lastmod>2018-11-27T14:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/26/dept-of-commerce-nist-announces-online-privacy-faremwork/</loc><lastmod>2018-11-26T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/26/youre-not-hiring-people-youre-trying-to-solve-a-problem-by-david-froud/</loc><lastmod>2018-11-25T20:02:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/25/your-face-as-a-password-may-threaten-your-right-to-privacy-israel21c/</loc><lastmod>2018-11-25T15:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/24/subdomain-take-over-and-what-it-can-do/</loc><lastmod>2018-11-24T23:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/24/how-the-cybersecurity-skills-shortage-hurts-business-roi-and-security/</loc><lastmod>2018-11-24T16:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/23/4-hard-learned-lessons-for-cisos/</loc><lastmod>2018-11-23T16:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/22/hitrust-threat-catalogue-helps-organizations-identify-salient-risks-health-data-management/</loc><lastmod>2018-11-22T16:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/22/cybersecurity-confidentiality-and-lawyers-ethical-obligations-to-their-clients-part-i-above-the-law/</loc><lastmod>2018-11-22T15:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/21/cyber-is-a-boardroom-issue-in-2018-infosecurity-magazine/</loc><lastmod>2018-11-21T16:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/20/86-of-cisos-say-breaches-are-inevitable-but-too-many-are-stuck-in-a-vicious-circle-of-risk-networks-asia-asias-source-for-enterprise-network-knowledge/</loc><lastmod>2018-11-20T16:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/21/the-sec-and-cybersecurity-regulation-lawfare/</loc><lastmod>2018-11-20T13:54:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/20/what-every-ceo-board-should-know-about-cybersecurity-crowd-source-by-dennis-leber/</loc><lastmod>2018-11-19T21:58:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/19/5-ways-cisos-can-improve-collaboration-on-security-risks/</loc><lastmod>2018-11-19T16:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/18/cybersecurity-flaws-in-mapping-applications-ihls/</loc><lastmod>2018-11-18T16:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/17/3-strategies-for-successful-cybersecurity-programs/</loc><lastmod>2018-11-17T16:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/16/ciso-tips-to-get-the-board-onboard-with-security-security-boulevard/</loc><lastmod>2018-11-16T16:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/17/cyber-security-can-save-you-money-by-dennis-leber-risk-assessments-potential-risks-risk-management/</loc><lastmod>2018-11-16T15:29:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/15/the-evasion-techniques-wiki-by-chiheb-chebbi-peerlyst/</loc><lastmod>2018-11-15T16:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/15/why-do-cybersecurity-programs-fail-law-com/</loc><lastmod>2018-11-15T15:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/15/business-insider-japans-cybersecurity-minister-admits-i-dont-use-computers/</loc><lastmod>2018-11-15T10:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/16/who-needs-a-desk-tennessee-takes-telework-to-the-max/</loc><lastmod>2018-11-14T23:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/14/cybersecurity-tips-for-attorneys-law-technology-today/</loc><lastmod>2018-11-14T16:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/10/fda-issues-cybersecurity-premarket-guidance-association-for-the-advancement-of-medical-instrumentation/</loc><lastmod>2018-11-10T16:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/10/forbes-amazon-web-services-customers-can-hack-aws-cloud-and-steal-data-says-oracle-cto-larry-ellison/</loc><lastmod>2018-11-10T16:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/09/what-can-we-all-learn-from-the-does-cybersecurity-strategy/</loc><lastmod>2018-11-09T16:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/08/cybersecurity-career-field-continues-to-be-a-great-path-supply-and-demand/</loc><lastmod>2018-11-08T23:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/08/nastf-head-auto-repairers-taking-initiative-on-cybersecurity-could-be-important-repairer-driven-newsrepairer-driven-news/</loc><lastmod>2018-11-08T16:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/07/comptia-all-employees-have-cybersecurity-obligation/</loc><lastmod>2018-11-07T16:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/06/how-to-create-an-open-education-degree-in-cybersecurity-free-by-gabrielleb-resources-job-ctf/</loc><lastmod>2018-11-06T16:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/06/netwrix-research-2018-netwrix-it-risks-report/</loc><lastmod>2018-11-06T16:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/05/5-privacy-considerations-before-trying-new-edtech-in-the-classroom/</loc><lastmod>2018-11-05T16:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/05/three-ways-cybersecurity-generates-business-value/</loc><lastmod>2018-11-05T16:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/05/ciso-pay-edging-towards-500000-a-year/</loc><lastmod>2018-11-05T15:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/04/part-6-final-in-series-addressing-the-cyber-skills-gap-is-the-cyber-skills-gap-fake-news-by-dennis-leber/</loc><lastmod>2018-11-04T19:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/04/focus-on-cybersecurity-5-things-we-learned-this-month-healthcare-it-news/</loc><lastmod>2018-11-04T16:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/04/intermountain-ciso-healthcare-security-says-goodbye-to-perimeters-hello-to-identities-mobihealthnews/</loc><lastmod>2018-11-04T16:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/04/why-is-cybersecurity-difficult-one-of-the-best-articles-yet/</loc><lastmod>2018-11-04T15:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/03/kernel-rce-caused-by-buffer-overflow-in-apples-icmp-packet-handling-code-cve-2018-4407-by-chiheb-chebbi-buffer-overflow-vulnerability-code-execution-vulnerability-execute-arbitrary-code/</loc><lastmod>2018-11-03T14:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/03/ciso-series-building-a-security-minded-culture-starts-with-talking-to-business-managers-security-boulevard/</loc><lastmod>2018-11-03T14:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/02/the-cisos-role-in-risk-management-ctovision-com/</loc><lastmod>2018-11-02T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/02/the-cybersecurity-patch-new-program-teaches-girl-scouts-about-online-safety-the-san-diego-union-tribune/</loc><lastmod>2018-11-02T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/02/what-do-you-think-about-this/</loc><lastmod>2018-11-02T12:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/01/where-should-the-ciso-sit-in-the-leadership-team-idg-connect/</loc><lastmod>2018-11-01T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/31/are-you-looking-for-a-it-job-are-you-a-vet/</loc><lastmod>2018-10-31T15:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/31/cisos-salaries-expected-to-edge-above-240000-in-2018-2/</loc><lastmod>2018-10-31T14:25:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/31/how-to-enable-developers-to-build-secure-software/</loc><lastmod>2018-10-31T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/31/the-devops-and-devsecops-wiki-by-chiheb-chebbi/</loc><lastmod>2018-10-31T14:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/30/cyber-security-career-paths-doing-our-part-extra-edition-by-dennis-leber-join-the-discussion-and-help-build-this-crowd-sourced-project/</loc><lastmod>2018-10-31T01:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/30/how-to-prevent-your-business-becoming-collateral-damage-of-geopolitical-cyber-conflict/</loc><lastmod>2018-10-30T14:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/30/companies-who-dont-stop-hacks-could-be-breaking-the-law-warns-the-sec/</loc><lastmod>2018-10-30T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/29/part-5-addressing-the-cyber-security-skills-gap-we-got-to-do-what-by-dennis-leber-mostinterestingmaninis-ciso-skillsgap/</loc><lastmod>2018-10-29T23:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/29/best-practices-for-information-security-audit-logs-bcw/</loc><lastmod>2018-10-29T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/28/introducing-the-periodic-table-of-data-privacy/</loc><lastmod>2018-10-28T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/27/a-framework-for-online-privacy-nist/</loc><lastmod>2018-10-27T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/26/privacy-is-your-organizations-most-valuable-resource-you-should-treat-it-as-such/</loc><lastmod>2018-10-26T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/25/debunking-the-cybersecurity-thought-that-humans-are-the-weakest-link-healthcare-it-news/</loc><lastmod>2018-10-25T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/13/a-cio-guide-to-building-a-dashboard-for-cybersecurity-healthcare-it-news/</loc><lastmod>2018-10-24T16:19:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/12/state-cisos-are-getting-more-attention-but-most-still-struggle-for-budgets-and-talent/</loc><lastmod>2018-10-24T16:16:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/24/the-life-of-a-chief-information-security-officer-ciso-manila-bulletin-technology/</loc><lastmod>2018-10-24T14:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/23/part-4-addressing-the-cyber-security-skills-gap-you-mean-i-have-to-stay-in-school-by-dennis-leber-mostinterestingmaninis-ciso-skillsgap/</loc><lastmod>2018-10-24T01:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/23/calm-model-assess-the-maturity-of-your-ciso-security-leadership-by-claus-cramon-houmann-chief-information-security-officer-cyber-security-maturity-model/</loc><lastmod>2018-10-24T01:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/11/it-security-jobs-by-the-numbers-12-stats-the-enterprisers-project/</loc><lastmod>2018-10-23T17:29:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/23/the-most-important-question-organizations-should-be-asking-about-cybersecurity/</loc><lastmod>2018-10-23T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/22/cyber-security-students-get-hands-on-training-from-professionals-at-nky-symposium-wcpo-cincinnati-oh/</loc><lastmod>2018-10-22T04:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/21/techcrunch-hackers-breach-healthcare-gov-system-taking-files-on-75000-people/</loc><lastmod>2018-10-21T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/21/the-cybersecurity-202-kanye-west-is-going-to-make-password-security-great-again-the-washington-post/</loc><lastmod>2018-10-21T04:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/20/schrodingers-encryption-what-the-ciso-needs-to-know-about-quantum-cybersecurity/</loc><lastmod>2018-10-20T04:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/19/duckduckgo-the-pro-privacy-search-engine-hits-30-million-daily-searches/</loc><lastmod>2018-10-19T04:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/18/firing-isnt-the-only-option-for-holding-leaders-accountable-for-cyber-lapses-federal-ciso-says-nextgov/</loc><lastmod>2018-10-18T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/17/join-the-discussion-around-cyber-security-skills-gap-my-article-on-peerlyst-com-part-three-titled-a-career-whats-that/</loc><lastmod>2018-10-17T14:16:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/17/why-manufacturing-companies-need-to-up-their-cybersecurity-game-techrepublic/</loc><lastmod>2018-10-17T14:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/16/a-note-to-recruiters-or-just-another-indicator-of-why-cyber-security-has-a-skills-gap-or-maybe-this-is-one-of-the-challenges-of-the-cyber-skills-gap/</loc><lastmod>2018-10-16T23:22:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/16/avoid-the-high-costs-of-ransomware/</loc><lastmod>2018-10-16T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/15/oig-forms-team-to-protect-hhs-boost-cybersecurity-best-practices/</loc><lastmod>2018-10-15T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/15/fico-chamber-of-commerce-release-tool-to-score-businesses-on-cybersecurity-thehill/</loc><lastmod>2018-10-15T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/14/cnbc-cybersecurity-isnt-being-taken-seriously-enough-mit-professor/</loc><lastmod>2018-10-14T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/14/google-is-shutting-down-google-after-it-exposed-user-data-and-neglected-to-tell-anyone-pcworld/</loc><lastmod>2018-10-14T14:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/13/the-top-10-cyberthreats-it-security-teams-are-facing-right-now-techrepublic/</loc><lastmod>2018-10-13T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/17/cisos-must-plan-for-stupid-when-evolving-security-plans-former-us-govt-ciso-cso-the-resource-for-data-security-executives/</loc><lastmod>2018-10-12T21:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/12/why-you-need-a-virtual-chief-information-security-officer-it-world-canada-news/</loc><lastmod>2018-10-12T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/11/phi-data-security-of-19000-toyota-employees-at-risk/</loc><lastmod>2018-10-11T14:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/10/facebook-breach-single-sign-on-of-doom-databreachtoday/</loc><lastmod>2018-10-11T02:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/10/how-marylands-cybrary-tuned-a-mechanic-into-a-cybersecurity-analyst/</loc><lastmod>2018-10-10T14:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/09/forbes-cybersecurity-not-just-a-job-many-jobs-of-the-future/</loc><lastmod>2018-10-09T23:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/09/advanced-persistent-threat-activity-exploiting-managed-service-providers-us-cert/</loc><lastmod>2018-10-09T09:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/08/software-testing-and-cyber-security-the-forgotten-defence-itproportal/</loc><lastmod>2018-10-08T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/07/steps-to-aid-in-defending-against-apts/</loc><lastmod>2018-10-07T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/06/zdnet-man-gets-two-years-in-prison-for-sabotaging-us-army-servers-with-logic-bomb/</loc><lastmod>2018-10-06T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/05/cybersecurity-risks-in-the-age-of-smart-manufacturing-herjavec-group/</loc><lastmod>2018-10-05T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/04/3-benefits-of-zero-trust-cybersecurity-for-protecting-customer-information/</loc><lastmod>2018-10-04T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/04/managing-data-the-way-we-manage-money/</loc><lastmod>2018-10-04T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/03/why-cisos-are-not-setting-the-business-risk-posture-aymore-cio-dive/</loc><lastmod>2018-10-03T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/03/canadian-spies-release-new-malware-heuristic-tools-to-public/</loc><lastmod>2018-10-03T12:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/03/facebook-breach-what-to-do-next-consumer-information/</loc><lastmod>2018-10-03T09:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/02/how-facebook-was-hacked-and-why-its-a-disaster-for-internet-security/</loc><lastmod>2018-10-02T14:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/02/7-habits-of-highly-effective-security-teams/</loc><lastmod>2018-10-02T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/01/the-ciso-not-reporting-to-the-cio-discussion-another-idea-maybe-the-cs-need-a-redo/</loc><lastmod>2018-10-02T01:01:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/10/01/making-risk-count-winning-strategies-from-global-cisos/</loc><lastmod>2018-10-01T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/30/lets-get-together-how-a-ciso-cbo-partnership-can-reduce-information-security-risk/</loc><lastmod>2018-09-30T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/30/10-signs-you-arent-cut-out-to-be-a-cybersecurity-specialist-techrepublic/</loc><lastmod>2018-09-30T14:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/29/zdnet-port-of-san-diego-suffers-cyber-attack-second-port-in-a-week-after-barcelona/</loc><lastmod>2018-09-29T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/29/network-segmentation-how-to-make-it-work-for-you-every-day-information-security-buzz/</loc><lastmod>2018-09-29T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/29/what-does-it-take-to-become-a-leading-ciso-cpo-magazine/</loc><lastmod>2018-09-29T12:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/28/from-fox-news-facebook-says-50-million-user-accounts-affected-by-security-breach/</loc><lastmod>2018-09-28T18:11:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/28/cybersecurity-researchers-at-eset-have-unveiled-what-they-claim-to-be-the-first-ever-uefi-rootkit-being-used-in-the-wild-allowing-hackers-to-implant-persistent-malware-on-the-targeted-computers-that/</loc><lastmod>2018-09-28T14:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/28/state-cisos-face-workforce-challenges-as-they-combat-cybersecurity-threats-statetech/</loc><lastmod>2018-09-28T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/28/when-and-why-an-agency-ciso-should-consider-parting-ways-with-a-cyber-contractor-nextgov/</loc><lastmod>2018-09-28T12:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/27/part-two-addressing-the-cyber-security-skills-gap-how-a-police-officer-can-be-a-ciso-by-dennis-leber-staff-career-cybersecurity-peerlyst/</loc><lastmod>2018-09-28T01:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/27/techcrunch-bipartisan-bill-seeks-to-elevate-the-federal-cio-position-so-even-the-federal-government-is-attempting-to-pass-a-bill-that-makes-an-antiquated-practice-the-industry-is-moving-away-from/</loc><lastmod>2018-09-27T16:43:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/27/five-computer-security-questions-you-must-be-able-to-answer-right-now-zdnet/</loc><lastmod>2018-09-27T14:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/27/ciso-should-stand-for-chief-influence-security-officer/</loc><lastmod>2018-09-27T12:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/26/not-failing-at-data-lakes-one-company-is-working-on-the-solutions/</loc><lastmod>2018-09-27T00:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/26/cybersecurity-investment-pays-dividends-three-times-over-nafcu/</loc><lastmod>2018-09-26T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/26/push-for-new-it-initiatives-is-impacting-enterprise-security-research-finds-rcr-wireless-news/</loc><lastmod>2018-09-26T12:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/25/lack-of-c-suite-collaboration-hampering-cyber-security-report-finds-business-technology/</loc><lastmod>2018-09-25T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/25/breach-notification-law-interactive-map-bakerhostetler/</loc><lastmod>2018-09-25T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/25/tips-for-cybersecurity-training-from-disney-and-its-genius/</loc><lastmod>2018-09-25T12:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/11/01/5-questions-to-help-cisos-assess-cybersecurity-preparedness-4-5-should-be-top-questions/</loc><lastmod>2018-09-25T12:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/24/the-article-is-dated-so-please-verify-and-looking-up-the-most-recent-versions-but-a-good-consolidated-article-the-security-laws-regulations-and-guidelines-directory-cso-onli/</loc><lastmod>2018-09-24T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/24/nacd-publishes-five-cybersecurity-principles-for-board-directors/</loc><lastmod>2018-09-24T14:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/24/cybersecurity-skills-report-todays-ciso-is-shifting-toward-strategic-business-enablement-cso-online/</loc><lastmod>2018-09-24T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/23/7-reasons-your-company-should-invest-in-it-security/</loc><lastmod>2018-09-23T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/22/boosting-state-website-security/</loc><lastmod>2018-09-22T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/22/express-co-uk-iranian-hackers-steal-top-secret-information-on-nuclear-power-and-cybersecurity/</loc><lastmod>2018-09-22T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/22/usa-today-equifax-breach-freezing-your-credit-is-now-free-in-all-states-under-a-new-law/</loc><lastmod>2018-09-22T11:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/21/its-up-to-you-to-protect-your-data-not-the-ciso-itweb/</loc><lastmod>2018-09-21T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/21/reinforcing-the-security-chain-new-straits-times-malaysia-general-business-sports-and-lifestyle-news/</loc><lastmod>2018-09-21T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/21/managing-cybersecurity-surprises-the-executives-perspective-by-jack-jones-chairman-fair-institute/</loc><lastmod>2018-09-21T12:40:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/20/fbi-to-political-campaigns-up-your-cyber-hygiene-abc11-com/</loc><lastmod>2018-09-20T14:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/19/motherboard-hackers-steal-credit-cards-from-newegg-researchers-say/</loc><lastmod>2018-09-19T23:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/19/ai-for-cybersecurity-is-a-hot-new-trends-it-news-africa-africas-technology-news-leader/</loc><lastmod>2018-09-19T14:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/19/developing-cyber-security-incident-response-plans-for-industrial-control-systems-security-boulevard/</loc><lastmod>2018-09-19T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/19/gov-malloy-releases-annual-report-on-utility-cybersecurity-reviews/</loc><lastmod>2018-09-19T13:08:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/18/why-your-organization-should-invest-in-cybersecurity-insurance/</loc><lastmod>2018-09-18T14:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/18/40-of-managers-say-boards-should-oversee-cybersecurity-survey-shows-security-boulevard/</loc><lastmod>2018-09-18T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/17/come-listen-to-my-talk-about-threat-hunting-nku-college-of-informatics-and-nku-chase-college-of-law/</loc><lastmod>2018-09-17T23:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/17/five-weakest-links-in-cybersecurity-that-target-the-supply-chain-the-first-stop-for-security-news-threatpost/</loc><lastmod>2018-09-17T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/17/top-five-ways-to-talk-cybersecurity-with-c-suite-and-board/</loc><lastmod>2018-09-17T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/20/follow-and-contribute-to-my-series-on-addressing-the-cyberskills-gap/</loc><lastmod>2018-09-17T09:40:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/16/ciso-council-to-address-vendor-risk-management-challenges/</loc><lastmod>2018-09-16T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/18/join-my-continued-discussion-about-regulations/</loc><lastmod>2018-09-15T16:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/15/nations-health-cisos-take-lead-to-manage-third-party-risk-odessa-american-business/</loc><lastmod>2018-09-15T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/14/join-my-discussion-around-victims-of-cyber-crimes/</loc><lastmod>2018-09-14T15:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/14/cybersecurity-and-data-protection-are-about-service-not-fear-accounting-today/</loc><lastmod>2018-09-14T14:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/15/explaining-the-new-normal-in-cybersecurity-to-the-c-suite/</loc><lastmod>2018-09-13T23:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/13/exciting-announcement-dennis-to-be-keynote-speaker-at-murtec-executive-summit-oct-18th-2018-murtecexec/</loc><lastmod>2018-09-13T16:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/13/what-government-organizations-can-learn-from-the-private-sector-about-cybersecurity/</loc><lastmod>2018-09-13T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/13/robust-health-data-security-needed-for-phi-laden-mobile-devices/</loc><lastmod>2018-09-13T14:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/12/the-most-important-attributes-of-a-cybersecurity-platform-cso-online/</loc><lastmod>2018-09-12T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/11/how-to-make-the-best-of-cybersecurity-incidents-security-boulevard/</loc><lastmod>2018-09-11T14:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/11/cisos-recommend-future-actions-for-their-organizations-cso-online/</loc><lastmod>2018-09-11T14:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/10/insights-on-cybersecurity-from-board-members-information-management/</loc><lastmod>2018-09-10T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/10/south-carolina-insurer-data-security-law-should-be-nationwide-role-model/</loc><lastmod>2018-09-10T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/09/4-stories-of-security-vendors-overcoming-roadblocks-ciso-security-vendor-relationship-series-security-boulevard/</loc><lastmod>2018-09-09T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/08/4-steps-higher-ed-information-security-officers-can-take-to-manage-cyber-risk-education-dive/</loc><lastmod>2018-09-08T14:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/08/british-airways-hacked/</loc><lastmod>2018-09-08T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/07/my-series-on-the-cyber-security-skills-gap-introduction-by-dennis-leber-fair-insights-job-peerlyst/</loc><lastmod>2018-09-07T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/07/12-things-every-it-security-professional-should-know-cso-online/</loc><lastmod>2018-09-07T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/31/the-register-oh-sh-the-moment-an-infosec-bod-realized-he-was-tracking-a-cop-cars-movements-by-its-leaky-cellular-gateway/</loc><lastmod>2018-09-06T14:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/02/zdnet-high-achieving-devops-companies-turn-software-around-in-60-minutes/</loc><lastmod>2018-09-06T14:13:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/03/new-guide-on-state-data-breach-laws/</loc><lastmod>2018-09-06T14:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/06/forbes-a-scoville-heat-scale-for-measuring-cybersecurity/</loc><lastmod>2018-09-06T14:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/06/list-of-u-s-senators-targeted-by-foreign-phishing-attacks-mounts/</loc><lastmod>2018-09-06T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/05/cybersecurity-3-0-is-the-single-most-important-event-of-this-century/</loc><lastmod>2018-09-05T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/04/automotive-industry-collaborates-on-new-cybersecurity-guidelines/</loc><lastmod>2018-09-04T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/03/do-you-know-your-gap-cso-online/</loc><lastmod>2018-09-03T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/02/state-ciso-job-portfolios-are-growing-faster-than-their-offices/</loc><lastmod>2018-09-02T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/01/a-threat-modeling-wiki-by-nicole-lamoureux-peerlyst-wiki-healthcare-business-impact-peerlyst/</loc><lastmod>2018-09-01T14:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/31/oig-faults-maryland-for-inadequate-medicaid-data-security/</loc><lastmod>2018-08-31T14:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/30/the-future-role-of-artificial-intelligence-in-enterprise-it-security-information-security-buzz/</loc><lastmod>2018-08-30T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/29/ciso-creed/</loc><lastmod>2018-08-29T23:53:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/29/the-cybersecurity-202-this-new-fbi-cyber-official-could-be-a-moderating-voice-in-encryption-debate-the-washington-post/</loc><lastmod>2018-08-29T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/28/how-to-make-cybersecurity-incidents-hurt-less-cso-online/</loc><lastmod>2018-08-28T14:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/20/new-u-s-law-directs-nist-to-provide-cyber-security-resources-to-smbs/</loc><lastmod>2018-08-27T16:40:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/23/wow-millions-of-medical-records-were-easily-available-to-would-be-hackers-komando-com/</loc><lastmod>2018-08-27T16:38:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/24/spyware-company-exposed-terabytes-of-sensitive-images-and-location-data/</loc><lastmod>2018-08-27T16:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/27/bgr-a-16-year-old-hacked-apple-and-stole-90gb-of-secure-files/</loc><lastmod>2018-08-27T16:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/26/aquasec-com-kube-hunter-an-open-source-tool-for-kubernetes-penetration-testing/</loc><lastmod>2018-08-27T16:36:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/25/phys-org-security-gaps-identified-in-internet-protocol-ipsec/</loc><lastmod>2018-08-27T16:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/27/discovery-casts-dark-shadow-on-computer-security-eurekalert-science-news/</loc><lastmod>2018-08-27T16:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/25/cnbc-t-mobile-discovers-security-breach-of-certain-customer-information/</loc><lastmod>2018-08-27T16:34:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/09/04/6-artificial-intelligence-cyber-security-tools-you-need-to-know-packt-hub/</loc><lastmod>2018-08-26T17:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/25/why-your-approach-to-cybersecurity-needs-to-be-proactive-rather-than-reactive-security-sales-integration/</loc><lastmod>2018-08-25T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/24/how-cisos-stay-current-when-theyre-ignoring-vendor-pitches-ciso-security-vendor-relationship-podcast-security-boulevard/</loc><lastmod>2018-08-24T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/23/president-signs-nist-small-business-cybersecurity-act-into-law/</loc><lastmod>2018-08-23T14:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/22/4-effective-targeted-techniques-to-market-gdpr-ciso-security-vendor-relationship-series-security-boulevard/</loc><lastmod>2018-08-22T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/22/moving-from-ssae-16-to-ssae-18/</loc><lastmod>2018-08-22T14:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/21/cedars-sinai-ciso-chris-joerg-on-the-inevitability-of-cyberattacks-what-to-do-in-the-aftermath/</loc><lastmod>2018-08-21T16:36:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/21/cyber-security-is-a-never-ending-journey-newcastle-herald/</loc><lastmod>2018-08-21T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/20/cyber-security-hub-advisory-board/</loc><lastmod>2018-08-20T21:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/20/very-excited-to-have-been-added-to-the-cybersecurity-hub-editorial-advisory-board/</loc><lastmod>2018-08-20T20:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/20/a-cisos-guide-to-avoiding-certain-ciso-jobs-cso-online-2/</loc><lastmod>2018-08-20T14:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/19/ai-programs-look-set-to-take-hacking-to-a-new-level-information-security-buzz/</loc><lastmod>2018-08-19T14:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/19/make-sure-your-cybersecurity-team-includes-a-breach-lawyer-expert-column-inside-business-columns-pilotonline-com/</loc><lastmod>2018-08-19T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/18/dennis-leber-the-language-of-cybersecurity-my-term-is-featured-starting-aug-21st-interact-with-others-and-ask-questions/</loc><lastmod>2018-08-18T18:02:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/18/know-your-enemy-how-to-build-a-successful-threat-hunting-program/</loc><lastmod>2018-08-18T14:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/18/how-to-make-a-vpn-give-up-its-secrets/</loc><lastmod>2018-08-18T14:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/17/employee-evaluations-and-security-by-dennis-leber-peerlyst/</loc><lastmod>2018-08-17T20:49:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/17/the-one-cloud-security-metric-every-ciso-should-know/</loc><lastmod>2018-08-17T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/16/random-acts-of-cybersecurity/</loc><lastmod>2018-08-16T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/16/hacking-risk-of-fax-machines-printers-exposed-in-cybersecurity-report-fortune/</loc><lastmod>2018-08-16T14:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/15/9to5google-dept-of-homeland-security-discovers-security-flaws-in-millions-of-us-smartphones/</loc><lastmod>2018-08-15T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/14/the-missing-link-in-developing-a-cybersecurity-strategy-2/</loc><lastmod>2018-08-14T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/13/nist-nccoe-release-guide-for-securing-electronic-health-records-on-mobile-devices/</loc><lastmod>2018-08-13T14:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/12/highlight-a-hacker-part-2-by-dennis-leber-peerlyst/</loc><lastmod>2018-08-12T23:37:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/11/dhs-unveils-national-risk-management-center-securityweek-com/</loc><lastmod>2018-08-11T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/11/boing-boing-half-a-billion-iot-devices-inside-of-businesses-can-be-hacked-through-decade-old-dns-rebinding-attacks/</loc><lastmod>2018-08-11T14:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/10/dont-forget-victimology-as-a-cybersecurity-strategy-secureworks/</loc><lastmod>2018-08-10T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/10/daily-horrors-of-cybersecurity-detailed-in-californias-data-breach-reports-venturebeat/</loc><lastmod>2018-08-10T14:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/09/heres-how-to-really-make-cabinet-secretaries-responsible-for-cybersecurity-nextgov/</loc><lastmod>2018-08-09T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/09/the-missing-link-in-developing-a-cybersecurity-strategy/</loc><lastmod>2018-08-09T14:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/08/this-kit-teaches-kids-how-to-code-using-what/</loc><lastmod>2018-08-08T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/07/10-cyberissues-federal-ciso-must-focus-on/</loc><lastmod>2018-08-07T14:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/06/todays-it-security-team-bouncer-hairdresser-and-it-administrator/</loc><lastmod>2018-08-06T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/05/cybergym-sets-up-its-first-u-s-cybersecurity-training-center/</loc><lastmod>2018-08-05T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/04/digital-trends-massive-data-breach-exposes-trade-secrets-from-tesla-toyota-and-others/</loc><lastmod>2018-08-04T14:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/03/key-traits-employers-seek-from-information-security-professionals-security-boulevard/</loc><lastmod>2018-08-03T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/03/the-language-of-cybersecurity/</loc><lastmod>2018-08-03T13:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/03/sign-up-today-for-my-presentation-on-application-security/</loc><lastmod>2018-08-03T12:42:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/02/white-house-appoints-federal-chief-information-security-officer-nextgov/</loc><lastmod>2018-08-02T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/01/20-ways-to-make-application-security-move-at-the-speed-of-devops-security-boulevard/</loc><lastmod>2018-08-01T15:50:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/01/hack-like-a-ciso-cso-online/</loc><lastmod>2018-08-01T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/08/12/hhs-to-propose-changes-to-hipaa-privacy-rule-42-cfr-part-2/</loc><lastmod>2018-07-31T21:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/31/ultra-enhanced-deluxe-ai-with-a-drop-of-retsyn-ciso-security-vendor-relationship-podcast-security-boulevard/</loc><lastmod>2018-07-31T21:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/31/the-two-biggest-disruptions-to-cybersecurity-since-the-invention-of-the-firewall/</loc><lastmod>2018-07-31T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/30/highlight-a-pentester-hacker-weekly/</loc><lastmod>2018-07-31T00:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/31/questions-answers-series-led-by-professionals-for-professionals-ask-a-ciso-a-question-by-dennis-leber-security-questions-mostinterestingmaninis-peerlyst/</loc><lastmod>2018-07-30T16:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/30/leading-cyber-security-execs-describe-ciso-toolkits-cyber-security-hub/</loc><lastmod>2018-07-30T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/30/does-my-board-of-directors-need-a-cybersecurity-board-member-security-boulevard/</loc><lastmod>2018-07-30T14:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/29/weakest-link-by-dennis-leber-human-error-phishing-secure-coding-peerlyst/</loc><lastmod>2018-07-29T23:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/29/cybersecurity-and-the-new-ciso-the-leadership-enigma/</loc><lastmod>2018-07-29T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/29/cybersecurity-ai-strategies-coming-from-dod-fcw/</loc><lastmod>2018-07-29T14:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/28/techrepublic-50-of-devops-pros-handle-security-but-they-lack-proper-knowledge-and-skills/</loc><lastmod>2018-07-28T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/28/one-third-of-businesses-lack-a-cybersecurity-expert/</loc><lastmod>2018-07-28T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/27/free-and-commercial-tools-to-implement-the-sans-top-20-security-controls-part-1-alienvault/</loc><lastmod>2018-07-27T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/27/why-cybersecurity-incidents-are-up-32-from-last-year-techrepublic/</loc><lastmod>2018-07-27T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/26/worst-states-for-cybersecurity-smart-change-personal-finance-journaltimes-com/</loc><lastmod>2018-07-26T14:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/25/crypto-mining-malware-has-increased-50-since-last-year-information-security-buzz/</loc><lastmod>2018-07-25T14:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/24/iso-updates-information-security-standard-occupational-health-safety/</loc><lastmod>2018-07-24T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/24/isac-national-webinar-the-most-interesting-man-in-is-presents-foundations-of-an-application-security-program-upcoming-august-isac-national-webinar/</loc><lastmod>2018-07-24T12:05:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/23/cnbc-heres-what-cybersecurity-professionals-at-companies-actually-do-and-why-theyre-so-vital/</loc><lastmod>2018-07-23T16:43:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/23/new-nist-guidebook-says-cybersecurity-is-everyones-job-heres-why/</loc><lastmod>2018-07-23T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/22/cyber-information-security-is-hard-by-dennis-leber-peerlyst/</loc><lastmod>2018-07-22T15:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/22/awesome-hacking-resources-pure-skill-sharpening-content-by-vitalysim-by-dawid-balut-penetration-testing-penetration-testing-peerlyst/</loc><lastmod>2018-07-22T14:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/21/save-the-date-11th-annual-cybersecurity-symposium-october-11-12-2018-northern-kentucky-university-in-the-james-c-and-rachel-m-votruba-student-union/</loc><lastmod>2018-07-21T19:34:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/21/the-missing-link-to-finding-insider-threats-human-resources/</loc><lastmod>2018-07-21T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/20/threat-intelligence-absolutely-critical-to-government-cyber-programs-nyc-ciso-says/</loc><lastmod>2018-07-20T14:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/20/att-vp-of-cybersecurity-discusses-threat-intelligence/</loc><lastmod>2018-07-20T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/19/darknet-tor-deep-diving-guide-by-netsecml-how-to-network-virtual-machine-peerlyst/</loc><lastmod>2018-07-19T14:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/19/cybersecurity-its-about-time/</loc><lastmod>2018-07-19T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/18/qa-series-on-peerlyst-devsecops-appsec-security-management-purple-teaming-by-dawid-balut-by-dawid-balut-startup-pentesting-sdlc-peerlyst/</loc><lastmod>2018-07-19T00:28:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/22/devops-in-need-of-a-security-champion-cyber-security-hub-article-i-was-part-of/</loc><lastmod>2018-07-18T16:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/18/6-top-tips-to-make-cybersecurity-training-more-fun/</loc><lastmod>2018-07-18T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/18/metrics-enough-of-discussing-lets-make-a-wiki-and-a-resource-by-dennis-leber-peerlyst/</loc><lastmod>2018-07-18T14:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/21/join-my-discussion-on-peerlyst-com-about-the-considerations-while-outsourcing-security-services-by-dennis-leber-cyber-security-insurance-application-development-application-security-peerlyst/</loc><lastmod>2018-07-17T16:37:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/17/could-understanding-the-technical-debt-hold-the-key-to-improving-cyber-security/</loc><lastmod>2018-07-17T14:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/17/fair-quantitative-risk-modeling-for-malicious-insiders-by-calvin-liu-threat-unauthorized-access-confidential-information-peerlyst/</loc><lastmod>2018-07-17T14:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/17/myheritage-statement-about-a-cybersecurity-incident-myheritage-blog-myheritage-blog/</loc><lastmod>2018-07-17T11:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/16/file-based-malware-considering-a-different-and-specific-security-approach-information-security-buzz/</loc><lastmod>2018-07-16T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/16/why-and-how-law-firms-should-up-their-security-game-cso-online/</loc><lastmod>2018-07-16T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/15/the-state-of-state-cios/</loc><lastmod>2018-07-15T14:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/15/why-storage-hardware-matters-for-data-security-network-world/</loc><lastmod>2018-07-15T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/14/6-ways-to-take-healthcare-cybersecurity-to-the-next-level-healthtech/</loc><lastmod>2018-07-14T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/14/the-worst-cybersecurity-breaches-of-2018-so-far-wired/</loc><lastmod>2018-07-14T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/14/medevolve-notifies-patients-of-phi-exposure-through-unsecured-ftp-server/</loc><lastmod>2018-07-14T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/13/timehop-security-breach-affects-over-20-million-users-information-security-buzz/</loc><lastmod>2018-07-13T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/13/strengthening-the-cybersecurity-of-manufacturing-companies-a-semantic-approach-compliant-with-the-nist-framework/</loc><lastmod>2018-07-13T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/13/think-cyber-security-uses-human-behaviour-to-counter-cyber-threats/</loc><lastmod>2018-07-13T14:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/12/whats-the-best-strategy-to-manage-application-security-risk/</loc><lastmod>2018-07-12T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/12/att-to-acquire-cybersecurity-startup-marketwatch/</loc><lastmod>2018-07-12T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/12/from-fox-news-identities-of-thousands-of-tennessee-citizens-with-hiv-made-public-due-to-error-report/</loc><lastmod>2018-07-12T14:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/11/effective-it-security-awareness-training-for-employees/</loc><lastmod>2018-07-11T14:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/11/resource-a-compendium-of-sites-that-you-can-practice-on-you-can-legally-hack-these-sites-sites-that-you-can-legally-hack-no-installation-required/</loc><lastmod>2018-07-11T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/10/cyber-security-firm-sued-for-failing-to-find-malware-this-makes-it-a-whole-new-ballgame/</loc><lastmod>2018-07-10T16:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/10/nga-helps-indiana-north-carolina-west-virginia-and-wisconsin-enhance-state-cybersecurity/</loc><lastmod>2018-07-10T14:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/09/who-is-the-ciso-and-why-every-c-suite-needs-one/</loc><lastmod>2018-07-09T14:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/08/criminal-prosecution-for-violating-hipaa-an-emerging-threat/</loc><lastmod>2018-07-08T14:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/07/security-still-not-a-c-suite-competency-says-global-data-itp-net/</loc><lastmod>2018-07-07T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/07/it-security-get-the-optimal-level-with-a-management-policy-that-points-to-the-user/</loc><lastmod>2018-07-07T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/06/4-reasons-why-cisos-must-think-like-developers-to-build-cybersecurity-platforms-and-stop-investing-in-silver-bullets-cso-online/</loc><lastmod>2018-07-06T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/05/a-look-at-israels-new-draft-cybersecurity-law-council-on-foreign-relations/</loc><lastmod>2018-07-05T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/03/pci-dss-3-2-1-what-your-business-needs-to-know-herjavec-group/</loc><lastmod>2018-07-03T14:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/03/expert-msus-handling-of-medical-records-could-have-violated-hipaa-laws-wlns/</loc><lastmod>2018-07-03T14:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/04/happy-4th-of-july/</loc><lastmod>2018-07-03T13:46:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/05/four-measures-to-keep-agency-cloud-data-safe-industry-perspective/</loc><lastmod>2018-07-03T13:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/07/01/adidas-data-breach-us-customers-had-contact-information-usernames-exposed-fox-business/</loc><lastmod>2018-07-01T14:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/30/it-worker-uncovers-hospital-pagers-with-poor-phi-data-security/</loc><lastmod>2018-06-30T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/30/why-your-network-needs-a-threat-hunter-defense-systems/</loc><lastmod>2018-06-30T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/30/how-to-perform-a-risk-assessment-rethinking-the-process-cso-online/</loc><lastmod>2018-06-30T14:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/29/the-chief-information-security-officer-ciso-handbook-cio-gov/</loc><lastmod>2018-06-29T14:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/29/only-6-non-federal-groups-share-cyber-threat-info-with-homeland-security-nextgov/</loc><lastmod>2018-06-29T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/28/ticketmaster-investigates-possible-data-security-breach/</loc><lastmod>2018-06-28T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/28/identify-gaps-in-cybersecurity-processes-to-reduce-organizational-risk/</loc><lastmod>2018-06-28T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/27/remote-access-for-third-parties-information-security-buzz/</loc><lastmod>2018-06-27T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/27/vendor-risk-management-and-the-fed/</loc><lastmod>2018-06-27T14:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/26/the-business-problem-of-technology-and-cyber-risk-cio/</loc><lastmod>2018-06-26T14:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/26/deception-technology-applied-to-pharma-cybersecurity/</loc><lastmod>2018-06-26T14:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/26/top-10-cybersecurity-best-practices-for-healthcare-cisos/</loc><lastmod>2018-06-26T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/25/5-data-breaches-that-show-how-cybersecurity-must-evolve-healthcare-analytics-news/</loc><lastmod>2018-06-25T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/25/securing-network-infrastructure-devices-us-cert/</loc><lastmod>2018-06-25T14:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/24/even-aflac-cant-duck-data-breaches-health-plan-incident-among-29-reported-in-may/</loc><lastmod>2018-06-24T14:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/23/whs-suspends-dozen-employees-for-alleged-hipaa-violations/</loc><lastmod>2018-06-23T14:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/22/are-you-in-ky-do-you-want-to-learn-more-about-cyber-threats-do-you-feel-sharing-information-is-key-to-maturing-security-then-come-join-the-ky-cyber-threat-working-group-sponsored-by-the-ky-dhs-ky/</loc><lastmod>2018-06-22T18:31:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/22/shred-it-study-exposes-employee-negligence-as-top-information-security-risk-to-u-s-businesses/</loc><lastmod>2018-06-22T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/20/the-business-continuity-and-disaster-recovery-wiki-by-peerlyst-business-continuity-planning-disaster-recovery-planning-bcp-peerlyst/</loc><lastmod>2018-06-20T14:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/19/this-sneaky-windows-malware-delivers-adware-and-takes-screenshots-of-your-desktop-zdnet/</loc><lastmod>2018-06-19T14:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/19/turns-out-cyber-crime-does-pay-and-the-numbers-are-astounding-symantec-blogs/</loc><lastmod>2018-06-19T14:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/18/has-agile-programming-lost-its-way-the-new-stack/</loc><lastmod>2018-06-18T14:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/18/what-to-expect-in-your-cisos-first-90-day-board-report-nacd-blog/</loc><lastmod>2018-06-18T14:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/17/med-associates-provides-notice-of-data-security-incident/</loc><lastmod>2018-06-17T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/16/techcrunch-tainted-crypto-mining-containers-pulled-from-docker-hub/</loc><lastmod>2018-06-16T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/16/cybersecurity-ceo-what-keeps-chief-information-security-officers-up-at-night-herjavec-group/</loc><lastmod>2018-06-16T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/17/agile-development-and-cyber-information-security-talk-today-by-dennis-leber-security-program-conference-business-peerlyst-join-the-conversation/</loc><lastmod>2018-06-15T21:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/15/top-10-cybersecurity-tips-to-secure-the-2018-u-s-election/</loc><lastmod>2018-06-15T14:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/15/dignity-health-under-investigation-after-data-breach-affects-56k-patients/</loc><lastmod>2018-06-15T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/14/mcafee-highlights-emerging-cybersecurity-risks-associated-with-blockchain-business-wire/</loc><lastmod>2018-06-14T14:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/14/10-security-projects-cisos-should-consider-gartner-analyst/</loc><lastmod>2018-06-14T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/13/defense-agenda-a-week-in-the-life-of-kentucky-chfs-ciso-dennis-leber-2/</loc><lastmod>2018-06-13T23:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/13/white-house-confirms-its-chief-of-staff-was-hacked/</loc><lastmod>2018-06-13T14:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/12/university-attacked-by-its-own-vending-machines-smart-light-bulbs-5000-iot-devices-cso-online/</loc><lastmod>2018-06-12T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/12/unprotected-server-exposes-weight-watchers-internal-it-infrastructure/</loc><lastmod>2018-06-12T00:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/16/hackers-stole-over-20-million-in-ethereum-from-insecurely-configured-clients/</loc><lastmod>2018-06-12T00:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/15/hey-corporate-america-get-ready-for-cybersecurity-regulation-in-the-us/</loc><lastmod>2018-06-12T00:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/14/psa-cybersecurity-company-demos-how-siri-feature-can-be-used-for-phishing/</loc><lastmod>2018-06-12T00:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/13/why-isnt-secure-devops-being-practiced/</loc><lastmod>2018-06-12T00:16:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/12/blockchain-hype-reality-and-the-public-good/</loc><lastmod>2018-06-12T00:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/10/google-groups-exposing-sensitive-information/</loc><lastmod>2018-06-06T15:54:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/09/investigation-reveals-security-concerns-after-ancenstry-com-amasses-sensitive-data/</loc><lastmod>2018-06-06T15:53:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/08/cybersecurity-pioneer-corporate-leaders-continue-to-ignore-threats/</loc><lastmod>2018-06-06T15:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/09/top-3-ways-cisos-can-drive-productivity/</loc><lastmod>2018-06-06T15:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/09/researcher-finds-login-info-for-92-million-myheritage-users-on-private-server/</loc><lastmod>2018-06-06T15:50:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/08/healthcare-data-as-property-can-change-everything/</loc><lastmod>2018-06-06T15:50:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/08/new-company-hu-manity-co-uses-blockchain-to-declare-a-31st-human-right-empowering-all-humans-to-claim-legal-ownership-of-inherent-human-data/</loc><lastmod>2018-06-06T15:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/07/apple-to-facilitate-health-data-transfer-between-apps/</loc><lastmod>2018-06-06T15:48:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/07/panera-bread-dos-and-donts-of-data-breach-crisis-management/</loc><lastmod>2018-06-05T18:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/07/battlefield-principles-for-cybersecurity-leaders/</loc><lastmod>2018-06-05T18:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/06/cyber-security-expert-responds-to-moran-eye-center-breach/</loc><lastmod>2018-06-03T21:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/06/how-to-get-mttr-down-to-zero-automated-tools-to-reduce-mean-time-to-remediation-can-make-cloud-infrastructure-self-healing-said-josh-stella-ceo-and-co-founder-of-fugue/</loc><lastmod>2018-06-02T17:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/06/supermarket-ciso-millennials-sales-marketing-pros-are-riskiest-employees/</loc><lastmod>2018-06-02T17:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/05/introducing-the-ciso-security-vendor-relationship-podcast-with-mike-johnson-and-david-spark/</loc><lastmod>2018-06-02T17:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/01/why-is-penetration-testing-essential-for-modern-business-latest-hacking-news/</loc><lastmod>2018-06-01T21:39:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/05/10-free-devops-friendly-security-tools-developers-will-love/</loc><lastmod>2018-06-01T18:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/05/7-it-security-tools-you-need-to-know-and-implement/</loc><lastmod>2018-06-01T12:56:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/01/information-security-is-not-its-job-expecting-your-it-professional-to-handle-cybersecurity-is-like-seeing-a-cardiologist-for-severe-knee-pain/</loc><lastmod>2018-06-01T12:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/04/why-are-we-so-bad-at-cybersecurity-its-mostly-neglect/</loc><lastmod>2018-06-01T12:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/04/why-less-is-more-when-it-comes-to-cybersecurity/</loc><lastmod>2018-06-01T12:54:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/04/new-walmart-ciso-discusses-protecting-the-worlds-largest-retailer/</loc><lastmod>2018-06-01T12:53:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/03/how-to-reap-millions-in-cost-savings-from-a-state-sponsored-hackathon/</loc><lastmod>2018-05-31T15:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/03/gdpr-is-here-everything-consumers-need-to-know/</loc><lastmod>2018-05-31T15:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/03/the-office-of-management-and-budget-reports-that-the-federal-government-is-a-shambles-cybersecurity-wise-anyway/</loc><lastmod>2018-05-31T15:10:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/02/the-inadvertent-insider-threat-a-ciso-confronts-a-breach-from-within/</loc><lastmod>2018-05-31T15:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/02/a-curated-list-of-relevant-security-rss-feeds/</loc><lastmod>2018-05-31T12:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/02/ai-and-ml-in-cyber-security-a-few-resources/</loc><lastmod>2018-05-30T22:06:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/01/the-rise-of-analyst-centric-security-operations-technologies/</loc><lastmod>2018-05-30T21:26:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/01/the-growing-threat-of-phishing-attacks-outside-of-email/</loc><lastmod>2018-05-30T21:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/06/01/feds-need-to-do-better-job-with-ehr-data-security-privacy/</loc><lastmod>2018-05-30T21:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/31/enterprise-data-encryption-preparing-for-a-post-quantum-future/</loc><lastmod>2018-05-30T21:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/31/how-it-executive-roles-are-shifting-in-this-cloud-first-era/</loc><lastmod>2018-05-30T21:10:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/31/four-cybersecurity-tips-for-travelers/</loc><lastmod>2018-05-30T16:56:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/30/six-vulnerabilities-found-in-dell-emcs-disaster-recovery-system-one-critical-threatpost-the-first-stop-for-security-news/</loc><lastmod>2018-05-30T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/28/a-100-year-old-15-minute-routine-for-stress-free-productivity-ladders/</loc><lastmod>2018-05-28T16:51:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/27/a-new-metric-for-cybersecurity-asset-management-mean-time-to-inventory/</loc><lastmod>2018-05-27T12:17:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/27/coca-cola-suffers-breach-at-the-hands-of-former-employee/</loc><lastmod>2018-05-27T12:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/25/security-spring-cleaning-tidying-up-messy-firewall-rules-to-reduce-complexity/</loc><lastmod>2018-05-24T15:13:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/25/researchers-hack-bmw-cars-discover-14-vulnerabilities/</loc><lastmod>2018-05-24T15:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/24/cnbc-cisco-warns-500000-routers-have-been-hacked-in-suspected-russian-plan-to-attack-ukraine/</loc><lastmod>2018-05-24T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/28/3-2-million-la-county-211-records-exposed-on-mis-configured-aws-s3-bucket/</loc><lastmod>2018-05-23T14:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/27/analysis-why-you-need-the-cybersecurity-framework/</loc><lastmod>2018-05-23T12:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/26/fakenews-as-an-information-security-problem/</loc><lastmod>2018-05-22T12:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/23/cisos-not-investing-in-insider-threat-defences/</loc><lastmod>2018-05-22T12:46:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/24/the-four-types-of-chief-information-security-officers/</loc><lastmod>2018-05-22T12:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/21/chrome-built-in-malware-scanner/</loc><lastmod>2018-05-21T23:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/25/eight-reasons-the-ciso-should-report-to-the-ceo-and-not-the-cio/</loc><lastmod>2018-05-21T22:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/23/banks-take-military-approach-to-cybersecurity/</loc><lastmod>2018-05-21T16:14:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/22/dict-requires-government-agencies-with-citizen-facing-applications-to-attend-cybersecurity-training/</loc><lastmod>2018-05-21T16:13:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/22/loopholes-in-cloud-security-exposed-online-50-of-corporate-databases/</loc><lastmod>2018-05-21T16:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/21/defense-agenda-a-week-in-the-life-of-kentucky-chfs-ciso-dennis-leber/</loc><lastmod>2018-05-21T15:48:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/20/the-cybersecurity-202-congress-is-offering-millions-in-election-security-states-may-not-use-it-by-november-the-washington-post/</loc><lastmod>2018-05-20T12:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/20/this-is-why-they-tell-you-to-change-your-password-data-breach-hits-some-ub-accounts-the-buffalo-news/</loc><lastmod>2018-05-20T12:15:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/20/security-flaw-in-locationsmart-demo-let-anyone-track-u-s-cell-phones-fortune/</loc><lastmod>2018-05-20T12:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/19/a-cisos-advice-for-securing-connected-medical-devices-healthcare-it-news/</loc><lastmod>2018-05-19T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/18/5-free-security-tools-you-likely-havent-heard-of-but-should-install/</loc><lastmod>2018-05-18T14:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/21/achieving-continuous-compliance-in-the-cloud/</loc><lastmod>2018-05-18T13:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/21/confessions-of-a-risk-assessor-6-things-to-know-before-a-cyber-security-assessment/</loc><lastmod>2018-05-18T13:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/17/cnbc-fired-uber-cybersecurity-chief-joe-sullivan-was-just-hired-to-run-security-at-start-up-cloudflare/</loc><lastmod>2018-05-17T23:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/20/ten-steps-to-minimize-cyber-security-breach-litigation/</loc><lastmod>2018-05-17T14:54:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/19/automotive-functional-safety-and-cyber-security-validation-framework/</loc><lastmod>2018-05-17T14:53:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/18/ocr-to-share-hipaa-data-breach-settlements-with-victims/</loc><lastmod>2018-05-17T14:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/18/national-guard-conducts-annual-nationwide-cybersecurity-exercise/</loc><lastmod>2018-05-15T15:17:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/17/cybersecurity-its-more-than-just-technology/</loc><lastmod>2018-05-15T15:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/15/hhs-cybersecurity-official-relegated-to-telework-position-after-7-month-suspension/</loc><lastmod>2018-05-15T15:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/16/your-multi-cloud-security-checklist-8-things-cisos-need-to-remember/</loc><lastmod>2018-05-15T15:14:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/13/the-rise-of-the-nist-cybersecurity-framework-cso-online/</loc><lastmod>2018-05-13T14:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/11/cnbc-symantec-suffers-worst-day-in-17-years-after-news-of-internal-audit/</loc><lastmod>2018-05-11T21:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/13/the-cybersecurity-202-how-colorado-became-the-safest-state-to-cast-a-vote/</loc><lastmod>2018-05-11T15:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/13/cybersecurity-skills-will-pay-off-in-army-says-a-top-cyber-command-officer-army-toys-with-entry-level-direct-commission-to-colonel/</loc><lastmod>2018-05-11T15:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/12/all-about-peerlyst-a-thriving-online-platform-for-cybersecurity-professionals/</loc><lastmod>2018-05-11T15:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/12/https-www-scmagazine-com-adapt-or-die-a-cisos-new-role-in-a-social-media-first-world-article-761866/</loc><lastmod>2018-05-11T15:01:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/11/are-you-passionate-about-agile-do-you-want-to-hear-the-most-interesting-man-in-is-speak-even-get-to-say-hi-then-you-should-sign-up-for-the-derby-city-agile-conference-http-derbycityagile-com-you/</loc><lastmod>2018-05-11T14:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/10/engadget-nypd-says-skim-reaper-device-could-curb-atm-fraud/</loc><lastmod>2018-05-10T22:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/11/ciso-data-integrity-and-confidentiality-are-pillars-of-cybersecurity/</loc><lastmod>2018-05-10T17:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/11/risk-acceptance-101-what-happens-when-security-needs-go-unfunded/</loc><lastmod>2018-05-10T17:11:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/10/dhs-wants-ideas-for-21st-century-cyber-security-workforce/</loc><lastmod>2018-05-09T16:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/09/dod-ig-finds-massive-security-flaws-in-army-navy-ehr-and-handling-of-patient-data/</loc><lastmod>2018-05-09T16:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/08/how-to-make-cisos-comfortable-with-cloud-security/</loc><lastmod>2018-05-08T12:19:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/08/dhs-program-offers-cyber-report-cards-to-106-agencies-threat-intel-to-white-house/</loc><lastmod>2018-05-07T13:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/07/leveraging-security-analytics-to-investigate-and-hunt-modern-threats/</loc><lastmod>2018-05-07T13:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/08/evaluating-technology-and-security-leaders/</loc><lastmod>2018-05-07T13:33:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/07/gap-analysis-improves-risk-analysis-but-isnt-enough-for-hipaa-compliance-ocr-says/</loc><lastmod>2018-05-06T13:05:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/06/connecticut-introduces-cybersecurity-action-plan/</loc><lastmod>2018-05-05T21:44:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/06/hit-think-how-providers-can-implement-the-nist-cybersecurity-framework/</loc><lastmod>2018-05-05T21:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/04/three-decisions-cyber-commands-new-leader-will-have-to-make/</loc><lastmod>2018-05-04T17:15:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/04/vulnerabilities-affecting-over-one-million-dasan-gpon-routers-are-now-under-attack/</loc><lastmod>2018-05-04T17:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/05/doj-announces-criminal-conviction-of-physician-for-hipaa-violation/</loc><lastmod>2018-05-03T22:24:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/04/the-role-of-deception-in-cyber-warfare/</loc><lastmod>2018-05-03T22:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/04/adopt-the-nist-cybersecurity-framework-csf-and-harness-the-wisdom-of-crowds-the-nist-csf-crowd-sourcing-methodology-is-exactly-what-makes-it-so-robust-it-draws-from-every-angle-the-priorities-and-u/</loc><lastmod>2018-05-03T22:21:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/04/dispelling-the-myth-how-to-optimize-your-company-for-both-cyber-security-and-productivity/</loc><lastmod>2018-05-03T22:20:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/03/should-cisos-be-hackers-dark-reading/</loc><lastmod>2018-05-03T10:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/02/bmw-ford-gm-worlds-largest-automakers-form-blockchain-coalition/</loc><lastmod>2018-05-02T23:13:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/02/monitor-your-adfs-sign-in-activity-using-azure-ad-connect-healths-risky-ip-reports-enterprise-mobility-security/</loc><lastmod>2018-05-02T23:12:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/03/data-breaches-state-notification-requirements-and-third-parties/</loc><lastmod>2018-05-02T21:59:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/03/its-time-to-get-multicloud-security-right/</loc><lastmod>2018-05-02T00:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/01/its-ok/</loc><lastmod>2018-05-02T00:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/02/cloud-compliance-how-to-stay-secure-on-an-intangible-infrastructure/</loc><lastmod>2018-05-01T13:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/02/employee-fired-for-hipaa-violation-gets-personal-data-from-agency/</loc><lastmod>2018-05-01T12:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/02/how-to-build-a-corporate-culture-of-cyber-awareness/</loc><lastmod>2018-05-01T12:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/01/dod-releases-new-guidance-giving-teeth-to-cybersecurity-rules-to-protect-data-within-the-supply-chain-cso-online/</loc><lastmod>2018-05-01T10:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/01/amazon-web-services-starts-blocking-domain-fronting-following-googles-lead/</loc><lastmod>2018-05-01T10:29:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/01/the-next-generation-of-phishing-scams-reveal-themselves/</loc><lastmod>2018-04-30T16:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/05/01/an-ai-can-now-write-its-own-code/</loc><lastmod>2018-04-30T16:10:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/29/90-of-the-sap-customers-exposed-to-hack-due-to-13-year-old-configuration-flaw/</loc><lastmod>2018-04-29T21:33:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/27/join-the-my-conversation-about-including-security-in-the-sprints-of-agile-development-on-peerlyst/</loc><lastmod>2018-04-27T18:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/27/new-phishing-attack-targets-550m-email-users-worldwide/</loc><lastmod>2018-04-27T14:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/26/techcrunch-deepcode-cleans-your-code-with-the-power-of-ai/</loc><lastmod>2018-04-26T22:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/26/windows-10-security-features-can-be-easily-bypassed-itproportal/</loc><lastmod>2018-04-26T11:16:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/26/microsoft-release-admin-tools-to-simulate-cyberattacks/</loc><lastmod>2018-04-25T21:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/24/what-executives-should-know-about-cyber-security/</loc><lastmod>2018-04-24T22:57:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/24/suntrust-bank-employee-steals-critical-data-on-1-5-million-customers/</loc><lastmod>2018-04-24T22:56:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/26/medicares-new-cards-increase-patient-data-security/</loc><lastmod>2018-04-24T22:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/26/mulvaney-response-to-cfpb-data-security-gaps-baffles-cyber-experts/</loc><lastmod>2018-04-24T22:54:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/25/healthcare-blockchain-improves-ehrs-business-process-management/</loc><lastmod>2018-04-24T22:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/25/cios-cisos-need-to-focus-on-internal-proprietary-machine-learning-capabilities-to-assist-security-teams-htc-globals-vishal-sethi/</loc><lastmod>2018-04-24T22:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/25/michigans-ciso-as-a-service-initiative-is-so-popular-the-state-might-spin-it-off/</loc><lastmod>2018-04-24T22:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/23/fast-company-hacker-group-is-targeting-healthcare-for-corporate-espionage-symantec-warns/</loc><lastmod>2018-04-23T22:35:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/21/hipaa-compliance-gap-between-compliance-officers-regulators/</loc><lastmod>2018-04-21T16:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/20/from-thehackernews-com/</loc><lastmod>2018-04-21T01:39:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/20/join-my-discussion-on-peerlyst-about-threat-hunting-and-monitoring-political-activities/</loc><lastmod>2018-04-21T01:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/19/nsa-reveals-how-it-beats-0-days-naked-security/</loc><lastmod>2018-04-20T00:02:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/20/creating-a-modern-information-security-foundation/</loc><lastmod>2018-04-19T21:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/20/rsa-2018-looking-to-the-future-of-cybersecurity/</loc><lastmod>2018-04-18T16:23:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/17/our-team-won-best-of-kentucky-award-for-our-security-innovation/</loc><lastmod>2018-04-18T00:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/17/34-companies-stand-up-for-cybersecurity-with-a-tech-accord-microsoft-on-the-issues/</loc><lastmod>2018-04-17T23:40:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/19/army-scientists-uncover-how-to-stop-cyber-intrusions/</loc><lastmod>2018-04-17T22:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/19/why-more-credit-unions-are-opting-for-virtual-cisos/</loc><lastmod>2018-04-17T21:47:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/19/audit-of-the-civil-divisions-information-security-program-pursuant-to-the-federal-information-security-modernization-act-of-2014-fiscal-year-2017/</loc><lastmod>2018-04-17T21:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/18/bridging-the-gap-between-network-and-security-operations/</loc><lastmod>2018-04-17T21:45:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/18/u-s-offers-25-million-cybersecurity-grant-after-pipeline-attacks/</loc><lastmod>2018-04-17T21:44:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/18/the-united-states-needs-a-department-of-cybersecurity/</loc><lastmod>2018-04-17T21:42:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/14/hackers-found-using-a-new-code-injection-technique-to-evade-detection/</loc><lastmod>2018-04-14T22:27:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/17/why-organizations-need-business-centric-data-protection/</loc><lastmod>2018-04-14T19:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/17/audit-veterans-affairs-it-security-officials-have-a-lot-of-work-to-do/</loc><lastmod>2018-04-14T19:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/17/cyber-security-dont-leave-it-to-your-tech-team-or-youll-get-breached-warns-data-protection-chief/</loc><lastmod>2018-04-14T18:56:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/16/cms-shifting-data-control-to-consumers-are-you-ready-to-share/</loc><lastmod>2018-04-14T18:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/13/from-reuters-com-2/</loc><lastmod>2018-04-13T14:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/13/another-company-blows-off-breach-notification-for-months-lies-about-affected-customers-when-its-exposed-techdirt/</loc><lastmod>2018-04-13T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/16/ciso-describes-10-point-plan-for-data-privacy-improvements/</loc><lastmod>2018-04-13T13:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/16/oig-dhs-information-security-program-for-intelligence-systems-is-not-effective/</loc><lastmod>2018-04-13T13:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/15/isc2-announces-2018-u-s-government-information-security-leadership-award-finalists/</loc><lastmod>2018-04-13T13:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/15/atlanta-colorado-dot-ransomware-mitigation-costing-millions/</loc><lastmod>2018-04-13T13:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/13/what-makes-a-good-chief-information-security-officer-ciso-insights-for-success/</loc><lastmod>2018-04-13T08:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/12/flaw-in-microsoft-outlook-lets-hackers-easily-steal-your-windows-password/</loc><lastmod>2018-04-12T23:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/12/join-my-latest-discussion-on-peerlyst-around-the-false-sense-of-security-placed-on-firewalls/</loc><lastmod>2018-04-12T16:56:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/15/the-cloud-outpaces-in-house-state-and-local-cybersecurity/</loc><lastmod>2018-04-12T16:43:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/14/how-to-improve-cybersecurity-with-machine-learning/</loc><lastmod>2018-04-12T16:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/14/response-policy-zones-a-little-known-cybersecurity-measure-you-should-be-using/</loc><lastmod>2018-04-11T18:23:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/14/youtube-hacked/</loc><lastmod>2018-04-11T16:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/13/4-steps-to-creating-a-winning-cybersecurity-strategy-in-2018/</loc><lastmod>2018-04-10T14:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/12/arizona-hires-cybersecurity-firm-to-manage-risk-across-state-government/</loc><lastmod>2018-04-10T14:27:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/12/google-cloud-security-enhancements-help-msps-be-more-savvy/</loc><lastmod>2018-04-10T14:25:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/12/alternative-communications-planning-and-cybersecurity-incident-response/</loc><lastmod>2018-04-10T14:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/11/security-baselines-should-underpin-efforts-to-manage-cybersecurity-risk-across-sectors/</loc><lastmod>2018-04-10T14:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/09/hospital-ceo-forced-to-pay-hackers-in-bitcoin-now-teaches-others/</loc><lastmod>2018-04-09T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/09/how-to-build-a-linux-automated-malware-analysis-lab/</loc><lastmod>2018-04-09T14:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/09/it-and-information-security-cheat-sheets/</loc><lastmod>2018-04-09T14:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/08/why-connecting-with-the-security-community-is-vital-the-linked-post-in-this-blog-was-a-simple-question-that-provided-great-answers-and-should-be-stored-as-a-reference-and-resource/</loc><lastmod>2018-04-08T14:38:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/08/why-notification-overload-is-killing-enterprise-cybersecurity-teams/</loc><lastmod>2018-04-08T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/07/nj-ag-smacks-practice-with-hefty-fine-for-vendor-breach/</loc><lastmod>2018-04-07T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/11/cyber-security-tools-to-keep-you-safe-online-and-off/</loc><lastmod>2018-04-07T12:54:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/11/how-web-browsers-are-used-against-you/</loc><lastmod>2018-04-07T12:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/10/focus-on-cybersecurity-despite-growth-in-popularity-are-web-containers-secure/</loc><lastmod>2018-04-07T12:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/07/best-buy-hacked/</loc><lastmod>2018-04-07T12:08:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/06/join-the-conversation-on-peerlyst-where-i-ask-is-information-security-still-a-part-of-it/</loc><lastmod>2018-04-06T23:31:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/10/sears-holdings-also-discloses-data-security-incident/</loc><lastmod>2018-04-06T14:35:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/10/electronic-health-information-cms-oversight-of-medicare-beneficiary-data-security-needs-improvement/</loc><lastmod>2018-04-06T14:33:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/09/why-hiring-more-cybersecurity-pros-may-not-lead-to-better-security/</loc><lastmod>2018-04-06T14:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/08/facebook-admits-it-discussed-sharing-user-data-for-medical-research-project/</loc><lastmod>2018-04-06T14:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/05/secret-service-warns-of-chip-card-scheme-krebs-on-security/</loc><lastmod>2018-04-06T00:08:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/05/from-fox-news-cybersecurity-fiasco-interior-department-computers-trying-to-talk-to-russia-inspectors-say/</loc><lastmod>2018-04-05T19:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/08/should-hhs-offer-incentives-for-cyber-security-frameworks/</loc><lastmod>2018-04-05T17:15:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/07/contribute-to-the-intrusion-detection-guide-crowdsourcing-ebook-on-peerlyst/</loc><lastmod>2018-04-05T16:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/04/nirsoft-added-14-new-tools-today/</loc><lastmod>2018-04-04T20:26:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/07/resource-the-threat-hunting-wiki/</loc><lastmod>2018-04-04T20:24:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/07/cybersecurity-how-to-devise-a-winning-strategy/</loc><lastmod>2018-04-04T12:45:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/06/cloud-security-command-center-alpha/</loc><lastmod>2018-04-04T12:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/06/the-cloud-is-rising-to-the-cybersecurity-challenge/</loc><lastmod>2018-04-04T12:42:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/06/rsa-conference-cisos-top-4-cybersecurity-priorities/</loc><lastmod>2018-04-04T12:41:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/05/us-gas-pipelines-attacked/</loc><lastmod>2018-04-04T12:40:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/05/healthcare-ciso-hygiene-and-patching-take-you-a-long-way/</loc><lastmod>2018-04-04T12:40:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/03/branchscope-a-new-cpu-side-channel-attack-discovered-branchscope-another-vulnerability-in-intel-processors/</loc><lastmod>2018-04-03T22:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/05/protecting-users-from-extension-cryptojacking/</loc><lastmod>2018-04-03T20:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/04/phishing-pdfs-with-multiple-links-detection/</loc><lastmod>2018-04-03T20:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/04/states-redesign-election-cybersecurity-with-380-million-boost/</loc><lastmod>2018-04-03T15:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/04/epldt-reiterates-the-need-for-holistic-cyber-security-approach-read-more-http-www-sunstar-com-ph-manila-business-2018-04-03-epldt-reiterates-need-holistic-cyber-security-approach-596419-follow-us/</loc><lastmod>2018-04-03T15:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/03/panerabread-com-has-a-crummy-view-of-how-they-should-protect-customer-information/</loc><lastmod>2018-04-03T13:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/02/https-sid-500-com-2018-03-25-active-directory-domain-services-section-tool-for-active-directory-administrators/</loc><lastmod>2018-04-02T15:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/01/hackers-distributing-dangerous-malware-via-youtube-to-steal-passwords/</loc><lastmod>2018-04-01T14:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/04/01/finding-the-right-cybersecurity-expert-for-your-organization/</loc><lastmod>2018-04-01T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/31/5-steps-to-creating-a-hipaa-compliant-cyber-attack-contingency-plan/</loc><lastmod>2018-03-30T00:07:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/31/ocr-considering-hipaa-privacy-rule-enforcement-changes/</loc><lastmod>2018-03-30T00:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/28/boeing-hit-by-wannacry-virus-fears-it-could-cripple-some-jet-production-the-seattle-times/</loc><lastmod>2018-03-28T23:17:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/31/three-facebook-users-sue-over-collection-of-call-text-history/</loc><lastmod>2018-03-28T21:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/30/what-chief-data-officers-can-learn-from-facebook-about-building-better-big-data-security-practices/</loc><lastmod>2018-03-28T21:07:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/30/report-to-congress-on-cyber-security/</loc><lastmod>2018-03-28T21:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/30/cambridge-analytica-whistleblower-facebook-able-to-listen-to-you-at-home-and-work/</loc><lastmod>2018-03-28T17:02:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/29/office-365-will-enforce-mandatory-use-of-tls-1-2-from-october-31-2018-and-lync-phone-edition-doesnt-support-tls-1-2-so/</loc><lastmod>2018-03-28T16:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/29/facebook-knows-your-cell-and-text-message-activity-join-my-discussion/</loc><lastmod>2018-03-28T16:51:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/28/usenix-security-17-digtool-a-virtualization-based-framework-for-detecting-kernel-vulnerabilities/</loc><lastmod>2018-03-28T14:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/28/leveraging-windows-hello-technology-this-new-biometric-ring-helps-eliminate-the-need-for-passwords/</loc><lastmod>2018-03-27T22:56:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/27/information-security-assessment-gets-major-overhaul/</loc><lastmod>2018-03-26T18:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/27/information-security-the-next-generation/</loc><lastmod>2018-03-26T18:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/26/massive-cyberhack-by-iran-allegedly-stole-research-from-320-universities-governments-and-companies/</loc><lastmod>2018-03-25T14:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/26/how-to-be-effective-in-accepting-a-ciso-role/</loc><lastmod>2018-03-25T14:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/23/atlanta-ransomeware-attack/</loc><lastmod>2018-03-23T12:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/26/a-cisos-seven-fundamentals/</loc><lastmod>2018-03-22T00:45:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/25/dns-poisoning-and-how-to-prevent-it/</loc><lastmod>2018-03-21T20:15:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/25/data-suggests-one-third-of-state-it-systems-are-old-and-broken/</loc><lastmod>2018-03-21T19:37:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/25/software-defined-perimeter-prevents-attackers/</loc><lastmod>2018-03-21T17:59:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/24/cyber-security-and-the-blockchain-evolving-technology-for-our-safety/</loc><lastmod>2018-03-21T16:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/21/expedia-subsidiary-orbitz-identified-fixed-data-security-incident-affecting-880000-payment-cards/</loc><lastmod>2018-03-21T16:01:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/24/how-to-turn-privacy-laws-to-their-advantage/</loc><lastmod>2018-03-21T15:58:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/24/what-all-employers-need-to-know-about-protecting-employee-health-information/</loc><lastmod>2018-03-21T15:56:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/23/companies-recognized-for-using-security-analytics-to-detect-and-prevent-insider-threats-privileged-access-abuse-and-data-exfiltration/</loc><lastmod>2018-03-21T15:54:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/23/rick-perry-boasts-new-cyber-security-office-can-handle-russian-targeting-of-us-grid/</loc><lastmod>2018-03-21T15:52:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/23/florida-starts-cyber-security-training-through-university-cyber-range-partnerships/</loc><lastmod>2018-03-21T15:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/22/the-identity-and-access-management-iam-wiki/</loc><lastmod>2018-03-20T23:33:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/22/how-to-perform-open-source-intelligence-osint/</loc><lastmod>2018-03-20T23:32:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/22/find-security-issues-before-your-code-goes-live/</loc><lastmod>2018-03-20T23:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/21/resource-open-source-fuzzers-list-and-other-fuzzing-tools/</loc><lastmod>2018-03-20T00:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/21/the-cloud-security-wiki/</loc><lastmod>2018-03-20T00:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/21/securing-the-hybrid-cloud-what-skills-do-you-need/</loc><lastmod>2018-03-19T23:48:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/20/cloud-security-a-primer/</loc><lastmod>2018-03-19T23:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/20/accelerating-cyber-risk-complacency-is-not-an-option/</loc><lastmod>2018-03-19T23:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/19/resource-free-infosec-books-list/</loc><lastmod>2018-03-19T23:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/20/cybersecurity-that-keeps-pace-with-innovation/</loc><lastmod>2018-03-19T23:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/19/top-5-questions-c-suite-executives-are-asking-about-cybersecurity-robert-herjavec/</loc><lastmod>2018-03-19T14:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/19/auditor-finds-infosec-weaknesses-in-most-fbi-domains-nextgov/</loc><lastmod>2018-03-19T14:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/18/5-million-android-phones-infected-with-pre-installed-rottensys-malware/</loc><lastmod>2018-03-18T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/18/what-cisos-should-know-about-quantum-computing/</loc><lastmod>2018-03-18T14:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/16/cyber-risk-forum-preview-former-secretary-of-homeland-security-michael-chertoff/</loc><lastmod>2018-03-16T17:40:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/17/nist-cybersecurity-framework-series-part-1-identify/</loc><lastmod>2018-03-16T17:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/17/cybersecurity-performance-8-indicators/</loc><lastmod>2018-03-16T17:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/16/firefox-tunnel-to-bypass-any-firewall/</loc><lastmod>2018-03-15T14:56:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/16/ms-isac-security-primer-email-bombs/</loc><lastmod>2018-03-14T18:22:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/16/mosquito-attack-allows-air-gapped-computers-to-covertly-exchange-data/</loc><lastmod>2018-03-14T14:33:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/15/spy-v-spy-an-nsa-leak-reveals-the-agencys-list-of-enemy-hackers/</loc><lastmod>2018-03-14T14:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/15/the-machine-learning-and-artificial-intelligence-ai-wiki-a-wiki-for-posts-about-machine-learning-and-artificial-intelligence/</loc><lastmod>2018-03-13T23:26:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/15/3-areas-in-which-cisos-are-becoming-more-proactive-security-executives-are-taking-a-hands-on-approach-in-areas-such-as-threat-intelligence-privacy-and-business-i/</loc><lastmod>2018-03-13T22:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/14/10-technologies-that-are-changing-how-we-think-about-cyber-security/</loc><lastmod>2018-03-13T18:26:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/14/hospitals-continue-to-value-healthcare-cybersecurity-patient-safety-hospital-leaders-prioritize-patient-safety-and-healthcare-cybersecurity-while-vendors-place-big-data-analytics-and-interoperabilit/</loc><lastmod>2018-03-13T16:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/14/onc-health-data-exchange-framework-to-disrupt-hies-industry-wide-while-tefca-may-be-voluntary-an-industry-expert-predicts-all-hies-will-be-affected-by-the-health-data-exchange-framework/</loc><lastmod>2018-03-13T16:16:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/13/information-security-threats-to-watch-through-2018/</loc><lastmod>2018-03-13T13:54:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/13/why-some-companies-are-embracing-blockchain/</loc><lastmod>2018-03-13T13:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/13/a-secure-development-approach-pays-off/</loc><lastmod>2018-03-13T00:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/11/an-ultimate-checklist-for-application-security-testing/</loc><lastmod>2018-03-11T13:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/12/what-is-a-virtual-ciso-when-and-how-to-hire-one-a-virtual-ciso-vciso-can-bring-both-strategic-and-operational-leadership-on-security-to-companies-that-cant/</loc><lastmod>2018-03-10T21:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/11/partners-healthcare-ciso-on-bolstering-endpoint-security-jigar-kadakia-discusses-security-priorities-at-himss18/</loc><lastmod>2018-03-10T21:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/11/himss18-cybersecurity-take-aways-insights-from-interviews-with-cisos-regulators/</loc><lastmod>2018-03-10T20:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/10/do-you-miss-axfr-technique-this-tool-allows-to-get-the-subdomains-from-a-https-website-in-a-few-seconds/</loc><lastmod>2018-03-10T15:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/09/look-alike-domains-and-visual-confusion-krebs-on-security/</loc><lastmod>2018-03-09T15:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/09/use-your-siem-to-catch-some-phish-anti-phishing-framework-is-out/</loc><lastmod>2018-03-08T23:36:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/08/international-womens-day/</loc><lastmod>2018-03-08T22:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/08/kali-linux-in-the-windows-app-store-kali-linux/</loc><lastmod>2018-03-08T15:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/09/the-memcached-vulnerability-wiki/</loc><lastmod>2018-03-08T13:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/08/cyber-security-certificate-courses/</loc><lastmod>2018-03-07T17:59:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/06/mcafee-uncovers-operation-honeybee-a-malicious-document-campaign-targeting-humanitarian-aid-groups-mcafee-blogs/</loc><lastmod>2018-03-06T15:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/06/web-application-security-tools-for-hackers-and-security-professionals/</loc><lastmod>2018-03-06T15:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/08/usda-to-block-400-websites-after-ig-finds-employees-looking-at-porn/</loc><lastmod>2018-03-06T14:20:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/07/the-future-of-company-cybersecurity-pentesting-says-cyberbyte/</loc><lastmod>2018-03-06T14:19:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/07/ny-national-guard-soldiers-deploy-for-cyber-security-duty/</loc><lastmod>2018-03-06T14:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/07/israeli-cybersecurity-co-minereye-raises-3-6m/</loc><lastmod>2018-03-06T14:17:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/06/these-are-the-most-influential-people-in-cybersecurity-right-now/</loc><lastmod>2018-03-06T00:31:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/04/ibm-discovers-business-email-compromise-attack-tied-to-5m-in-loses-cyber-security-digital-forensics/</loc><lastmod>2018-03-04T15:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/04/who-you-need-for-your-digital-journey-insead-knowledge/</loc><lastmod>2018-03-04T15:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/04/a-sneak-peek-at-the-new-nist-cybersecurity/</loc><lastmod>2018-03-04T15:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/05/6-tips-for-securing-privileged-accounts-in-the-enterprise/</loc><lastmod>2018-03-03T15:14:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/05/kansas-looks-to-codify-ciso-role-technology-advisory-body/</loc><lastmod>2018-03-03T15:13:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/05/arizona-governor-launches-cyber-security-task-force/</loc><lastmod>2018-03-03T15:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/03/12-bad-enterprise-security-habits-to-break-the-enterprisers-project/</loc><lastmod>2018-03-03T15:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/02/a-net-malware-called-evrial-that-steals-bitcoin-using-the-clipboard/</loc><lastmod>2018-03-02T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/03/air-force-tests-baked-in-software-security/</loc><lastmod>2018-03-02T00:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/03/hey-security-its-time-we-had-the-talk-about-pr-ciso-security-vendor-relationship/</loc><lastmod>2018-03-02T00:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/01/10-key-takeaways-from-ciscos-annual-cybersecurity-report/</loc><lastmod>2018-03-01T15:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/03/6-ways-to-improve-your-cybersecurity-practices/</loc><lastmod>2018-03-01T15:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/02/46-of-orgs-never-change-cybersecurity-strategy-even-after-attack-or-breach/</loc><lastmod>2018-03-01T15:49:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/02/ciso-2-0-where-you-need-to-be-2/</loc><lastmod>2018-03-01T15:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/28/major-data-breach-at-marine-forces-reserve-impacts-thousands/</loc><lastmod>2018-02-28T21:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/28/several-gas-station-design-flaws-allows-attackers-to-change-the-price/</loc><lastmod>2018-02-28T12:30:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/27/saml-vulnerability-lets-attackers-log-in-as-other-users/</loc><lastmod>2018-02-28T01:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/01/trusted-exchange-framework-whats-lacking/</loc><lastmod>2018-02-27T23:22:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/01/tsp-gets-lowest-possible-score-on-information-security-audit/</loc><lastmod>2018-02-27T23:19:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/28/new-sec-cybersecurity-guidance-for-public-companies/</loc><lastmod>2018-02-27T23:18:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/28/nearly-one-third-of-cisos-have-adopted-ai-in-response-to-cybersecurity-news-study-finds/</loc><lastmod>2018-02-27T23:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/28/why-data-science-is-becoming-so-important-in-cybersecurity/</loc><lastmod>2018-02-27T23:15:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/26/hackers-are-selling-legitimate-code-signing-certificates-to-evade-malware-detection-zdnet/</loc><lastmod>2018-02-26T15:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/27/what-are-the-top-information-security-objectives-for-cisos/</loc><lastmod>2018-02-25T21:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/24/tesla-internal-servers-hacked-and-used-it-to-cryptojacking-attack/</loc><lastmod>2018-02-24T15:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/27/401k-plans-a-cybersecurity-afterthought-employers-must-carefully-choose-and-monitor-third-party-administrators/</loc><lastmod>2018-02-23T22:05:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/26/thousands-of-snapchat-users-exposed-after-cyberattack/</loc><lastmod>2018-02-22T17:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/22/a-hacker-has-wiped-a-spyware-companys-servers-again/</loc><lastmod>2018-02-22T15:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/22/8-essential-qualities-that-define-great-leadership/</loc><lastmod>2018-02-22T15:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/21/identifying-propaganda-bots-on-twitter/</loc><lastmod>2018-02-21T15:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/21/nist-takes-aim-at-blockchain-security-hype-dxc-blogs/</loc><lastmod>2018-02-21T15:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/26/the-role-of-the-ciso-in-preventing-data-breaches/</loc><lastmod>2018-02-21T13:45:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/25/top-4-cybersecurity-mistakes-midsize-organizations-make-and-how-to-avoid-them/</loc><lastmod>2018-02-21T13:22:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/25/us-doe-introduces-new-cybersecurity-office-to-protect-energy-sector/</loc><lastmod>2018-02-21T13:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/25/sessions-creates-cybersecurity-task-force/</loc><lastmod>2018-02-21T13:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/24/why-small-businesses-need-enterprise-grade-security-just-as-much-as-large-corporations/</loc><lastmod>2018-02-21T13:18:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/24/shmoocon-2018-security-conference-videos/</loc><lastmod>2018-02-20T17:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/23/the-7-types-of-pentests-you-must-know-about/</loc><lastmod>2018-02-20T16:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/20/the-inconvenient-reality-of-law-firm-security-challenges/</loc><lastmod>2018-02-20T15:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/20/major-bug-forces-microsoft-to-rebuild-skype-information-security-buzz/</loc><lastmod>2018-02-20T15:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/23/a-list-of-free-and-commercial-full-disk-encryption-tools/</loc><lastmod>2018-02-20T01:13:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/23/cybersecurity-conversations-for-the-c-suite-2018/</loc><lastmod>2018-02-19T20:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/23/how-healthcare-can-prep-for-artificial-intelligence-machine-learning/</loc><lastmod>2018-02-19T17:44:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/19/north-korean-cyber-attacks-and-collateral-damage-alienvault/</loc><lastmod>2018-02-19T15:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/19/mountain-of-sensitive-fedex-customer-data-exposed-possibly-for-years-ars-technica/</loc><lastmod>2018-02-19T15:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/19/cisos-give-your-cybersecurity-program-a-sense-of-purpose/</loc><lastmod>2018-02-19T15:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/22/are-you-a-hybrid-entity-under-hipaa-the-health-insurance-portability-and-accountability-act-of-1996-hipaa-mandates-privacy-and-security-safeguards-for-medical-information-about-a-persons-h/</loc><lastmod>2018-02-18T17:19:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/21/the-top-25-information-security-events-and-conferences-of-2018/</loc><lastmod>2018-02-18T17:16:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/18/lexington-hotel-says-customer-credit-card-numbers-exposed-in-data-breach/</loc><lastmod>2018-02-18T15:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/18/meltdownprime-and-spectreprime-automatically-synthesized-attacks-exploiting-invalidation-based-coherence-protocols-caroline-trippel-daniel-lustig-margaret-martonosi/</loc><lastmod>2018-02-18T15:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/18/from-thenextweb-com/</loc><lastmod>2018-02-18T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/20/6-use-cases-for-blockchain-in-security-blockchain-has-the-potential-to-improve-encryption-and-authentication-and-that-could-be-good-news-for-iot-security-and-ddos-protection/</loc><lastmod>2018-02-17T21:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/17/cisos-should-report-directly-to-the-ceo-study-shows/</loc><lastmod>2018-02-16T17:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/16/understanding-secure-sdlc-needs-blog-article-series-by-hack2secure-securesdlc-security-software-peerlyst/</loc><lastmod>2018-02-16T12:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/17/what-cisos-prioritize-in-order-to-improve-cybersecurity-practices-2/</loc><lastmod>2018-02-14T16:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/16/what-cisos-prioritize-in-order-to-improve-cybersecurity-practices/</loc><lastmod>2018-02-14T16:06:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/16/cyber-security-leaders-concerned-about-sharp-rise-in-digital-threats/</loc><lastmod>2018-02-14T16:03:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/15/extrahop-intros-revealx-cybersecurity-analytics-software/</loc><lastmod>2018-02-14T16:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/16/building-a-national-cybersecurity-agency/</loc><lastmod>2018-02-14T15:57:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/14/employee-training-tops-list-of-financial-ciso-priorities/</loc><lastmod>2018-02-14T15:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/14/930000-law-firm-passwords-are-exposed-its-time-to-make-cybersecurity-a-priority-atl-small-firm-center/</loc><lastmod>2018-02-14T15:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/14/microsoft-developing-blockchain-tech-to-let-you-manage-your-digital-identity/</loc><lastmod>2018-02-14T15:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/15/google-move-to-categorize-many-websites-as-insecure-hello/</loc><lastmod>2018-02-13T20:04:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/15/three-steps-to-reduce-technology-sprawl-and-optimize-cyber-defenses/</loc><lastmod>2018-02-13T20:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/14/tips-from-top-cisos-reporting-to-the-board-what-works-what-doesnt/</loc><lastmod>2018-02-13T20:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/13/cyber-security-is-a-job-for-chief-executives-not-just-the-it-team-city-a-m/</loc><lastmod>2018-02-13T15:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/13/cyber-security-deployment-guide-to-effectively-safeguard-systems-data-itproportal/</loc><lastmod>2018-02-13T15:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/13/victims-of-some-versions-of-the-cryakl-ransomware-can-decrypt-their-files-for-free/</loc><lastmod>2018-02-13T15:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/13/bank-cybersecurity-heads-need-more-face-time-with-ceos-bloomberg/</loc><lastmod>2018-02-13T15:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/12/use-powershell-to-find-the-history-of-usb-flash-drive-usage/</loc><lastmod>2018-02-12T15:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/11/the-epson-airprint-web-configuration-page-is-vulnerable-to-a-reflected-cross-site-scripting-xss-issue-in-the-inputt_geolocation-parameter-in-the-web-administration-console/</loc><lastmod>2018-02-10T18:48:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/11/the-13-most-valuable-it-certifications-today-looking-for-a-leg-up-in-your-it-career-it-certifications-remain-a-proven-way-to-quickly-gain-valuable-skills-and-demonstrate-deeper-interest-and-know-how/</loc><lastmod>2018-02-10T18:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/10/the-case-for-hiring-a-federal-cyber-officer-thehill/</loc><lastmod>2018-02-10T15:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/10/california-voter-database-exposed-online-again-held-for-ransom-again/</loc><lastmod>2018-02-10T15:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/10/its-9-biggest-security-threats/</loc><lastmod>2018-02-10T15:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/11/hipaa-risk-assessment/</loc><lastmod>2018-02-10T13:46:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/09/why-cybersecurity-teams-need-to-build-bridges/</loc><lastmod>2018-02-09T15:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/07/i-have-thrown-down-the-challenge-to-security-pros-to-develop-a-list-of-methods-to-determine-if-you-have-already-been-hacked-there-are-two-types-of-organizations-those-that-have-been-hacked-and-tho/</loc><lastmod>2018-02-07T20:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/10/national-initiative-for-cybersecurity-education-nice-cybersecurity-workforce-framework/</loc><lastmod>2018-02-07T19:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/10/cisos-look-to-machine-learning-to-augment-security-staffing-shortages/</loc><lastmod>2018-02-07T16:18:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/09/the-expanding-role-of-the-ciso-seven-attributes-of-a-successful-security-leader/</loc><lastmod>2018-02-06T18:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/06/x-509-metadata-can-carry-information-through-the-firewall-the-register/</loc><lastmod>2018-02-06T12:57:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/09/report-number-of-cyber-incidents-doubled-in-2017-yet-93-percent-could-easily-have-been-prevented/</loc><lastmod>2018-02-05T15:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/08/security-baseline-for-office-2016-and-office-365-proplus-apps-draft/</loc><lastmod>2018-02-05T15:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/08/what-is-microsegmentation-how-getting-granular-improves-network-security-microsegmentation-is-a-way-to-create-secure-zones-in-data-centers-and-cloud-deployments-that-allow-you-to-isolate-workloads-an/</loc><lastmod>2018-02-05T15:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/08/public-preview-what-if-tool-for-azure-ad-conditional-access-policies/</loc><lastmod>2018-02-05T15:38:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/05/the-how-to-use-kali-linux-wiki-a-wiki-for-posts-about-kali-linux-especially-on-how-to-use-it-optimally/</loc><lastmod>2018-02-05T15:00:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/07/how-vulnerable-is-your-network-against-ransomware-infections-tool-to-test-you-against-ransomware/</loc><lastmod>2018-02-04T23:29:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/07/update-securing-dns-communication-dnscrypt-proxy/</loc><lastmod>2018-02-04T23:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/07/find-vulnerable-settings-in-ad-group-policy-grouper/</loc><lastmod>2018-02-04T23:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/06/hospital-pays-55k-ransomware-demand-despite-having-backups/</loc><lastmod>2018-02-04T23:24:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/06/automated-mass-exploiter-autosploit/</loc><lastmod>2018-02-04T23:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/06/addressing-the-security-challenges-facing-life-sciences-and-healthcare-companies/</loc><lastmod>2018-02-04T19:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/05/is-an-organizations-need-for-a-cyber-army-just-an-indicator-of-resource-mismanagement/</loc><lastmod>2018-02-04T19:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/03/the-sacramento-observer-federal-trade-commission-urges-wire-fraud-victims-to-apply-for-restitution/</loc><lastmod>2018-02-04T01:16:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/05/rationalizing-the-security-stack/</loc><lastmod>2018-02-03T16:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/04/six-practical-cybersecurity-tips-for-smes/</loc><lastmod>2018-02-03T16:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/04/5-reasons-why-business-continuity-management-is-essential-to-your-organisations-cyber-security/</loc><lastmod>2018-02-03T16:25:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/04/the-cdo-chief-data-officer/</loc><lastmod>2018-02-03T16:23:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/03/demystifying-information-security-using-data-science/</loc><lastmod>2018-02-02T23:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/03/spending-money-on-cyber-security-a-filing-cabinet-could-bring-your-business-undone/</loc><lastmod>2018-02-02T23:56:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/02/5-laws-of-cybersecurity/</loc><lastmod>2018-02-01T20:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/31/cybersecurity-warnings-sent-to-all-kentucky-candidates/</loc><lastmod>2018-01-31T20:30:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/01/war-room-to-boardroom-the-new-era-of-cybersecurity/</loc><lastmod>2018-01-31T20:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/02/privacy-experts-alarmed-as-amazon-moves-into-the-health-care-industry/</loc><lastmod>2018-01-31T20:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/01/learning-lessons-from-the-biggest-data-breaches-of-2017/</loc><lastmod>2018-01-31T20:26:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/02/01/cybersecurity-salaries-to-rise-fastest-of-all-it-professionals/</loc><lastmod>2018-01-31T20:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/03/29/blockchain-startup-for-information-security-offers-a-new-approach-to-the-threat-detection/</loc><lastmod>2018-01-31T20:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/30/security-awareness-for-taxpayers/</loc><lastmod>2018-01-29T16:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/30/map-five-major-cities-suddenly-are-facing-top-it-cabinet-vacancies/</loc><lastmod>2018-01-29T16:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/28/first-jackpotting-attacks-hit-u-s-atms-krebs-on-security/</loc><lastmod>2018-01-28T15:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/29/security-clearances-process-added-to-gao-list-of-high-risk-programs/</loc><lastmod>2018-01-27T22:55:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/28/choosing-the-right-security-framework-to-fit-your-business/</loc><lastmod>2018-01-27T22:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/28/data-protection-day-but-why-is-the-15th-february-even-more-important-for-businesses/</loc><lastmod>2018-01-27T22:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/27/new-infosec-products-of-the-week-january-26-2018-help-net-security/</loc><lastmod>2018-01-27T15:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/27/positive-technologies-learn-and-secure-how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-me/</loc><lastmod>2018-01-27T15:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/27/over-500-million-in-cryptocurrency-stolen-pc-gamer/</loc><lastmod>2018-01-27T14:57:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/26/blockchain-in-brief-six-ways-it-can-transform-higher-education/</loc><lastmod>2018-01-25T16:25:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/26/nist-blockchain-draft-document/</loc><lastmod>2018-01-25T16:24:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/25/explaining-the-nist-cybersecurity-framework-i-s-partners-llc/</loc><lastmod>2018-01-25T15:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/24/from-techcrunch-com/</loc><lastmod>2018-01-25T02:13:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/25/sharepoint-for-healthcare-aids-hipaa-compliance-workflow-automation/</loc><lastmod>2018-01-24T23:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/25/cybersecurity-what-does-the-board-want-and-need/</loc><lastmod>2018-01-24T23:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/23/uber-ignored-bug-that-grants-hackers-access-to-user-accounts/</loc><lastmod>2018-01-23T10:04:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/22/from-military-com/</loc><lastmod>2018-01-22T23:35:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/24/aec-failed-basic-cyber-security-requirements-misled-public-during-2016-federal-election-audit-finds/</loc><lastmod>2018-01-22T22:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/24/the-federal-information-systems-security-educators-association-fissea-conference-is-accepting-security-related-training-material-contest-submissions-for-the-organizations-31st-conference/</loc><lastmod>2018-01-22T22:57:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/24/allscripts-recovering-from-ransomware-attack-that-has-kept-key-tools-offline-new-variant-of-samsam-a-ransomware-family-linked-to-several-attacks-against-medical-providers-is-behind-the-allscripts/</loc><lastmod>2018-01-22T22:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/23/6-ways-hackers-will-use-machine-learning-to-launch-attacks-machine-learning-algorithms-will-improve-security-solutions-helping-human-analysts-triage-threats-and-close-vulnerabilities-quicker-but-the/</loc><lastmod>2018-01-22T22:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/22/who-your-next-ciso-might-be-cio/</loc><lastmod>2018-01-22T22:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/23/2-9-million-norwegians-healthcare-data-allegedly-breached/</loc><lastmod>2018-01-22T22:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/23/in-the-eyes-of-a-chief-information-security-officer/</loc><lastmod>2018-01-22T22:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com/2018/01/22/the-top-hipaa-threats-are-likely-not-what-you-think/</loc><lastmod>2018-01-22T15:00:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://leberconsultingllc.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-12T15:47:51+00:00</lastmod></url></urlset>
