<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://zinatullin.com/2026/03/28/ai-enabled-security-at-the-speed-of-business/</loc><lastmod>2026-03-28T04:29:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/about/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0138.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/leron_photo_med.jpg</image:loc><image:title>Leron_Photo_med</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/leron_photo.jpg</image:loc><image:title>Leron_photo</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/gicsp.jpg</image:loc><image:title>GICSP</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/cipt.jpg</image:loc><image:title>CIPT</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/cipm.jpg</image:loc><image:title>CIPM</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/sabsa-scan.jpg</image:loc><image:title>SABSA scan</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/content-1.jpg</image:loc><image:title>content (1)</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/content.jpg</image:loc><image:title>content</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/dip2.jpg</image:loc><image:title>dip2</image:title></image:image><lastmod>2026-03-27T23:11:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zinatullin.com/2026/02/11/book-signing-2/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/signing.jpeg</image:loc><image:title>Signing</image:title></image:image><lastmod>2026-03-06T23:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/03/07/my-booked-named-1-amazon-best-seller/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-06T22:56:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/02/04/governing-ai-where-should-we-draw-the-line/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/ai-panel.jpg</image:loc><image:title>AI panel</image:title></image:image><lastmod>2026-02-12T09:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/02/12/how-to-land-cyber-deliverables-from-strategy-to-impact/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/picture.jpeg</image:loc><image:title>Picture</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/post.jpg</image:loc><image:title>Post</image:title></image:image><lastmod>2026-02-11T21:11:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/02/05/design-security-for-people-how-behavioural-science-beats-friction/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-05T03:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/01/20/security-is-a-social-design-problem-not-a-tech-one/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/img_7447.jpeg</image:loc><image:title>IMG_7447</image:title></image:image><lastmod>2026-02-05T03:08:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/01/16/governing-ai-agents/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T22:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/01/13/ai-agents-and-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/5-day-ai-agents-intensive-course-with-google.png</image:loc><image:title>5-Day AI Agents Intensive Course with Google</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-14T09:13:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/12/19/the-observership-program-completed/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/red-flag-day-2.jpg</image:loc><image:title>red flag day</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/observership.jpg</image:loc><image:title>Observership</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/red-flag-day.jpg</image:loc><image:title>red flag day</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/red-flag-day-1.jpg</image:loc><image:title>red flag day</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/observership-1.jpg</image:loc><image:title>Observership</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/cahootlearningcertificate3548740-2.jpg</image:loc><image:title>CahootLearningCertificate3548740</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/cahootlearningcertificate3576208-2.jpg</image:loc><image:title>CahootLearningCertificate3576208</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/cahootlearningcertificate3563191-2.jpg</image:loc><image:title>CahootLearningCertificate3563191</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/cahootlearningcertificate3571239.jpg</image:loc><image:title>CahootLearningCertificate3571239</image:title></image:image><lastmod>2026-01-13T06:36:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2026/01/12/first-patrol-done/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-5.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-4.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-3-1.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-3-2.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-2.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-2-1.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-3.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/patrol-3-1.jpg</image:loc><image:title>patrol 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2026/01/img_6788-2.jpg</image:loc><image:title>IMG_6788</image:title></image:image><lastmod>2026-01-12T07:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/12/12/fintech-ai-and-cyber/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/facts-2-2.jpeg</image:loc><image:title>FACTS 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0144-3.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129-5.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129-4.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129-2.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129-3.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0144-2.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/facts-2.jpeg</image:loc><image:title>FACTS 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0129-1.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><lastmod>2025-12-12T01:14:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/11/26/protecting-reputation-and-building-trust-lessons-from-the-field/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0337.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/251126_facts_0344.jpg</image:loc><image:title>2025 FACTS Day One</image:title></image:image><lastmod>2025-12-05T21:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/07/05/redefining-business-and-technology-in-australia/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/moxie.png</image:loc><image:title>Moxie</image:title></image:image><lastmod>2025-12-05T21:06:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/06/18/ai-guardrails-and-governance/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/6d.jpeg</image:loc><image:title>6D</image:title></image:image><lastmod>2025-12-04T05:45:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/11/04/industry-and-government-engagement-in-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/12/cyber-coordinator.jpeg</image:loc><image:title>Cyber coordinator</image:title></image:image><lastmod>2025-12-04T05:20:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/11/19/talking-about-ai-risk-and-ai-governance/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/1763512863248.jpeg</image:loc><image:title>1763512863248</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-04T04:35:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/11/03/rsac-ciso-bootcamp-2025/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/coin.jpeg</image:loc><image:title>coin</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/krebs.jpeg</image:loc><image:title>krebs</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/solarwinds.jpeg</image:loc><image:title>solarwinds</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/gunther.jpeg</image:loc><image:title>Gunther</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/11/ciso-bootcamp-cert.png</image:loc><image:title>CISO Bootcamp cert</image:title></image:image><lastmod>2025-11-03T09:06:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/10/23/ai-and-cyber-for-board-directors/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/10/edu-2.jpg</image:loc><image:title>EDU 2</image:title></image:image><lastmod>2025-10-22T22:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/10/08/building-resilience-and-sustainable-performance/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/10/cyber-summit.jpeg</image:loc><image:title>Cyber summit</image:title></image:image><lastmod>2025-10-08T00:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/09/24/cso30-award-2025/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/10/award.png</image:loc><image:title>Award</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/10/cso30.jpeg</image:loc><image:title>CSO30</image:title></image:image><lastmod>2025-10-08T00:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/08/29/evolution-of-third-party-risk-accountability-and-trust/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/08/panel-2.jpeg</image:loc><image:title>Panel 2</image:title></image:image><lastmod>2025-08-29T03:13:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/08/05/responsible-management-prize/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-05T05:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/05/29/ai-in-the-enterprise-balancing-innovation-and-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/05/keynote-panel.jpeg</image:loc><image:title>Keynote panel</image:title></image:image><lastmod>2025-07-23T23:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/07/10/ai-leadership-in-an-accelerating-world/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-10T10:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/07/01/board-observership/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/lokahi-1.jpg</image:loc><image:title>Lokahi</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/lokahi.jpg</image:loc><image:title>Lokahi</image:title></image:image><lastmod>2025-06-30T23:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/06/01/sans-cyber-incident-leader/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/06/sans-cert.jpg</image:loc><image:title>SANS cert</image:title></image:image><lastmod>2025-06-18T11:03:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/04/26/giac-strategic-planning-policy-and-leadership/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/05/gstry-badge.png</image:loc><image:title>GSTRY badge</image:title></image:image><lastmod>2025-05-14T06:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/05/08/my-key-takeaways-from-the-biggest-event-in-cybersecurity/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/05/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/05/rsac.jpg</image:loc><image:title>RSAC</image:title></image:image><lastmod>2025-05-08T06:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/04/09/championing-ai-for-not%e2%80%91for%e2%80%91profits/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/04/ai-champion.png</image:loc><image:title>AI Champion</image:title></image:image><lastmod>2025-04-08T22:48:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/03/26/executive-mba-complete/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/03/testamur.jpg</image:loc><image:title>Testamur</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/03/cohort.jpg</image:loc><image:title>Cohort</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/03/graduation.jpg</image:loc><image:title>Graduation</image:title></image:image><lastmod>2025-04-01T23:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/03/08/australian-ciso-of-the-year-award-finalist/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/03/acsa25_finalists_ciso-of-the-year.png</image:loc><image:title>ACSA25_Finalists_CISO of the Year</image:title></image:image><lastmod>2025-03-24T03:06:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/03/04/cyber-risk-quantification/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/03/risk-quantification.jpg</image:loc><image:title>Risk quantification</image:title></image:image><lastmod>2025-03-09T22:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/02/17/adapting-to-eu-regulatory-changes-navigating-compliance-and-building-resilience/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/02/cisosydney.jpeg</image:loc><image:title>CISOSydney</image:title></image:image><lastmod>2025-02-17T09:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2025/01/16/navigating-the-endless-sea-of-threats/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2025/01/sea.png</image:loc><image:title>Sea</image:title></image:image><lastmod>2025-01-16T02:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/12/17/volunteering-as-a-telephone-crisis-supporter/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/lifeline-1.jpg</image:loc><image:title>Lifeline</image:title></image:image><lastmod>2024-12-17T04:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/12/11/board-directorship-mindset-shift/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/08/aicd.jpg</image:loc><image:title>AICD</image:title></image:image><lastmod>2024-12-11T10:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/12/01/learnings-from-working-across-cultures/</loc><lastmod>2024-12-10T10:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/11/21/volunteering-with-isaca/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/isaca-2.jpg</image:loc><image:title>ISACA 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/isaca-1.jpg</image:loc><image:title>ISACA 1</image:title></image:image><lastmod>2024-12-06T04:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/11/16/reflecting-on-a-transformative-week-in-dubbo/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/group.jpeg</image:loc><image:title>group</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/fletchers.jpeg</image:loc><image:title>fletchers</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/preso.jpeg</image:loc><image:title>preso</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/tree.jpeg</image:loc><image:title>tree</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/smoke.jpeg</image:loc><image:title>smoke</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/boomerang.jpeg</image:loc><image:title>boomerang</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/11/berry.jpeg</image:loc><image:title>berry</image:title></image:image><lastmod>2024-12-06T02:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/11/26/rsa-ciso-bootcamp/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/coin-1.jpg</image:loc><image:title>coin</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/cisobootcamp-2.jpeg</image:loc><image:title>CISOBootcamp</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/rsac.png</image:loc><image:title>RSAC</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/coin.jpg</image:loc><image:title>coin</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/cisobootcamp-1.jpeg</image:loc><image:title>CISOBootcamp</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/12/cisobootcamp.jpeg</image:loc><image:title>CISOBootcamp</image:title></image:image><lastmod>2024-12-05T00:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/10/24/accelerating-innovation-in-health-as-a-healthtech-mentor/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/10/agsm-mba-advisor-2024.png</image:loc><image:title>agsm-mba-advisor-2024</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-04T07:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/07/30/cyberpeace-institutes-volunteer-of-the-month/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/07/cyberpeace-badge.png</image:loc><image:title>CyberPeace badge</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-31T23:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/10/17/outstanding-value-in-cybersecurity/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-31T07:15:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/09/30/collaborating-with-the-enemy-key-lessons-for-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-20.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-31T06:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/09/01/how-to-achieve-soc-2-type-2-attestation/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/aicpa-soc-logo.png</image:loc><image:title>AICPA SOC Logo</image:title></image:image><lastmod>2024-09-30T05:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/09/21/australian-cyber-security-strategy/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/08/cyber.jpeg</image:loc><image:title>cyber</image:title></image:image><lastmod>2024-09-30T01:01:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/08/17/ai-for-social-impact/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-16.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-22T10:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/08/03/change-management-and-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/09/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-22T10:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/07/15/disruption-and-transformation/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/07/presentation-3-1.jpg</image:loc><image:title>Presentation 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/07/presentation-3.jpg</image:loc><image:title>Presentation 3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/07/pilot.jpg</image:loc><image:title>Pilot</image:title></image:image><lastmod>2024-07-15T11:37:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/07/03/scenario-analysis-in-cyber-security-building-resilience/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-03T08:51:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/04/12/inclusion-and-accessibility-shaping-culture-and-driving-business-outcomes/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/cyber-risk-panel.jpeg</image:loc><image:title>cyber-risk-panel</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/cyberrisk-meetup.webp</image:loc><image:title>cyberrisk-meetup</image:title></image:image><lastmod>2024-07-02T06:35:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/06/28/sustainable-leadership-in-an-accelerating-world/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-06-27T22:30:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/06/25/choosing-the-right-cybersecurity-framework/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-25T03:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/06/21/cross-cultural-leadership-in-china/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/cohort.jpg</image:loc><image:title>cohort</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/shanghai.jpeg</image:loc><image:title>shanghai</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/classroom.jpg</image:loc><image:title>classroom</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/certificates.jpg</image:loc><image:title>certificates</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/presentation-1.jpeg</image:loc><image:title>presentation-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-06-21T04:31:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/06/13/ive-been-awarded-a-prize-for-ethical-leadership/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/06/ethical-leadership.png</image:loc><image:title>ethical-leadership</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/ethical-leadership.png</image:loc><image:title>ethical-leadership</image:title></image:image><lastmod>2024-06-16T21:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/05/15/cyber-security-for-social-impact/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2024-05-23T01:40:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/05/18/how-to-adopt-nist-csf-2-0/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-05-23T00:53:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/05/11/how-to-measure-social-impact/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2024-05-23T00:50:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/05/04/systems-thinking-in-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/system-thinking.jpeg</image:loc><image:title>system-thinking</image:title></image:image><lastmod>2024-05-04T10:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/03/23/developing-effective-negotiation-skills/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-05-04T10:38:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/01/22/how-to-maximise-the-return-on-security-investment/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2024-04-21T05:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2024/02/18/navigating-the-iso-270012022-transition/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-04-18T10:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/09/21/implementing-cyber-security-strategy/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-04-18T10:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/12/13/economic-analysis-of-high-tech-industries/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-20.png</image:loc><image:title>image-20</image:title></image:image><lastmod>2024-02-13T04:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/11/15/applying-mba-concepts-to-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-01-16T09:55:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/07/20/building-a-security-community/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/ciso-community.jpeg</image:loc><image:title>ciso-community</image:title></image:image><lastmod>2023-12-23T20:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/06/24/how-to-develop-a-cyber-security-strategy/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/12/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2023-12-23T20:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/11/23/cso30-australia-2023-award-winner/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/11/2023.11.22-foundry-_-cso30-awards-0018-2.webp</image:loc><image:title>2023.11.22-foundry-_-cso30-awards-0018-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/11/leron-z-cso30.png</image:loc><image:title>leron-z-cso30</image:title></image:image><lastmod>2023-11-22T20:55:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/11/07/ciso-of-the-year-award/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/11/leron-zinatullin.png</image:loc><image:title>leron-zinatullin</image:title></image:image><lastmod>2023-11-07T10:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/11/03/responsible-business-practice-in-technology/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2023-11-03T10:58:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/08/15/cyber-security-operating-model/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-10-15T04:59:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/08/25/developing-a-high-performing-cyber-security-team-a-values-based-approach/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-10-15T04:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/11/24/financial-benefits-of-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2023-10-15T04:06:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/10/15/cso-executive-session-australia/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-10-15T04:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/07/05/applying-ai-and-ml-techniques-to-combat-scams-and-social-engineering/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-08-18T08:28:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/08/16/speaking-at-the-cloud-security-summit-sydney/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/08/cloud_sec_summit_speaker_leron.jpg</image:loc><image:title>cloud_sec_summit_speaker_leron</image:title></image:image><lastmod>2023-08-16T11:03:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/08/14/cybersecurity-board-reporting-ciso-executive-network/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/08/cyber-board.jpeg</image:loc><image:title>cyber-board</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-08-14T09:57:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/01/22/generative-ai-acceptable-use-policy/</loc><lastmod>2023-05-28T08:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/02/17/ethical-cyber-security-leadership/</loc><lastmod>2023-05-25T06:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/05/21/leading-in-a-crisis-data-breach-response/</loc><lastmod>2023-05-25T06:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/05/18/how-to-uplift-your-data-analytics-capability/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-05-18T11:13:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/05/06/data-analytics-and-decision-making/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/04/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2023-05-15T09:36:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/04/21/trust-in-people-macquarie-university-cyber-security-industry-workshop/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/04/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2023-05-15T09:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/04/02/scuba-diving-and-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-04-07T00:36:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/05/05/what-is-the-best-security-framework-for-your-business/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-02T11:14:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/09/15/continuous-security-monitoring/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/caesars.png</image:loc><image:title>caesars</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/continious-monitoring.png</image:loc><image:title>continious-monitoring</image:title></image:image><lastmod>2023-04-01T02:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/03/28/cisos-perspective-a-guest-lecture-at-unsw/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/03/lecture.png</image:loc><image:title>lecture</image:title></image:image><lastmod>2023-03-28T11:08:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/10/29/starting-an-executive-mba/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/01/unsw.jpg</image:loc><image:title>unsw</image:title></image:image><lastmod>2023-01-21T03:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2023/01/21/working-together-to-nurture-the-next-generation-of-cybersecurity-ventures/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/01/ccl.png</image:loc><image:title>ccl</image:title></image:image><lastmod>2023-01-21T03:15:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/03/25/im-joining-pigeonlines-advisory-board/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2023/01/researchai.webp</image:loc><image:title>researchai</image:title></image:image><lastmod>2023-01-21T00:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/04/08/working-as-an-interim-head-of-enterprise-architecture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/ea.png</image:loc><image:title>ea</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-12-21T10:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/10/15/collaborating-with-the-optus-macquarie-university-cyber-security-hub/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/phone-scams.png</image:loc><image:title>phone-scams</image:title></image:image><lastmod>2022-12-04T07:19:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/12/02/ive-been-named-as-one-of-top-10-cybersecurity-leaders-in-australia/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/12/cso-30-award-winner.png</image:loc><image:title>cso-30-award-winner</image:title></image:image><lastmod>2022-12-02T08:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/05/10/transparency-in-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/10/germany-presenation.jpeg</image:loc><image:title>germany-presenation</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/05/transparent.jpg</image:loc><image:title>Transparent</image:title></image:image><lastmod>2023-02-18T18:55:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/09/16/working-with-indigenous-communities-in-australia/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/09/map.png</image:loc><image:title>map</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/09/cac.jpeg</image:loc><image:title>cac</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/09/presentation.jpeg</image:loc><image:title>presentation</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/09/painting.jpeg</image:loc><image:title>painting</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/09/theory-of-change.png</image:loc><image:title>theory-of-change</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/08/road.jpeg</image:loc><image:title>road</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/08/ngarrindjeri.jpeg</image:loc><image:title>ngarrindjeri</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/08/swag.jpeg</image:loc><image:title>swag</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/08/ceduna-airport.jpeg</image:loc><image:title>ceduna-airport</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/08/kangaroo-tails.jpeg</image:loc><image:title>kangaroo-tails</image:title></image:image><lastmod>2023-01-14T21:40:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/03/01/agile-security-at-scale/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/safe-agilist.png</image:loc><image:title>safe-agilist</image:title></image:image><lastmod>2022-09-13T10:28:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/06/02/isaca-young-professionals/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/isaca-interview.png</image:loc><image:title>isaca-interview</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/06/isaca.png</image:loc><image:title>ISACA</image:title></image:image><lastmod>2022-06-23T06:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/06/11/applying-lean-practices-to-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/lean-testamur.png</image:loc><image:title>lean-testamur</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/lean-silver-belt.png</image:loc><image:title>lean-silver-belt</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2022/06/lcs-logo.png</image:loc><image:title>lcs-logo</image:title></image:image><lastmod>2022-06-13T02:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/08/04/scrum-master/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/08/csa.png</image:loc><image:title>CSA</image:title></image:image><lastmod>2022-06-13T01:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/01/08/supply-chain-security/</loc><lastmod>2022-04-02T03:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2022/02/05/professional-certifications/</loc><lastmod>2022-03-24T08:58:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/09/09/welcome-to-australia/</loc><lastmod>2022-03-23T21:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/04/11/startup-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/04/14188692143_8ed6740a1d_z.jpg</image:loc><image:title>14188692143_8ed6740a1d_z</image:title></image:image><lastmod>2022-03-17T03:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/06/06/30978/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/06/img-6141-1.jpg</image:loc><image:title>IMG-6141</image:title></image:image><lastmod>2022-03-17T03:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/05/30/first-100-days-as-a-ciso/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/05/lifecycle.jpeg</image:loc><image:title>Lifecycle</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/timeline.jpeg</image:loc><image:title>Timeline</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/roadmap.jpeg</image:loc><image:title>Roadmap</image:title></image:image><lastmod>2022-03-17T03:46:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/06/01/developing-information-security-startegy/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/06/timeline-1.jpeg</image:loc><image:title>Timeline</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/06/strategy-1.jpeg</image:loc><image:title>Strategy</image:title></image:image><lastmod>2022-03-17T03:46:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/10/02/how-to-respond-to-a-security-incident/</loc><lastmod>2022-03-17T03:46:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/02/agile-security-part-2-user-stories/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/ticket-2-1.jpeg</image:loc><image:title>Ticket 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/ticket-1-1.jpeg</image:loc><image:title>Ticket 1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/scrum-poker-1.jpg</image:loc><image:title>Scrum poker</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/clickup-1.jpeg</image:loc><image:title>Clickup</image:title></image:image><lastmod>2022-03-17T03:45:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/02/agile-security-part-1-embedding-security-in-your-product/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/board.jpeg</image:loc><image:title>Board</image:title></image:image><lastmod>2022-03-17T03:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/01/06/how-to-prioritise-security-activities/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/01/scrum_board.png</image:loc><image:title>scrum_board</image:title></image:image><lastmod>2022-03-17T03:45:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/05/01/about-me/</loc><lastmod>2022-03-17T03:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/05/17/31996/</loc><lastmod>2022-03-17T03:44:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/08/20/chief-information-security-officer-workshop-training/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/08/digital-transformation.png</image:loc><image:title>Digital transformation</image:title></image:image><lastmod>2022-03-17T03:42:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/08/15/cyber-incident-readiness/</loc><lastmod>2022-03-17T03:42:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/09/15/how-to-secure-a-business-in-decline/</loc><lastmod>2022-03-17T03:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/10/01/webinar-a-ciso-panel-on-weaving-security-into-the-business-strategy/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/10/webinar-1.png</image:loc><image:title>Webinar</image:title></image:image><lastmod>2022-03-17T03:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/11/07/how-to-select-cyber-insurance/</loc><lastmod>2022-03-17T03:40:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/02/how-to-set-up-a-bug-bounty-program/</loc><lastmod>2022-03-17T03:39:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/12/how-to-assess-security-risks-using-the-bow-tie-method/</loc><lastmod>2022-03-17T03:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/14/how-to-apply-fbis-behavioural-change-stairway-to-security/</loc><lastmod>2022-03-17T03:38:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/03/01/how-to-develop-a-culture-of-security/</loc><lastmod>2022-03-17T03:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/02/27/cyber-security-metrics-and-kpis/</loc><lastmod>2022-03-17T03:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/22/how-to-be-a-trusted-advisor/</loc><lastmod>2022-03-17T03:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/03/23/security-dashboard/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2021/03/security-dashboard-1.png</image:loc><image:title>Security dashboard</image:title></image:image><lastmod>2022-03-17T03:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/12/17/communication-strategy-for-security-leaders/</loc><lastmod>2022-03-17T03:36:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/05/11/cyber-incident-response-crisis-communication/</loc><lastmod>2022-03-17T03:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/29/how-to-manage-vulnerabilities-in-your-open-source-packages-part-2-integrating-snyk-in-your-ci-cd-pipeline/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/snyk_scan.jpeg</image:loc><image:title>snyk_scan</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/tests.png</image:loc><image:title>Tests</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/pipeline.png</image:loc><image:title>Pipeline</image:title></image:image><lastmod>2022-02-17T02:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/25/how-to-manage-vulnerabilities-in-your-open-source-packages-part-1-using-snyk/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/project.png</image:loc><image:title>Project</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/snyk.png</image:loc><image:title>Snyk</image:title></image:image><lastmod>2022-02-17T02:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/01/security-product-management/</loc><lastmod>2022-02-17T02:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/10/integrating-application-security-testing-in-ci-cd-pipeline/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/zap.png</image:loc><image:title>ZAP</image:title></image:image><lastmod>2022-02-17T02:24:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/02/09/how-to-prevent-committing-secrets-in-code/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/detect-secrets.png</image:loc><image:title>detect-secrets</image:title></image:image><lastmod>2022-02-17T02:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/20/embedding-security-in-the-agile-product-development/</loc><lastmod>2022-02-17T02:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/09/23/ive-made-it-to-the-unsung-hero-award-devsecops-trailblazer-shortlist/</loc><lastmod>2022-02-17T02:21:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/07/26/software-and-security-engineering/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/07/cambridge.png</image:loc><image:title>Cambridge</image:title></image:image><lastmod>2022-02-17T02:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/10/17/threat-modelling-101/</loc><lastmod>2022-02-17T02:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/11/22/product-security/</loc><lastmod>2022-02-17T02:17:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/05/06/static-code-analysis-for-security/</loc><lastmod>2022-02-17T02:17:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/05/07/secure-software-development-lifecycle-and-devsecops/</loc><lastmod>2022-02-17T02:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/09/30/skills-development/</loc><lastmod>2022-01-07T03:04:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/08/16/the-complexity-of-communication/</loc><lastmod>2021-10-30T03:29:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/07/12/sharing-thoughts-on-zero-trust/</loc><lastmod>2021-10-24T09:01:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/06/01/supporting-the-nhs/</loc><lastmod>2021-10-24T09:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/02/05/cyber-security-lessons-from-across-the-industries/</loc><lastmod>2021-10-21T06:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/10/30/creating-sabsa-architecture-using-archimate-modelling-tool/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/visualiser.png</image:loc><image:title>Visualiser</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/6-physical-model.png</image:loc><image:title>6 - Physical model</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/4-logical-model.png</image:loc><image:title>4 - Logical Model</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/3-conceptual.png</image:loc><image:title>3 - Conceptual</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/1-contextual.png</image:loc><image:title>1 - Contextual</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/2-business-driver-t-oattribute-mapping.png</image:loc><image:title>2 - business driver t oattribute mapping</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/001.png</image:loc><image:title>001</image:title></image:image><lastmod>2021-08-02T17:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/04/06/gdpr-practitioner/</loc><lastmod>2021-04-06T20:19:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/03/11/how-to-solve-a-business-problem-with-security-using-sabsa/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/layers1.png</image:loc><image:title>layers</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/objectives.png</image:loc><image:title>Objectives</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/attributes1.png</image:loc><image:title>Attributes</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/img_0290.jpg</image:loc><image:title>IMG_0290</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/process-map.png</image:loc><image:title>Process map</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/new-attributes1.png</image:loc><image:title>New attributes</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/trust.png</image:loc><image:title>Trust</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/flows-and-attributes.png</image:loc><image:title>Flows and attributes</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/flow-1.png</image:loc><image:title>Flow 1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/03/flow-2.png</image:loc><image:title>Flow 2</image:title></image:image><lastmod>2021-03-05T10:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/03/04/book-of-the-month/</loc><lastmod>2021-03-04T20:50:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/02/23/book-signing/</loc><lastmod>2021-02-23T21:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/02/07/cyber-security-a-global-perspective/</loc><lastmod>2021-02-07T09:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/21/aws-iam-fundamentals/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/iam.jpeg</image:loc><image:title>IAM</image:title></image:image><lastmod>2021-01-30T21:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/12/how-to-inventory-your-aws-assets/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/findings.jpeg</image:loc><image:title>Findings</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/11/resource.jpeg</image:loc><image:title>Resource</image:title></image:image><lastmod>2021-01-30T21:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/06/auditing-your-aws-environment/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/weboftrust.jpeg</image:loc><image:title>weboftrust</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/cloudmapper.jpeg</image:loc><image:title>Cloudmapper</image:title></image:image><lastmod>2021-01-30T21:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/02/26/securing-gsuite-a-guide-for-a-startup/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/settings-2.png</image:loc><image:title>Settings 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/gsuite.png</image:loc><image:title>GSuite</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/settings.png</image:loc><image:title>Settings</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/dashboard.png</image:loc><image:title>Dashboard</image:title></image:image><lastmod>2021-01-30T21:17:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/07/02/small-business-resilience-toolkit/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/07/resilience.png</image:loc><image:title>Resilience</image:title></image:image><lastmod>2021-01-30T21:16:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/06/business-alignment-framework-for-security/</loc><lastmod>2021-01-30T21:14:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/01/30/how-to-pass-the-az-500-microsoft-azure-security-technologies-exam/</loc><lastmod>2021-06-12T11:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/19/how-to-pass-the-azure-fundamentals-exam/</loc><lastmod>2021-01-30T12:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/01/29/free-security-awareness-training-for-your-staff/</loc><lastmod>2021-01-29T22:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2021/01/27/can-ai-help-improve-security-culture/</loc><lastmod>2021-01-27T10:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/12/13/guest-lecture-at-hull-university-business-school/</loc><lastmod>2020-12-13T10:53:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/06/29/cyber-security-in-the-oil-gas-industry/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/06/energy.jpg</image:loc><image:title>Energy</image:title></image:image><lastmod>2020-12-03T13:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/11/08/the-role-of-a-ciso/</loc><lastmod>2020-11-23T21:33:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/11/22/ive-been-named-a-cso30-awards-2020-winner/</loc><lastmod>2020-11-22T10:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/11/05/cso30-conference-behavioural-science-in-cyber-security/</loc><lastmod>2020-11-05T13:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/10/21/royal-holloway-university-of-london-adopts-my-book-for-their-msc-information-security-programme/</loc><lastmod>2020-10-26T10:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/02/03/how-to-set-up-cloudtrail-logging-the-right-way/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/trails.png</image:loc><image:title>Trails</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/s3-bucket.png</image:loc><image:title>S3 bucket</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/s3-block-public-access.png</image:loc><image:title>S3 block public access</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/02/create-trail.png</image:loc><image:title>Create Trail</image:title></image:image><lastmod>2020-10-18T18:02:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/10/18/the-foundation-of-the-zero-trust-architecture/</loc><lastmod>2020-10-18T18:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/03/13/threat-detection-in-aws-with-guardduty/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/member-1-1.png</image:loc><image:title>Member 1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/member-0-1.png</image:loc><image:title>Member 0</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/master-1.png</image:loc><image:title>Master</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/guardduty.png</image:loc><image:title>GuardDuty</image:title></image:image><lastmod>2020-10-17T20:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/03/22/configuration-management-in-aws-using-config/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/member.png</image:loc><image:title>Member</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/config.png</image:loc><image:title>Config</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/03/config-splash.png</image:loc><image:title>Config splash</image:title></image:image><lastmod>2021-01-11T23:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/07/14/aws-machine-learning-course/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/07/coursera-ml-certificate.png</image:loc><image:title>Coursera ML certificate</image:title></image:image><lastmod>2020-10-04T10:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/08/06/learn-how-cybersecurity-professionals-have-been-adapting-their-practices/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/08/ebook2.png</image:loc><image:title>eBook2</image:title></image:image><lastmod>2020-10-04T10:07:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/08/08/ive-been-named-a-finalist-for-the-2020-cyber-security-awards/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/08/finalist-logo-2020.png</image:loc><image:title>Finalist logo 2020</image:title></image:image><lastmod>2020-08-08T21:01:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/02/28/the-problem-with-security-2/</loc><lastmod>2020-07-08T11:32:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/05/20/how-to-pass-the-aws-security-speciality-exam/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/05/solutions-badge.png</image:loc><image:title>Solutions badge</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/05/security-badge.png</image:loc><image:title>Security Badge</image:title></image:image><lastmod>2020-06-29T21:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/04/08/security-lessons-from-the-pandemic/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/49640411737_05b48fc1b0_c.jpg</image:loc><image:title>49640411737_05b48fc1b0_c</image:title></image:image><lastmod>2020-06-29T19:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/07/11/governance-models-cloud/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-06-09T08:51:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/02/04/resilience-in-the-cloud/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/02/4157700219_609fca025b_z.jpg</image:loc><image:title>4157700219_609fca025b_z</image:title></image:image><lastmod>2020-05-22T09:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/12/08/passed-my%e2%80%88aws-certified-solutions-architect-exam-heres-how-you-can-too/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/12/aws-certified-solutions-architect-associate-certificate.jpg</image:loc><image:title>AWS Certified Solutions Architect - Associate certificate</image:title></image:image><lastmod>2020-05-19T09:55:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/12/06/how-to-pass-ccsp/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/ccsp-logo-2lines.png</image:loc><image:title>CCSP-logo-2lines</image:title></image:image><lastmod>2020-05-18T10:02:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/04/15/setting-up-a-web-application-firewall-in-aws/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/waf.png</image:loc><image:title>WAF</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/xss.png</image:loc><image:title>XSS</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/sql.png</image:loc><image:title>SQL</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/waf-conditions.png</image:loc><image:title>WAF conditions</image:title></image:image><lastmod>2020-04-23T11:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/04/16/aws-security-hub/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/cis-example-1.png</image:loc><image:title>CIS example</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/security-hub-findings.png</image:loc><image:title>Security Hub findings</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/security-hub-dashboard-2.png</image:loc><image:title>Security Hub Dashboard 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/securityhub-dashboard-1.png</image:loc><image:title>SecurityHub Dashboard 1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/cis-score.png</image:loc><image:title>CIS score</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/security-hub.png</image:loc><image:title>Security Hub</image:title></image:image><lastmod>2020-04-16T09:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2020/04/14/automating-the-detection-and-remediation-of-security-vulnerabilities-in-aws/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/commadn-line-update.png</image:loc><image:title>Commadn line update</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/yum-update.png</image:loc><image:title>yum update</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/inspector-findings.png</image:loc><image:title>Inspector findings</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/inspector-dashboard.png</image:loc><image:title>Inspector dashboard</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2020/04/inspector-setup.png</image:loc><image:title>Inspector setup</image:title></image:image><lastmod>2020-04-14T12:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/11/30/31694/</loc><lastmod>2020-01-27T17:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/20/the-evolution-of-cyber-security/</loc><lastmod>2019-12-20T15:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/04/netrunner-what-infosec-might-look-like-in-the-future/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/troubleshooter.jpeg</image:loc><image:title>Troubleshooter</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/cyberfeeder.jpeg</image:loc><image:title>Cyberfeeder</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/runners.jpeg</image:loc><image:title>Runners</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/12/netrunner.jpeg</image:loc><image:title>Netrunner</image:title></image:image><lastmod>2020-05-09T17:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/12/02/31699/</loc><lastmod>2019-12-08T10:45:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/01/24/author-of-the-month-for-january-2019/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/01/discount-banner.png</image:loc><image:title>discount-banner</image:title></image:image><lastmod>2019-12-02T16:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/10/11/gitex-technology-week-in-dubai/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5862.jpg</image:loc><image:title>IMG-5862</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5762.jpg</image:loc><image:title>IMG-5762</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5645.jpg</image:loc><image:title>IMG-5645</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5634.jpg</image:loc><image:title>IMG-5634</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5631.jpg</image:loc><image:title>IMG-5631</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/10/img-5463.jpg</image:loc><image:title>IMG-5463</image:title></image:image><lastmod>2019-11-01T19:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/09/09/cyber-security-in-divestments/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/05/3197813348_6786c9aae5_z.jpg</image:loc><image:title>3197813348_6786c9aae5_z</image:title></image:image><lastmod>2019-10-31T10:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/08/05/what-can-a-us-army-general-teach-us-about-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/05/general.png</image:loc><image:title>General</image:title></image:image><lastmod>2019-10-31T10:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/07/02/how-to-protect-your-customers-personal-data/</loc><lastmod>2019-10-30T21:03:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/08/23/my-book-is-being-translated-to-persian/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/08/persian.jpg</image:loc><image:title>Persian</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/10/persian.png</image:loc><image:title>persian</image:title></image:image><lastmod>2019-06-23T10:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/07/12/devops-and-operational-technology-a-security-perspective/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/07/3391525700_187606bd23_z.jpg</image:loc><image:title>3391525700_187606bd23_z</image:title></image:image><lastmod>2019-06-23T09:31:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/04/17/artificial-intelligence-and-cyber-security-attacking-and-defending/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/3237928173_9d99dc9113_z.jpg</image:loc><image:title>3237928173_9d99dc9113_z</image:title></image:image><lastmod>2020-11-12T14:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/12/12/digital-transformation/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/12/5340338263_fd2b79290b_z.jpg</image:loc><image:title>5340338263_fd2b79290b_z</image:title></image:image><lastmod>2019-06-23T09:05:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/05/17/vulnerability-scanning-gone-bad/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/05/4197732260_60306abecf_z.jpg</image:loc><image:title>4197732260_60306abecf_z</image:title></image:image><lastmod>2019-06-22T20:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/05/06/understanding-your-threat-landscape/</loc><lastmod>2019-05-06T17:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/05/16/amsterdam/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/ugtvz5xarrmf6lz9huidg_thumb_4259.jpg</image:loc><image:title>uGtvz5XaRRmf6lz9hUi%Dg_thumb_4259</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/vu0mu9hbszgxdqzdzcmimw_thumb_4275.jpg</image:loc><image:title>Vu0mU9HBSZGxdqZdzCMimw_thumb_4275</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_41bb.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_41bb</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_42ca.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_42ca</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_41ed.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_41ed</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_4271.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_4271</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_41d4.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_41d4</image:title></image:image><lastmod>2019-05-02T19:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/04/22/python/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/04/python_logo_and_wordmark.svg_.png</image:loc><image:title>Python_logo_and_wordmark.svg</image:title></image:image><lastmod>2019-05-02T19:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/11/15/security-in-mergers-and-acquisitions-conducting-due-diligence/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/ma-2.png</image:loc><image:title>M&amp;A 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/ma-1.png</image:loc><image:title>M&amp;A 1</image:title></image:image><lastmod>2019-04-25T08:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/11/16/security-in-mergers-and-acquisitions-integration/</loc><lastmod>2019-04-25T08:05:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/03/12/innovating-in-the-age-of-gdpr/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/03/expo.png</image:loc><image:title>Expo</image:title></image:image><lastmod>2019-04-22T19:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/07/06/is-consulting-changing/</loc><lastmod>2019-04-13T17:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2019/01/03/securing-json-web-tokens/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2019/01/snip20190118_5.png</image:loc><image:title>snip20190118_5</image:title></image:image><lastmod>2019-01-18T17:38:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/11/30/videos-for-infosec-awareness/</loc><lastmod>2019-01-11T18:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/06/20/talking-about-the-human-aspects-of-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/09/talk01.jpg</image:loc><image:title>Talk01</image:title></image:image><lastmod>2018-11-28T21:47:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/06/25/security-architecture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/06/approach.png</image:loc><image:title>Approach</image:title></image:image><lastmod>2018-11-28T21:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/11/27/the-psychology-of-information-security-is-now-an-audiobook-too/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/snip20181127_2.png</image:loc><image:title>Snip20181127_2</image:title></image:image><lastmod>2018-11-27T22:23:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/11/09/human-computer-interaction/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/11/idf.png</image:loc><image:title>IDF</image:title></image:image><lastmod>2018-11-10T16:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/08/31/nispcc/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/08/nspcc.jpg</image:loc><image:title>NSPCC</image:title></image:image><lastmod>2018-10-30T22:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/02/14/using-sabsa-for-application-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/security-attributes.png</image:loc><image:title>security attributes</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/sabsa-views.png</image:loc><image:title>SABSA views</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/owasp.png</image:loc><image:title>OWASP</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/levels.png</image:loc><image:title>levels</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/dashboard.png</image:loc><image:title>dashboard</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/cycle.png</image:loc><image:title>Cycle</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/components.png</image:loc><image:title>Components</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/business-attributes.png</image:loc><image:title>Business attributes</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/02/business-and-it-attributes.png</image:loc><image:title>Business and iT attributes</image:title></image:image><lastmod>2018-10-30T22:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/10/10/cyber-security-law-and-guidance/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/img-2260.jpg</image:loc><image:title>IMG-2260</image:title></image:image><lastmod>2018-10-30T22:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/08/29/an-open-source-modelling-toolkit-for-enterprise-architecture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/archimate.png</image:loc><image:title>ArchiMate</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/10/archi_laptop.png</image:loc><image:title>archi_laptop</image:title></image:image><lastmod>2018-10-30T22:16:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/08/04/behavioural-science-in-cyber-security/</loc><lastmod>2018-08-21T20:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/05/17/developing-global-cyber-services/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/05/unadjustednonraw_thumb_3078.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3078</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/05/cq5dam-web-512-99999.jpg</image:loc><image:title>cq5dam.web.512.99999</image:title></image:image><lastmod>2018-08-04T20:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/02/06/nis-directive/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/nis.png</image:loc><image:title>NIS</image:title></image:image><lastmod>2018-11-10T16:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/06/06/intrusion-detection-in-ics-environment/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/06/unadjustednonraw_thumb_3dd2.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3dd2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/06/unadjustednonraw_thumb_3de4.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3de4</image:title></image:image><lastmod>2018-07-31T20:24:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/01/10/cyber-startup-keys-to-success/</loc><lastmod>2018-07-27T21:13:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/04/19/security-function-review/</loc><lastmod>2018-07-27T21:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/12/08/books-and-blogs-for-cyber-start-up-founders/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/12/e4c506fe-hutzero-logo_04t01404t014000000.png</image:loc><image:title>e4c506fe-hutzero-logo_04t01404t014000000</image:title></image:image><lastmod>2018-07-27T19:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/12/06/24655/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/iot.jpeg</image:loc><image:title>IoT</image:title></image:image><lastmod>2018-07-22T20:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2018/02/03/vienna-cyber-security-week-2018/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/energypact_oranizers_version-eventmeldung.jpg</image:loc><image:title>energypact_oranizers_version-eventmeldung</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_3f5e.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3f5e</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/jkvjiud6si2cm1ws687l6q_thumb_3f22.jpg</image:loc><image:title>JkVjIud6Si2cm1Ws687l6Q_thumb_3f22</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_3f31.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3f31</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/unadjustednonraw_thumb_3f40.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3f40</image:title></image:image><lastmod>2018-07-22T18:17:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/11/user-experience-and-security/</loc><lastmod>2018-07-21T19:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/01/fido/</loc><lastmod>2018-07-21T19:49:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/04/change-resistance/</loc><lastmod>2018-07-21T19:49:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/10/11/book-offer/</loc><lastmod>2018-07-21T09:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/02/320/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/ucl-research-proposal.jpg</image:loc><image:title>UCL - research proposal</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/id-10092068.jpg</image:loc><image:title>ID-10092068</image:title></image:image><lastmod>2018-07-21T08:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/08/24/how-to-conduct-a-security-assessment/</loc><lastmod>2018-07-21T08:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/04/04/information-security-e-learning/</loc><lastmod>2018-07-20T20:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/05/risk-management-and-compliance-tools/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/citicus.png</image:loc><image:title>Citicus</image:title></image:image><lastmod>2018-07-20T19:59:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/10/05/penetration-testing-questions-answered/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/10/id-100245348.jpg</image:loc><image:title>ID-100245348</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/10/id-10023330.jpg</image:loc><image:title>ID-10023330</image:title></image:image><lastmod>2018-07-20T19:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/02/16/information-security-e-learning-part-2/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/id-100188595.jpg</image:loc><image:title>ID-100188595</image:title></image:image><lastmod>2018-07-20T19:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/10/10/security-in-an-agile-world-nextsec-event/</loc><lastmod>2018-07-20T19:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/12/20/the-cybersecurity-canon-the-psychology-of-information-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/10/big-canon-banner.png</image:loc><image:title>Big-Canon-Banner</image:title></image:image><lastmod>2018-07-20T19:28:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/09/21/risk-management-fundamentals/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/risk.png</image:loc><image:title>Risk</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/07/nist-scf.png</image:loc><image:title>NIST SCF</image:title></image:image><lastmod>2018-07-20T19:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/01/04/wicked-problems-in-information-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/01/10299945186_12bb26640f_z.jpg</image:loc><image:title>10299945186_12bb26640f_z</image:title></image:image><lastmod>2018-07-20T08:00:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/10/25/gdpr-compliance-automation-responding-to-data-subject-requests/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/10/tool.png</image:loc><image:title>Tool</image:title></image:image><lastmod>2018-07-20T07:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/10/10/safety-and-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/id-100356086.jpg</image:loc><image:title>ID-100356086</image:title></image:image><lastmod>2018-07-20T07:55:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/02/02/hong-kong/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/vkqb743sspqnjidvhvxfa_thumb_2e8e.jpg</image:loc><image:title>vkqB743SSPqnjIDvh+vxfA_thumb_2e8e</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_2f34.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_2f34</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_2fab.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_2fab</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/1yjcffbs2svzhmresnyca_thumb_2ede.jpg</image:loc><image:title>1yJcbS2SVZHMresNyCA_thumb_2ede</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_2e76.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_2e76</image:title></image:image><lastmod>2018-07-04T18:01:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/04/22/our-iceberg-is-melting/</loc><lastmod>2018-07-04T17:28:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/11/20/presenting-at-sans-european-security-awareness-summit/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/11/sign.jpg</image:loc><image:title>sign</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/11/coin.jpg</image:loc><image:title>coin</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/11/clear-desk.jpg</image:loc><image:title>clear desk</image:title></image:image><lastmod>2018-07-04T17:24:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/11/30/helping-clients-in-saudi-arabia/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/11/jvgavcscsg6mp5vgaobf6g_thumb_3cf0.jpg</image:loc><image:title>jvGavCsCSG6MP5VGAobf6g_thumb_3cf0</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3c2c.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3c2c</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3c41.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3c41</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3cce.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3cce</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3c42.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3c42</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3c96.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3c96</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2018/04/unadjustednonraw_thumb_3bea.jpg</image:loc><image:title>UNADJUSTEDNONRAW_thumb_3bea</image:title></image:image><lastmod>2018-07-04T17:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/12/08/best-cyber-security-speaker-2017-award/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/12/unnamed.jpg</image:loc><image:title>unnamed</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/12/img_9440.jpg</image:loc><image:title>IMG_9440</image:title></image:image><lastmod>2018-07-04T13:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/07/29/third-party-security-assessments-applying-sabsa/</loc><lastmod>2019-12-03T09:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/08/04/industrial-control-systems-security-incident-responce/</loc><lastmod>2018-06-26T19:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/01/interview-with-jitender-arora-information-security-risk-executive-financial-services/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/arora.jpg</image:loc><image:title>Arora</image:title></image:image><lastmod>2018-06-25T17:50:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/01/20/686/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/reward.jpg</image:loc><image:title>reward</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/unpleasant-but-necessary-measures.jpg</image:loc><image:title>unpleasant but necessary measures</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/achieving-heights.jpg</image:loc><image:title>achieving heights</image:title></image:image><lastmod>2018-06-25T17:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/02/23/sherwood-applied-business-security-architecture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/sabsa.png</image:loc><image:title>SABSA</image:title></image:image><lastmod>2023-09-10T06:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/08/interview-with-yousef-syed-enterprise-security-architect/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/syed.jpg</image:loc><image:title>Syed</image:title></image:image><lastmod>2018-06-25T17:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/03/interview-with-daniel-schatz-director-for-threat-vulnerability-management/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/daniel.jpg</image:loc><image:title>Daniel</image:title></image:image><lastmod>2018-06-25T17:41:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/03/interview-with-javvad-malik-senior-analyst-at-451-research-and-a-blogger-at-www-j4vv4d-com/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/javvad.jpg</image:loc><image:title>Javvad</image:title></image:image><lastmod>2018-06-25T17:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/14/mo-amin-you-can-transform-technology-but-how-do-you-transform-people/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/mo1.jpg</image:loc><image:title>Mo</image:title></image:image><lastmod>2018-06-25T17:39:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/05/10/martin-ruskov-people-follow-examples-not-advice/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/05/martin.jpg</image:loc><image:title>Martin</image:title></image:image><lastmod>2018-06-25T17:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/02/interview-with-konrads-smelkovs-incident-response/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/konrads.jpg</image:loc><image:title>Konrads</image:title></image:image><lastmod>2018-06-25T17:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/04/cyber-insurance/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/id-100178628.jpg</image:loc><image:title>ID-100178628</image:title></image:image><lastmod>2018-06-25T17:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/11/04/how-can-playing-poker-teach-us-to-make-better-security-decisions/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/id-10058910.jpg</image:loc><image:title>ID-10058910</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/id-10042164.jpg</image:loc><image:title>ID-10042164</image:title></image:image><lastmod>2018-06-25T17:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2012/09/07/secure-coding-practices/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2012/09/workaround.jpg</image:loc><image:title>workaround</image:title></image:image><lastmod>2018-04-08T16:03:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/31/how-employees-react-to-security-policies/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/8205162689_345cce5b75_o.jpg</image:loc><image:title>8205162689_345cce5b75_o</image:title></image:image><lastmod>2017-09-02T12:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/05/26/presenting-at-the-it-security-forum/</loc><lastmod>2017-09-02T12:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/03/29/interview-for-the-issa-journal/</loc><lastmod>2017-09-02T12:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/09/02/ive-been-shortlisted-for-security-serious-unsung-hero-award/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/09/https-2f2fcdn-evbuc-com2fimages2f348329672f976773616112f12foriginal.jpg</image:loc><image:title>https-cdn.evbuc.comimages34832967976773616111original</image:title></image:image><lastmod>2017-09-02T12:55:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/08/30/hutzero-cyber-entrepreneur-bootcamp/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/09/hutzero.jpg</image:loc><image:title>HutZero</image:title></image:image><lastmod>2017-09-02T12:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2017/01/24/augusta-university/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2017/01/jsacacalog.png</image:loc><image:title>jsacacalog</image:title></image:image><lastmod>2017-09-02T12:54:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/11/10/21447/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/10/csu-long-beach.jpg</image:loc><image:title>CSU Long Beach</image:title></image:image><lastmod>2017-09-02T12:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/10/24/user-experience-design/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/10/9719949207_bcf69ec9fd_z.jpg</image:loc><image:title>9719949207_bcf69ec9fd_z</image:title></image:image><lastmod>2017-09-02T12:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/30/productive-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/12/500995147_5f56493a1e_z.jpg</image:loc><image:title>500995147_5f56493a1e_z</image:title></image:image><lastmod>2017-07-28T14:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/10/02/the-psychology-of-information-security-culture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/10/logo.png</image:loc><image:title>logo</image:title></image:image><lastmod>2016-10-21T15:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/10/06/21454/</loc><lastmod>2016-10-10T12:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/08/privacy/</loc><lastmod>2016-08-26T19:23:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/01/10/building-a-security-culture/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/5019746577_bcc1f481db_z.jpg</image:loc><image:title>5019746577_bcc1f481db_z</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/p-a-a.jpg</image:loc><image:title>P-A-A</image:title></image:image><lastmod>2016-08-15T14:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/01/07/the-root-causes-of-a-poor-security-culture-within-the-workplace/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/15542330623_c052788d46_z.jpg</image:loc><image:title>15542330623_c052788d46_z</image:title></image:image><lastmod>2016-08-10T08:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/01/03/security-and-usability/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/01/2141071329_9097e63c06_o.png</image:loc><image:title>2141071329_9097e63c06_o</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/3761609372_c3c05f4d08_z.jpg</image:loc><image:title>3761609372_c3c05f4d08_z</image:title></image:image><lastmod>2016-07-29T18:02:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/07/28/ive-been-interviewed-by-javvad-malik-about-my-career-in-infosec/</loc><lastmod>2016-07-28T15:22:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/07/25/pokemon-go-and-security-awareness/</loc><lastmod>2016-07-28T08:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/04/25/digital-decisions-understanding-behaviours-for-safer-cyber-environments/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/07/dart.png</image:loc><image:title>DART</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2016/04/2016-04-25-14-50.png</image:loc><image:title>2016-04-25 14.50</image:title></image:image><lastmod>2016-07-26T17:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/05/31/book-reviews/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/51enjkmw1ll-_sx322_bo1204203200_.jpg</image:loc><image:title>51enjkmw1ll-_sx322_bo1204203200_</image:title></image:image><lastmod>2016-07-26T17:49:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/12/12/playing-information-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/12/eop_game_screen_shot.jpg</image:loc><image:title>EoP_game_screen_shot</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/12/cards.jpg</image:loc><image:title>cards</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/privacy-card-back3-copy-1.jpg</image:loc><image:title>privacy-card-back3-copy-1</image:title></image:image><lastmod>2016-07-26T09:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/03/18/talking-to-phd-students-about-cyber-security/</loc><lastmod>2016-07-26T06:38:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/18/courses/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/screen-shot-2016-04-30-at-08-09-42.png</image:loc><image:title>Screen Shot 2016-04-30 at 08.09.42</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/screen-shot-2016-04-30-at-08-09-15.png</image:loc><image:title>Screen Shot 2016-04-30 at 08.09.15</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/09/speedometer.png</image:loc><image:title>speedometer</image:title></image:image><lastmod>2016-07-10T09:46:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/06/03/sc-awards-bsides-infosecurity-europe/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/06/bsides2015.jpg</image:loc><image:title>BSides2015</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/06/img_4721.jpg</image:loc><image:title>IMG_4721</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/06/cyber-academy-service-478x185.jpg</image:loc><image:title>cyber-academy-service-478x185</image:title></image:image><lastmod>2016-03-10T09:32:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/03/24/gamification-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/03/phil.jpg</image:loc><image:title>phil</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/03/hipaa.jpg</image:loc><image:title>hipaa</image:title></image:image><lastmod>2016-03-10T09:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2016/01/27/correlation-vs-causality/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/chart.jpeg</image:loc><image:title>chart</image:title></image:image><lastmod>2016-03-09T21:50:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/11/17/project-managers-toolkit/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/id-100248970.jpg</image:loc><image:title>ID-100248970</image:title></image:image><lastmod>2016-03-09T18:03:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/07/23/teaching-computer-science-in-uganda/</loc><lastmod>2016-02-14T09:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/08/governance-risk-and-compliance-in-the-cloud-project-with-bt/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/ctp-logo.jpg</image:loc><image:title>ctp-logo</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/cai_logo_clipped.jpg</image:loc><image:title>cai_logo_clipped</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/ccm-logo.jpg</image:loc><image:title>ccm-logo</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/cloudaudit_logo.jpg</image:loc><image:title>cloudaudit_logo</image:title></image:image><lastmod>2016-02-14T09:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/10/10/cyber-wargaming-workshop-agenda/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/id-10071890.jpg</image:loc><image:title>ID-10071890</image:title></image:image><lastmod>2016-02-02T21:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/05/28/20838/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/2tx1qkfqzfo.jpg</image:loc><image:title>2Tx1qKFQzfo</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/v4ts8p5f_c0.jpg</image:loc><image:title>V4tS8p5F_C0</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/tulb7kjbazs.jpg</image:loc><image:title>tuLB7kjBazs</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/n0sayckzykm.jpg</image:loc><image:title>n0saycKzykM</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/ibhf452usk0.jpg</image:loc><image:title>IbHF452Usk0</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/05/b5nli4noeg4.jpg</image:loc><image:title>B5nli4NoEG4</image:title></image:image><lastmod>2016-02-01T19:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/05/17/global-industrial-cyber-security-professional-gicsp/</loc><lastmod>2016-01-31T18:16:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/05/12/application-security-project/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/id-1008705.jpg</image:loc><image:title>ID-1008705</image:title></image:image><lastmod>2016-01-30T17:59:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/09/03/removing-unused-firewall-rules/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/id-100234172.jpg</image:loc><image:title>ID-100234172</image:title></image:image><lastmod>2016-01-29T21:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/04/09/database-security-project/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/10/id-100187848.jpg</image:loc><image:title>ID-100187848</image:title></image:image><lastmod>2016-01-28T21:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/12/20/talking-about-the-psychology-of-information-security-at-ucl/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/ucldark_0.jpg</image:loc><image:title>ucldark_0</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/present.jpg</image:loc><image:title>present</image:title></image:image><lastmod>2016-01-26T20:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/11/26/the-psychology-of-information-security-resolving-conflicts-between-security-compliance-and-human-behaviour/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/itgp.jpg</image:loc><image:title>ITGP</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/11/4736.jpg</image:loc><image:title>4736</image:title></image:image><lastmod>2016-01-21T22:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/01/04/nextsec-young-professionals-network/</loc><lastmod>2015-10-24T22:59:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/02/20/global-privacy-launch/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/iapp.jpg</image:loc><image:title>IAPP</image:title></image:image><lastmod>2015-10-20T16:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/01/understanding-the-attackers/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/know-your-enemy-practice.jpg</image:loc><image:title>know your enemy - practice</image:title></image:image><lastmod>2015-10-12T16:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/09/20/completed-my-kilimanjaro-trek-for-shelter/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/09/kili.jpg</image:loc><image:title>kili</image:title></image:image><lastmod>2015-10-11T09:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/20/116/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/uk-cyber.jpg</image:loc><image:title>UK cyber</image:title></image:image><lastmod>2015-05-21T16:29:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/03/02/921/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/ddos.jpg</image:loc><image:title>DDoS</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/breaches-21.jpg</image:loc><image:title>breaches 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/02/breaches.jpg</image:loc><image:title>Breaches</image:title></image:image><lastmod>2015-03-02T18:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/05/11/password-complexity/</loc><lastmod>2015-02-27T15:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2012/11/05/security-in-an-sap-system-environment/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/id-10024004.jpg</image:loc><image:title>ID-10024004</image:title></image:image><lastmod>2015-02-26T15:54:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/01/30/pci-data-security-standards-rock/</loc><lastmod>2015-02-11T10:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/06/30/reachout-mentoring-charity-project/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/06/sam_4908.jpg</image:loc><image:title>SAM_4908</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/06/sam_4891.jpg</image:loc><image:title>SAM_4891</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/06/logo.png</image:loc><image:title>logo</image:title></image:image><lastmod>2015-02-10T21:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/03/modern-security-professionals-while-fighting-cyber-threats-also-have-to-take-human-behaviour-into-account/</loc><lastmod>2015-02-04T07:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/12/the-changing-face-of-cyber-security-nextsec-event/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/speakers1.jpg</image:loc><image:title>speakers</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/speakers.jpg</image:loc><image:title>speakers</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/nextsec_ey.png</image:loc><image:title>NextSec_EY</image:title></image:image><lastmod>2015-01-28T11:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2015/01/12/training-offshore-teams/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/01/img_20150106_163908.jpg</image:loc><image:title>IMG_20150106_163908</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2015/01/img_20150105_195112-copy.jpg</image:loc><image:title>IMG_20150105_195112 copy</image:title></image:image><lastmod>2015-01-23T17:54:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/08/security-for-the-energy-sector/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/nextsec.jpg</image:loc><image:title>nextsec</image:title></image:image><lastmod>2015-01-21T22:12:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/09/comparing-views-on-security-compliance-behaviour-in-an-organisation/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/frequency.png</image:loc><image:title>frequency</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/violations.png</image:loc><image:title>violations</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/instances.png</image:loc><image:title>Instances</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/degree.png</image:loc><image:title>Degree</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/impact.png</image:loc><image:title>Impact</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/time.png</image:loc><image:title>time</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/effectivness.png</image:loc><image:title>Effectivness</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/attitude.png</image:loc><image:title>Attitude</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/distribution.png</image:loc><image:title>Distribution</image:title></image:image><lastmod>2015-01-21T22:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/12/the-internet-of-things/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/iot.jpg</image:loc><image:title>IoT</image:title></image:image><lastmod>2014-12-24T10:14:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/12/giving-a-talk-on-human-aspects-of-information-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/met.jpg</image:loc><image:title>Met</image:title></image:image><lastmod>2014-12-23T16:46:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/11/12/thoughts-on-voice-biometric-authentication/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/11/id-10041381.jpg</image:loc><image:title>ID-10041381</image:title></image:image><lastmod>2014-12-22T11:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/09/active-listening/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/id-100256894.jpg</image:loc><image:title>ID-100256894</image:title></image:image><lastmod>2014-12-22T10:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/12/02/delivering-a-lecture-on-human-aspects-of-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/img_20141202_205259.jpg</image:loc><image:title>IMG_20141202_205259</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/12/img_20141202_205219.jpg</image:loc><image:title>IMG_20141202_205219</image:title></image:image><lastmod>2014-12-20T21:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/11/17/knowledge-management/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/id-100231391.jpg</image:loc><image:title>ID-100231391</image:title></image:image><lastmod>2014-12-19T10:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/06/28/teaching-information-security-concepts-course-at-kpmg/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/07/kpmg1.jpg</image:loc><image:title>KPMG1</image:title></image:image><lastmod>2014-12-18T16:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/11/24/a-trip-to-bletchley-park/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/img_3807.jpg</image:loc><image:title>IMG_3807</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/img_3803.jpg</image:loc><image:title>IMG_3803</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/img_3808.jpg</image:loc><image:title>IMG_3808</image:title></image:image><lastmod>2014-12-18T10:03:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/11/13/presenting-at-the-isaca-london-chapter-event/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/11/goal.png</image:loc><image:title>Goal</image:title></image:image><lastmod>2014-12-17T15:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/11/delivering-a-seminar-at-the-it-security-computer-forensics-pedagogy-workshop/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/higher-edu.jpg</image:loc><image:title>HIGHER EDU</image:title></image:image><lastmod>2014-11-29T23:11:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/31/developing-your-security-team/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_2039.jpg</image:loc><image:title>IMG_2039</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/teamwork-and-securtiy-exercise-as-a-distraction.jpg</image:loc><image:title>teamwork and securtiy - exercise as a distraction</image:title></image:image><lastmod>2014-11-14T11:55:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/01/preventing-insider-attacks/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/triangle.png</image:loc><image:title>triangle</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/merit.png</image:loc><image:title>MERIT</image:title></image:image><lastmod>2014-11-12T07:56:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/06/20/121/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/06/bipum0mcmaecivc.jpg</image:loc><image:title>BIpuM0MCMAEciVc</image:title></image:image><lastmod>2014-11-08T10:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/14/the-changing-face-of-cyber-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/nextsec.png</image:loc><image:title>NextSec</image:title></image:image><lastmod>2014-11-08T10:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/26/security-project-planning/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/fog-and-planning.jpg</image:loc><image:title>fog and planning</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/fog-and-planning-2.jpg</image:loc><image:title>fog and planning 2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/plan.png</image:loc><image:title>Plan</image:title></image:image><lastmod>2014-10-27T10:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/17/ucl-it-and-technology-careers-fair/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_4243.jpg</image:loc><image:title>IMG_4243</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/ucl-engineering-logo_basic_trans.png</image:loc><image:title>UCL</image:title></image:image><lastmod>2014-10-26T12:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/10/methodology-of-research-study/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/img_1481.jpg</image:loc><image:title>IMG_1481</image:title></image:image><lastmod>2014-10-25T16:44:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/24/the-analogies-project/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/the-analogies-project-presnetation-logo.png</image:loc><image:title>The-Analogies-Project-Presnetation-Logo</image:title></image:image><lastmod>2014-10-24T14:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/21/discussing-ethical-hacking-at-the-university-of-bradford/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/bradford2.jpg</image:loc><image:title>Bradford</image:title></image:image><lastmod>2014-10-23T09:14:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/08/cyber-security-expo/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_4264.jpg</image:loc><image:title>bruce1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_4262.jpg</image:loc><image:title>bruce</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_4255.jpg</image:loc><image:title>expo2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/img_4284.jpg</image:loc><image:title>expo1</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/images.jpeg</image:loc><image:title>Expo</image:title></image:image><lastmod>2014-10-09T16:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/09/22/how-will-technology-transform-future-business/</loc><lastmod>2022-06-05T00:31:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/10/03/benefits-tracking/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/10/benefits.jpg</image:loc><image:title>Benefits</image:title></image:image><lastmod>2014-10-03T16:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/09/29/nextsec-2014-cyber-security-and-technology-careers-fair/</loc><lastmod>2014-10-06T06:22:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/15/181/</loc><lastmod>2014-07-22T20:16:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/02/19/300/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/east-london-small.png</image:loc><image:title>East London small</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/poster.jpg</image:loc><image:title>Poster</image:title></image:image><lastmod>2014-07-22T20:16:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/03/risks-to-risk-management/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/risk_thermostat.png</image:loc><image:title>risk_thermostat</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/three_kinds_or_risk.png</image:loc><image:title>three_kinds_or_risk</image:title></image:image><lastmod>2014-07-22T20:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/06/11/discussing-social-aspects-of-information-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/06/june-11-1.jpg</image:loc><image:title>June 11 (1)</image:title></image:image><lastmod>2014-07-22T20:09:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/06/15/534/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/06/id-100235520.jpg</image:loc><image:title>ID-100235520</image:title></image:image><lastmod>2014-07-22T06:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/05/21/cyber-security-open-evening/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/05/kpmg1.jpg</image:loc><image:title>kpmg1</image:title></image:image><lastmod>2014-07-17T21:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/06/10/thom-langford/</loc><lastmod>2014-07-17T13:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/05/29/managing-the-cyber-threat-insights-from-senior-leaders/</loc><lastmod>2014-06-10T19:39:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/05/07/399/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/rig-1.jpg</image:loc><image:title>RIG (1)</image:title></image:image><lastmod>2014-06-06T22:09:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/04/02/managing-risk-on-security-related-projects/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/04/risk.png</image:loc><image:title>risk</image:title></image:image><lastmod>2014-04-02T20:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/26/discussing-industrial-control-systems-security-at-the-university-of-westminster/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/scada-westminster.jpg</image:loc><image:title>SCADA WESTMINSTER</image:title></image:image><lastmod>2014-03-26T20:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2012/10/06/information-systems-auditing/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/id-10031899.jpg</image:loc><image:title>ID-10031899</image:title></image:image><lastmod>2014-03-22T19:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/04/03/pci-dss-compliance-in-a-cloud-computing-environment-part-3/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/cloudresponsibility.png</image:loc><image:title>cloud{responsibility</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/cloud_scheme_app.png</image:loc><image:title>cloud_scheme_app</image:title></image:image><lastmod>2014-03-22T19:11:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/03/02/pci-dss-compliance-in-a-cloud-computing-environment-part-2/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/nist_cloud1.png</image:loc><image:title>NIST_cloud</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/nist_cloud.png</image:loc><image:title>NIST_cloud</image:title></image:image><lastmod>2014-03-22T19:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/02/01/pci-dss-compliance-in-a-cloud-computing-environment-part-1/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/system.png</image:loc><image:title>system</image:title></image:image><lastmod>2014-03-22T19:10:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/01/11/penetration-testers-toolkit/</loc><lastmod>2014-03-22T19:09:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2012/12/30/public-speaking/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/id-100217406.jpg</image:loc><image:title>ID-100217406</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/04/speak.jpg</image:loc><image:title>speak</image:title></image:image><lastmod>2014-03-22T19:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/19/career-paths-and-skills-development-for-security-professionals/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/career.png</image:loc><image:title>career</image:title></image:image><lastmod>2014-03-19T21:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/18/managing-stakeholders-and-communication-on-security-related-projects/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/communication.png</image:loc><image:title>communication</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/stakeholder.png</image:loc><image:title>stakeholder</image:title></image:image><lastmod>2014-03-18T21:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/08/giving-a-seminar-at-the-university-of-greenwich/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/presentation.png</image:loc><image:title>presentation</image:title></image:image><lastmod>2014-03-17T19:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/02/14/improve-your-teams-productivity/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/id-10050274.jpg</image:loc><image:title>ID-10050274</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/id-10057166.jpg</image:loc><image:title>ID-10057166</image:title></image:image><lastmod>2014-03-08T18:55:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/01/20/an-introduction-to-industrial-control-systems-security/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/id-100188477.jpg</image:loc><image:title>ID-100188477</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/scada.png</image:loc><image:title>scada</image:title></image:image><lastmod>2014-03-08T12:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/01/22/225/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/architecture.png</image:loc><image:title>architecture</image:title></image:image><lastmod>2014-03-08T12:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/01/23/an-introduction-to-industrial-control-systems-security-part-iii-auditing-the-environment/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/ict.jpg</image:loc><image:title>ICT</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/modbus.jpg</image:loc><image:title>modbus</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/mob2.jpg</image:loc><image:title>mob2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/01/kep.jpg</image:loc><image:title>KEP</image:title></image:image><lastmod>2014-03-08T12:18:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/03/02/nextsec-information-security-conference-2014/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/03/id-100204342.jpg</image:loc><image:title>ID-100204342</image:title></image:image><lastmod>2014-03-02T14:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2014/02/15/tracking-the-progress-of-an-information-security-related-project/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/track2.png</image:loc><image:title>track2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2014/02/track1.png</image:loc><image:title>track1</image:title></image:image><lastmod>2014-02-15T21:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/02/msc-information-security-thesis-abstract/</loc><lastmod>2014-02-15T20:40:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/10/information-security-policy-compliance-business-processes-and-human-behaviour/</loc><lastmod>2013-09-13T18:48:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/08/security-compliance-behaviour-conflicts-resolution-model/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/total.png</image:loc><image:title>total</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/scheduled.png</image:loc><image:title>scheduled</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/manual.png</image:loc><image:title>manual</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/main_bp.png</image:loc><image:title>main_BP</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/process.png</image:loc><image:title>process</image:title></image:image><lastmod>2013-09-13T18:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/07/security-policy-compliance-bahaviour-case-study/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/bp_total.png</image:loc><image:title>BP_total</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/orgchart.png</image:loc><image:title>Orgchart</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/bp.png</image:loc><image:title>BP</image:title></image:image><lastmod>2013-09-13T18:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/09/05/msc-information-security-research-project-overview-of-the-methods-and-materials/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/09/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2013-09-13T18:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/08/30/modelling-conflicts-between-information-security-compliance-and-behaviour/</loc><lastmod>2013-09-13T18:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/10/cryptography/</loc><image:image><image:loc>https://zinatullin.com/wp-content/uploads/2013/05/cryptomindmap13-58-04.png</image:loc><image:title>crypto=mindmap13.58.04</image:title></image:image><lastmod>2013-09-13T18:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com/2013/05/09/cloud-computing-security-a-brief-overview-of-threats-vulnerabilities-and-countermeasures/</loc><lastmod>2013-09-13T18:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zinatullin.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-28T04:29:54+00:00</lastmod></url></urlset>
