<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://dev.inversion6.com/contact</loc><lastmod>2025-07-25T16:41:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/thank-you</loc><lastmod>2023-05-05T15:26:25+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/thank-you/thank-you-for-subscribing</loc><lastmod>2022-06-10T02:03:25+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/terms-conditions</loc><lastmod>2025-07-22T14:04:42+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/careers</loc><lastmod>2025-07-25T16:19:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/cookie-management-policy</loc><lastmod>2025-07-25T16:41:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/privacy-policy</loc><lastmod>2023-08-31T20:12:03+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/sitemap</loc><lastmod>2025-07-28T18:47:06+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/schedule-a-call</loc><lastmod>2025-07-25T17:02:42+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/ftc-safeguards-compliance</loc><lastmod>2025-07-23T17:48:32+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/compliance-and-safeguards</loc><lastmod>2025-07-23T17:49:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/autonomous-penetration-testing</loc><lastmod>2025-10-22T19:46:33+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/thank-you/cleveland-security-showcase-thank-you</loc><lastmod>2024-08-16T19:53:49+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/emergency-incident-response</loc><lastmod>2025-07-25T16:42:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/events/march-maddness</loc><lastmod>2025-06-23T17:59:44+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/partners</loc><lastmod>2025-07-22T20:43:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/assessments</loc><lastmod>2025-07-25T16:36:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/home-old-3914dde6651643bccb9f5e53830a6d5f/industry-page-banking</loc><lastmod>2026-03-31T18:42:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity</loc><lastmod>2025-10-27T16:27:05+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-detection-response</loc><lastmod>2025-11-04T18:40:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions</loc><lastmod>2025-07-25T19:30:27+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/extended-detection-and-response</loc><lastmod>2025-10-27T15:07:13+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/application-security</loc><lastmod>2025-07-24T19:33:45+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/fractional-cio</loc><lastmod>2025-07-23T17:46:29+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-siem</loc><lastmod>2025-07-25T08:11:04+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/risk-assessment</loc><lastmod>2025-07-23T17:47:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/cmmc-compliance</loc><lastmod>2025-07-24T19:32:15+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/tabletop-exercises</loc><lastmod>2025-07-23T17:48:05+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/dark-web</loc><lastmod>2025-07-23T17:47:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/about-inversion6</loc><lastmod>2026-05-08T07:16:49+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/</loc><lastmod>2026-04-23T17:44:00+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/partners/security</loc><lastmod>2025-07-25T13:26:27+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/partners/network</loc><lastmod>2025-07-25T13:34:20+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/partners/storage</loc><lastmod>2025-07-25T13:35:32+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/ciso-solutions/microsoft-security</loc><lastmod>2025-07-25T13:26:03+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-mobile-edr</loc><lastmod>2025-11-04T18:38:11+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/incident-response</loc><lastmod>2026-03-25T19:33:54+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/third-party-risk-management</loc><lastmod>2025-07-25T13:20:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/example-widgets</loc><lastmod>2025-06-23T18:30:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/example-widgets/partners-carousel</loc><lastmod>2025-06-30T19:21:09+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/example-widgets/flip-cards-rectangular</loc><lastmod>2025-07-02T16:46:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/example-widgets/example-accordion</loc><lastmod>2025-07-24T17:35:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/home-test</loc><lastmod>2025-07-28T18:00:56+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-detection-response_new</loc><lastmod>2025-10-22T13:14:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-cybersecurity-solutions</loc><lastmod>2025-10-20T19:25:49+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/managed-cybersecurity/managed-mobile-edr-new</loc><lastmod>2025-10-23T18:45:44+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/fresh-soc</loc><lastmod>2025-10-28T14:16:08+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/icon-grid</loc><lastmod>2025-10-22T17:53:20+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/banking-cybersecurity-services</loc><lastmod>2026-04-08T18:46:39+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/manufacturing-cybersecurity-services</loc><lastmod>2026-04-08T18:56:57+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/legal-cybersecurity-services</loc><lastmod>2026-04-08T19:55:11+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/healthcare-cybersecurity-services</loc><lastmod>2026-04-08T19:12:05+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/banking-cybersecurity-services-6056af33d8175d5440cab999da5708e5</loc><lastmod>2026-05-07T13:46:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mrk-technologies-named-attivo-networks’-north-american-partner-of-the-year-2nd-year-in-a-row</loc><lastmod>2025-08-07T17:26:01+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mrk-technologies-named-inaugural-partner-of-the-year-by-abnormal-security</loc><lastmod>2025-08-07T17:26:01+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/security-in-devops-aligning-operations-and-security-for-better-results</loc><lastmod>2025-08-07T17:26:21+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-top-5-office-365-security-best-practices-for-your-network</loc><lastmod>2025-08-07T17:26:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/2019’s-cybersecurity-threats-and-vulnerabilities-are-still-here</loc><lastmod>2025-08-07T17:26:18+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-social-engineering-cyber-attacks-work</loc><lastmod>2025-08-07T17:26:23+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/holiday-phishing-scams-to-watch-out-for</loc><lastmod>2025-08-07T17:26:23+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/holiday-cybersecurity-are-you-prepared-for-these-common-attacks</loc><lastmod>2025-08-07T17:26:24+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/do-small-organizations-have-cisos</loc><lastmod>2025-08-07T17:26:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-importance-of-m-a-cybersecurity-in-company-acquisitions</loc><lastmod>2025-08-07T17:26:17+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/six-considerations-for-acquisition-cybersecurity-success</loc><lastmod>2025-08-07T17:26:17+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/promoting-cybersecurity-as-covid-19-develops</loc><lastmod>2025-08-07T17:26:15+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/four-cyber-attack-vectors-to-watch-for-with-covid-19</loc><lastmod>2025-08-07T17:26:13+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/soc-2-type-2-certification-understanding-the-process</loc><lastmod>2025-08-07T17:26:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/5-tips-for-hardening-microsoft-teams-security</loc><lastmod>2025-08-07T17:26:11+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-you-should-use-multi-factor-authentication-solutions-for-office-365</loc><lastmod>2025-08-07T17:26:42+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/addressing-the-cybersecurity-workforce-shortage</loc><lastmod>2025-08-07T17:26:08+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-is-office-365-conditional-access</loc><lastmod>2025-08-07T17:26:42+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-combat-5-common-healthcare-cybersecurity-challenges</loc><lastmod>2025-08-07T17:26:06+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mrk-honored-the-attivo-networks-north-america-partner-of-the-year”</loc><lastmod>2025-08-07T17:26:09+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-ir-plan-a-proactive-first-step-toward-organization-security</loc><lastmod>2025-08-07T17:26:43+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cloud-security-solutions-to-keep-your-information-protected</loc><lastmod>2025-08-07T17:26:07+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/should-you-hire-a-ciso-in-house-or-use-a-ciso-for-hire</loc><lastmod>2025-08-07T17:26:43+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-you-need-a-cmmc-registered-practitioner</loc><lastmod>2025-08-07T17:26:08+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/inversion6-technologies-welcomes-christopher-prewitt-to-the-team</loc><lastmod>2025-08-07T17:26:05+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-you-need-to-know-about-cmmc-2-0-changes</loc><lastmod>2025-08-07T17:26:05+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/inversion6-technologies-receives-2021-logrhythm-regional-partner-of-the-year-award</loc><lastmod>2025-08-07T17:26:03+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what’s-an-incident-response-tabletop-exercise-and-how-can-it-help-keep-your-company-secure</loc><lastmod>2025-08-07T17:26:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-protect-your-business-against-rising-cybersecurity-risks-of-the-russia-ukraine-conflict</loc><lastmod>2025-08-07T17:26:04+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/scenarios-for-an-incident-response-tabletop-exercise</loc><lastmod>2025-08-07T17:26:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/examining-the-cyber-insurance-market</loc><lastmod>2025-08-07T17:26:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-you-need-to-know-about-the-2022-mitre-engenuity-att-ck-evaluations</loc><lastmod>2025-08-07T17:25:53+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/here’s-how-to-run-a-tabletop-exercise</loc><lastmod>2025-08-07T17:26:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/is-your-business-susceptible-to-social-engineering-attacks-fbi-says-yes</loc><lastmod>2025-08-07T17:25:55+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/inversion6-technologies-adds-new-autonomous-penetration-tests-to-managed-security-services-offering</loc><lastmod>2025-08-07T17:25:56+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-pivot-from-passive-to-proactive-pentesting</loc><lastmod>2025-08-07T17:25:58+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-makes-a-good-security-metric</loc><lastmod>2025-08-07T17:26:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/building-a-successful-and-sustainable-it-security-program</loc><lastmod>2025-08-07T17:25:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-every-business-needs-a-cybersecurity-risk-assessment</loc><lastmod>2025-08-07T17:25:51+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-report-information-security-metrics</loc><lastmod>2025-08-07T17:26:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-you-can-use-devops-to-make-you-more-secure</loc><lastmod>2025-08-07T17:26:24+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-is-your-security-program-performing</loc><lastmod>2025-08-07T17:26:39+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/reporting-security-to-the-board-here-are-4-steps-to-help-you-prepare</loc><lastmod>2025-08-07T17:26:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/five-cost-effective-information-security-solutions-when-the-budget-isn’t-there</loc><lastmod>2025-08-07T17:26:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/wondering-how-to-prepare-for-a-ransomware-attack-here-are-3-steps</loc><lastmod>2025-08-07T17:26:33+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-you-can-protect-your-company-after-a-ransomware-attack</loc><lastmod>2025-08-07T17:26:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/ransomware-what-it-is-and-how-to-prevent-it</loc><lastmod>2025-08-07T17:26:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/vendor-management-challenges-what-to-know-for-the-future</loc><lastmod>2025-08-07T17:26:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/six-vendor-management-best-practices-for-successful-third-party-relationships</loc><lastmod>2025-08-07T17:26:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-vendor-management-questionnaires-need-to-be-more-efficient</loc><lastmod>2025-08-07T17:26:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/identity-based-security-best-practices-for-protecting-your-users-and-customers</loc><lastmod>2025-08-07T17:26:31+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/it’s-time-to-be-proactive-with-it-security-administration</loc><lastmod>2025-08-07T17:26:32+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/3-password-policy-best-practice-solutions-you-need-right-now</loc><lastmod>2025-08-07T17:26:32+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/best-practices-for-a-successful-it-ot-convergence-strategy</loc><lastmod>2025-08-07T17:26:28+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-challenges-of-iot-security-in-manufacturing</loc><lastmod>2025-08-07T17:26:28+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-cyber-risk-for-manufacturing-that-many-don’t-consider</loc><lastmod>2025-08-07T17:26:29+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/threat-hunting-identifying-and-resolving-cyber-vulnerabilities</loc><lastmod>2025-08-07T17:26:26+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/understanding-entity-and-user-behavior-analytics-for-security</loc><lastmod>2025-08-07T17:26:26+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/east-west-traffic-security-best-practices</loc><lastmod>2025-08-07T17:26:26+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/understanding-the-key-benefits-of-devsecops</loc><lastmod>2025-08-07T17:26:25+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/zscaler-ams-central-partner-of-the-year-award</loc><lastmod>2025-08-07T17:26:29+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mrk-technologies-announces-partnership-with-logrhythym</loc><lastmod>2025-08-07T17:26:27+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mrk-technologies-rebrands-to-inversion6</loc><lastmod>2025-08-07T17:25:50+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/iso-27001-changes</loc><lastmod>2025-08-07T17:25:52+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/verizon-dbir-2022-what’s-worth-acting-on</loc><lastmod>2025-08-07T17:25:50+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/pci-dss-v4</loc><lastmod>2025-08-07T17:58:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/if-cyber-insurance-is-step-two-what-s-step-one</loc><lastmod>2025-08-07T17:58:33+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-you-should-begin-the-cmmc-certification-process-now</loc><lastmod>2025-08-07T17:58:51+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/don’t-overlook-the-need-for-a-microsoft-365-security-assessment</loc><lastmod>2025-08-07T17:25:49+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/lean-into-cybersecurity-awareness-month-with-these-two-key-tips</loc><lastmod>2025-08-07T17:25:47+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-awareness-month-what-inversion6’s-experts-have-to-say</loc><lastmod>2025-08-07T17:25:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/ot-technology-security</loc><lastmod>2025-08-07T17:25:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cyber-trends-what-inversion6s-expert-have-to-say</loc><lastmod>2025-08-07T17:25:46+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-predictions-for-2023-what-inversion6s-experts-have-to-say</loc><lastmod>2025-08-07T17:25:47+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/understanding-cloud-security-demands-challenging-assumptions</loc><lastmod>2025-08-07T17:25:46+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/december-2023/christopher-prewitt-named-crains-notable-exec-in-technology</loc><lastmod>2025-07-25T18:10:33+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-soc-2-compliance-for-startups-is-critical</loc><lastmod>2025-08-07T17:25:44+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cyber-insurance-requirements-timely-considerations-for-cfos</loc><lastmod>2025-08-07T17:25:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/5-things-ceos-should-know-about-security</loc><lastmod>2025-08-07T17:25:42+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/5-ways-legal-and-cybersecurity-teams-should-collaborate</loc><lastmod>2025-08-07T17:25:43+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-a-managed-security-service-provider-mssp-for-small-business-is-essential</loc><lastmod>2025-08-07T17:25:45+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-support-services</loc><lastmod>2025-08-07T17:25:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/evolving-role-of-the-cio</loc><lastmod>2025-08-07T17:25:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/outlining-the-cmmc-certification-process</loc><lastmod>2025-08-07T17:25:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/advanced-malware-protection</loc><lastmod>2025-08-07T17:25:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/expanding-the-role-of-the-cio-in-ot</loc><lastmod>2025-08-07T17:25:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/saas-security-challenges</loc><lastmod>2025-08-07T17:25:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/june-2023/inversion6-welcomes-craig-burland-to-the-team</loc><lastmod>2025-07-25T18:07:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/june-2023/inversion6-welcomes-damir-brescic</loc><lastmod>2025-07-25T18:03:57+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/5-free-ways-to-leverage-office-365-for-security</loc><lastmod>2025-08-07T17:25:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/add-defensive-layers-with-email-security-software</loc><lastmod>2025-08-07T17:25:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-role-of-deception-based-security-in-risk-mitigation</loc><lastmod>2025-08-07T17:25:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/security-compliance-for-startups</loc><lastmod>2025-08-07T17:25:15+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cyberattack-prevention</loc><lastmod>2025-08-07T17:25:16+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/protecting-your-data-in-a-multi-cloud-environment</loc><lastmod>2025-08-07T17:25:21+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/ransomware-readiness-assessment</loc><lastmod>2025-08-07T17:25:25+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/a-guide-to-cloud-centric-cybersecurity</loc><lastmod>2025-08-07T17:25:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/advantages-of-fractional-ciso-services</loc><lastmod>2025-08-07T17:25:04+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/staying-ahead-of-regulations-with-unstructured-data-management</loc><lastmod>2025-08-07T17:25:06+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/understand-cybersecurity-frameworks</loc><lastmod>2025-08-07T17:24:56+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-benefits-of-managed-cybersecurity-services</loc><lastmod>2025-08-07T17:24:56+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/the-foundation-of-a-solid-cybersecurity-program</loc><lastmod>2025-08-07T17:24:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/exploring-the-results-from-the-2023-mitre-att-ck-testing</loc><lastmod>2025-08-07T17:25:00+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/solving-common-manufacturing-security-issues</loc><lastmod>2025-08-07T17:24:53+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/network-security-best-practices-for-small-enterprises</loc><lastmod>2025-08-07T17:24:55+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-xdr-protection-secures-your-entire-digital-landscape</loc><lastmod>2025-08-07T17:24:55+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/ai-and-cyber-security-101</loc><lastmod>2025-07-21T16:54:45+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/tackle-cmmc-2-0-compliance-now</loc><lastmod>2025-08-07T17:24:52+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/preemptive-protection-with-dark-web-threat</loc><lastmod>2025-08-07T17:24:53+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/top-cybersecurity-trends-of-2023</loc><lastmod>2025-08-07T17:24:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/leveraging-ai-and-automation-for-a-more-efficient-security-team</loc><lastmod>2025-08-07T17:24:49+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cloud-vulnerability-management</loc><lastmod>2025-08-07T17:24:50+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/unpacking-the-new-sec-cybersecurity-disclosure-requirements</loc><lastmod>2025-08-07T17:24:47+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-is-autonomous-penetration-testing-as-a-service</loc><lastmod>2025-08-07T17:24:47+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-you-need-to-know-about-zero-day-attacks-and-prevention-strategies</loc><lastmod>2025-08-07T17:24:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/leveraging-the-microsoft-stack-for-security</loc><lastmod>2025-08-07T17:24:46+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/patch-management-best-practices</loc><lastmod>2025-08-07T17:43:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/microsoft-sentinel-for-siem</loc><lastmod>2025-08-07T17:43:54+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/march-2024/inversion6-welcomes-tom-siu-to-the-team</loc><lastmod>2024-03-28T09:30:51+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/nist-cybersecurity-framework-2-0-what-you-need-to-know</loc><lastmod>2025-08-07T17:43:23+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-you-should-know-about-risk-based-vulnerability-management</loc><lastmod>2025-08-07T17:24:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/automated-intelligence-ai-its-about-the-fundamentals</loc><lastmod>2025-08-07T17:24:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/everything-you-need-for-a-solid-​incident-response-plan</loc><lastmod>2025-08-07T17:24:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-to-look-for-in-an-mssp</loc><lastmod>2025-08-07T17:24:35+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/iso-27001-and-soc-2-which-is-right-for-you</loc><lastmod>2025-08-07T17:24:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/your-next-shift-moving-between-cybersecurity-and-cyber-resilience</loc><lastmod>2025-08-07T17:24:39+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-outsourcing-cybersecurity-could-make-sense-for-your-business</loc><lastmod>2025-08-07T17:24:31+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cmmc-compliance-deadline-are-you-prepared</loc><lastmod>2025-08-07T17:40:20+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/understanding-the-pillars-of-a-comprehensive-outsourced-cybersecurity-program</loc><lastmod>2025-08-07T17:40:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/changing-mindset-it’s-beyond-time-to-embrace-a-cyber-resilience-framework</loc><lastmod>2025-08-07T17:41:04+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/uncover-the-benefits-of-a-vendor-rationalization-plan</loc><lastmod>2025-08-07T17:41:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-attack-surface-analysis-in-cloud-environments-is-essential</loc><lastmod>2025-08-07T17:41:24+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/strategic-cybersecurity-budgeting-for-2025</loc><lastmod>2025-08-07T17:24:16+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-do-penetration-testing-the-benefits-of-outsourcing</loc><lastmod>2025-08-07T17:24:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/if-you’re-building-security-operations-center-in-house-consider-this</loc><lastmod>2025-08-07T17:24:22+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-to-craft-an-effective-cybersecurity-tabletop-exercise</loc><lastmod>2025-08-07T17:24:23+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/september-2024/trg-inversion6-integration</loc><lastmod>2025-07-25T18:02:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/how-csint-and-osint-techniques-enhance-soc-operations-for-improved-security-decisions</loc><lastmod>2025-08-07T17:24:08+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/identity-threat-protection-in-zero-trust-architecture</loc><lastmod>2025-08-07T17:24:12+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/building-a-cybersecurity-culture-protecting-your-business-from-the-inside-out</loc><lastmod>2025-08-07T17:24:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/examining-the-rising-demand-for-fractional-cio-services</loc><lastmod>2025-08-07T17:23:56+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/improving-vulnerability-management-with-application-security-posture-management</loc><lastmod>2025-08-07T17:23:57+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/a-guide-to-cyber-essentials-and-nis2-compliance-for-global-organizations</loc><lastmod>2025-08-07T17:23:57+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/november-2024/inversion6-welcomes-ian-thornton-trump-to-the-team</loc><lastmod>2024-11-18T16:45:27+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/don-t-dismiss-your-ot-security-a-guide-to-protecting-operational-technology</loc><lastmod>2025-08-07T17:23:51+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/siem-vs-soar-why-modern-security-operations-need-both</loc><lastmod>2025-08-07T17:23:54+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/january-2025/incident-response-services</loc><lastmod>2025-01-21T13:03:50+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/microsoft-quick-assist-an-it-security-primer</loc><lastmod>2025-07-31T18:52:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-everybody-needs-an-incident-response-strategy</loc><lastmod>2025-02-26T15:49:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-third-party-risk-management-matters</loc><lastmod>2025-03-25T20:25:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/do-you-really-need-an-ir-retainer</loc><lastmod>2025-03-25T20:44:29+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/mastering-cyber-compliance</loc><lastmod>2025-04-08T19:23:15+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/6-steps-for-facing-any-security-incident</loc><lastmod>2025-04-28T17:37:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/outsmarting-your-cyber-threats-the-case-for-fractional-cisos-in-higher-ed</loc><lastmod>2025-04-28T17:41:11+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/6-steps-for-managing-the-business-risks-of-ai</loc><lastmod>2025-05-21T14:35:06+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/when-hackers-hit-high-street</loc><lastmod>2025-06-09T13:19:20+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/adversarial-ai-is-supercharging-the-threat-landscape</loc><lastmod>2025-07-25T17:56:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/5-practical-lessons-from-the-latest-microsoft-digital-defense-report</loc><lastmod>2025-07-25T19:00:29+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/what-microsofts-unified-xdr-portal-means-for-modern-security-teams</loc><lastmod>2025-08-20T19:35:57+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-outside-the-box-2ac12e0b0ff9b961acb28b3e4ff42fe0</loc><lastmod>2025-07-25T19:13:39+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-soc2-should-be-a-priority-e8e53b06220bc2df6cef64f5532cafb2</loc><lastmod>2025-07-09T20:28:16+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/test-blog</loc><lastmod>2025-07-23T13:21:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-is-not-a-cost-center</loc><lastmod>2025-07-28T12:56:18+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/honeypot-tales-case-of-the-missing-triage-collection</loc><lastmod>2025-09-02T14:38:16+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/hot-takes-from-black-hat-2025</loc><lastmod>2025-08-25T20:57:58+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/honeypot-tales-edr-that-just-wouldnt-die</loc><lastmod>2025-09-02T15:01:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/whos-defending-microsoft-defender</loc><lastmod>2025-09-02T15:17:38+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-third-party-risk-management-is-mandatory</loc><lastmod>2025-09-02T15:26:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/why-third-party-risk-management-is-mandatory-709ab22b1e7f607fe02242da1bb9423d</loc><lastmod>2025-09-02T15:32:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/case-study-title-goes-here-2</loc><lastmod>2025-09-11T18:35:16+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/case-study-title-goes-here</loc><lastmod>2025-09-11T18:35:21+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/case-study-title-goes-here-no-audio</loc><lastmod>2025-09-11T18:35:32+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/introducing-inversion6-mdr</loc><lastmod>2025-11-11T18:26:23+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/compliance-101</loc><lastmod>2025-11-11T18:26:37+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news/inversion6-soc-launch</loc><lastmod>2025-10-31T15:43:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/cybersecurity-trends-2026</loc><lastmod>2026-05-01T18:08:30+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog/handala-threat-brief</loc><lastmod>2026-03-26T15:52:58+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights</loc><lastmod>2025-08-07T16:39:00+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/blog</loc><lastmod>2025-07-22T13:57:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/events</loc><lastmod>2025-07-22T13:57:41+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies</loc><lastmod>2025-07-25T16:50:20+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars</loc><lastmod>2025-07-25T17:02:19+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks</loc><lastmod>2025-07-22T13:58:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/news</loc><lastmod>2025-07-22T13:59:40+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/am-law-100-law-firm</loc><lastmod>2025-06-23T16:58:58+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/healthcare-cybersecurity-program</loc><lastmod>2025-06-23T17:00:21+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/a-clear-path-to-cmmc</loc><lastmod>2024-02-06T22:09:58+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/what-does-a-security-team-do</loc><lastmod>2025-06-23T17:01:46+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/why-a-third-party-mssp-is-needed-now-more-than-ever</loc><lastmod>2025-06-23T17:06:14+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/protect-your-organization-with-office-365-security-solutions</loc><lastmod>2025-06-23T17:08:36+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/creating-a-results-oriented-culture-by-measuring-what-matters</loc><lastmod>2025-06-23T17:09:55+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/breaking-down-cmmc</loc><lastmod>2025-06-23T17:10:55+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/robust-cybersecurity-program</loc><lastmod>2025-06-23T17:13:10+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/what-to-consider-for-cyber-insurance-in-2023-webinar</loc><lastmod>2025-06-23T18:19:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/combat-the-fbis-1-cyber-threat</loc><lastmod>2025-06-23T17:14:17+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/what-do-you-do-if-you-get-breached</loc><lastmod>2023-09-26T15:02:02+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/why-should-i-care-about-security</loc><lastmod>2025-06-23T17:15:39+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/cloud-migration</loc><lastmod>2025-06-23T17:17:54+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/ebooks/how-to-fail-at-cybersecurity</loc><lastmod>2025-06-23T17:23:17+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/ransomware-survival-guide-remain-resilient</loc><lastmod>2025-07-25T17:59:54+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/how-to-go-all-in-on-cybersecurity</loc><lastmod>2024-07-26T12:44:51+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/deploying-a-secure-by-design-approach-9d535c06c648ee078a617eda037b0ea7</loc><lastmod>2025-06-23T18:22:04+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/events/security-showcase-ec27f24b7373380de5f7c3f6717588fe</loc><lastmod>2025-07-25T16:56:59+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/events/ciso-de-mayo</loc><lastmod>2026-04-23T19:45:45+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/simplifying-cybersecurity-compliance-in-food-service</loc><lastmod>2025-06-23T18:03:21+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/when-ransomware-stops-production-incident-response-steps-up</loc><lastmod>2025-06-02T14:59:34+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/case-studies/when-a-disgruntled-employee-detonates-a-logic-bomb</loc><lastmod>2025-07-25T18:10:48+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/webinars/microsoft-quick-assist-is-under-attack</loc><lastmod>2025-08-13T18:42:15+00:00</lastmod></url>
<url><loc>https://dev.inversion6.com/insights/events/i6-trg-google-event</loc><lastmod>2026-03-27T15:04:37+00:00</lastmod></url></urlset>