<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/about</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/contact</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/hacking-policy-council</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-research</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/search</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/alexander-niejelow</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/ari-schwartz</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/bri-law</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/david-alfred</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/eric-wenger</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/jen-ellis</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/lorrie-faith-cranor</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/team/sam-curry</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/better-identity-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/coalition-to-reduce-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/cybersecurity-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/digi-asia-pacific-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/digiamericas-alliance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/enterprise-data-center-transparency-and-security-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/hacking-policy-council</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/hardware-centric-coordinated-vulnerability-disclosure-practices-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/mobile-future-pathways-to-continued-improvement-in-mobile-security-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/network-resilience-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/on-demand-assurance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/the-future-of-fedramp</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/initiatives/vulnerability-management-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/2025-cyber-policy-award-winners</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/2025-year-in-review-advancing-cybersecurity-through-collaboration</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/3-actions-latin-american-leaders-must-take-to-reduce-risk-of-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/a-new-approach-to-address-concerns-about-overuse-of-digital-ids</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/a-partial-win-for-ai-red-teaming-from-the-copyright-office</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/a-partnership-to-help-financial-services-firms-address-gen-ai-related-cyber-risks-to-identity-and-authentication-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/addressing-concentration-risk-in-federal-it</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/addressing-it-concentration-risk-in-the-australian-government</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-and-cybersecurity-a-leadership-dialogue-in-the-americas</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-brings-challenges-and-opportunities-for-digital-identity-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-governance-in-latin-america</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-hacking-in-the-white-houses-executive-order</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-is-here-what-it-means-for-digital-identity-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ai-profile-for-nist-csf-would-help-risk-management-pros</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/aligning-ai-and-cybersecurity-takeaways-from-a-discussion-on-the-uks-new-ai-cyber-security-code-of-practice</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/better-identity-at-five-years-an-updated-policy-blueprint-and-report-card</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/better-identity-coalition-connect-the-terms</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/bic-policy-forum-recap-identity-authentication-and-the-road-ahead-2025</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/bidens-latest-cyber-eo-bolsters-work-underway-faces-uncertain-future-in-trump-administration</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/blog-post-title</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/brazil-u-s-exchange-cybersecurity-best-practices-with-digi-americas-alliance-support</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/breaking-the-endless-loop-and-reframing-the-encryption-debate</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/bridging-the-cybersecurity-gap-in-latam-how-isacs-enhance-regional-cooperation</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/brussels-regulatory-assertiveness-collides-with-standards-development-process-diplomacy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/building-digital-solidarity-the-new-international-cyberspace-and-digital-policy-strategy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/building-pqc-and-crypto-resiliency-across-the-public-and-private-sectors</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/bureau-for-cyber-statistics-proposed</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cairncross-outlines-oncd-priorities-under-second-trump-administration</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cairncross-talks-cyber-strategy-shaping-adversarial-behavior</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ccpl-coalition-leads-speak-at-2025-state-of-the-net-conference</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ccpl-orgs-submit-comments-on-usmca-revision</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ccpl-report-ensuring-the-longevity-of-the-cve-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ccpl-what-am-i-thankful-for</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-announces-2025-cybersecurity-fellows</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-launches-digi-asia-pacific-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-launches-fellowship-program-with-two-inaugural-cybersecurity-fellows</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-launches-initiatives-to-support-detection-and-remediation-of-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-statement-of-support-for-harry-coker-confirmation</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-and-law-to-engage-with-industry-on-coordinated-vulnerability-disclosure-practices-for-hardware</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/center-for-cybersecurity-policy-law-staff-are-thankful-for</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/centers-new-amicus-brief-in-epic-v-google-competition-should-not-come-at-the-expense-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cfpb-policy-calls-out-mfa-password-management</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/changing-the-cybersecurity-mindset</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/chevron-pattern-disrupted-the-impact-on-cybersecurity-regulations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cisa-finalizes-secure-software-development-self-attestation-form</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cisa-in-the-drivers-seat-over-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cisa-promotes-secure-by-design-principles-with-industry-pledge</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cisa-proposes-sweeping-cyber-incident-reporting-for-u-s-companies</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cisa-shifts-federal-cyber-security-landscape-with-sweeping-mandate-to-replace-end-of-life-network-devices</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/coalition-sends-paper-on-post-shutdown-priorities-to-oncd-and-congressional-cyber-leaders</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/coalition-submits-comments-to-cisa-on-software-attestation-form</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/comments-to-the-department-of-the-treasury-rfi-on-artificial-intellignece</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/companies-commit-to-white-houses-call-for-secure-and-trusted-ai</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/competition-and-security-need-to-go-hand-in-hand</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/congress-proposed-chip-security-act-threatens-to-create-new-cyber-vulnerabilities-in-u-s-semiconductors</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/connect-the-terms-the-cyber-policy-watchlist</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/costa-rican-cybersecurity-policy-with-minister-paula-bogantes-dcp-s2-e7</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/counter-ransomware-initiative-adds-private-sector-members</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cr2-briefs-wto-on-cybersecurity-components-in-trade</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/crosswalk-analysis-for-artificial-intelligence-frameworks</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cyber-leaders-discuss-a-common-ai-and-cyber-vision-in-latam</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cyber-policy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cyber-spring-clean</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-bru-a-quantum-shift-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-bru-countering-the-proliferation-of-commercial-spyware</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-bru-cyber-defense-protecting-critical-infrastructure-supporting-strategic-partnerships</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-bru-harmonizing-cybersecurity-regulations-in-the-eu-single-market</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-bru-the-future-of-the-cybersecurity-act-eu-certifications</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-dc-2023-preview-and-agenda</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-dc-2024-preview</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernext-dc-2025-preview</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybernextdc-2024-recap</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-and-ai-policymaking-protecting-the-use-of-artificial-intelligence-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-awareness-month-series-cisa-2015</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-awareness-month-series-quantum-computing</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-awareness-month-series-the-cve-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-better-identity-coalitions-submit-comments-to-nist-on-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-adi-submit-comments-on-updated-acquisition-regulations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-and-cyber-threat-alliance-to-host-cybernext-brussels-2026</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-announces-cybernext-brussels</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-announces-cybernext-brussels-2025</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-comments-on-cra-implementing-regulation-on-technical-descriptions-of-products-with-digital-elements</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-comments-on-enisas-nis-2-implementing-guidance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-comments-on-uk-ransomware-proposals</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-cr2-comment-on-eu-cybersecurity-act-revision-consultation</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-fido-alliance-raise-concerns-about-proposed-new-data-collection-for-visa-waiver-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-focus-regulatory-harmonization-efforts-on-coregulatory-models</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-hacking-policy-council-comment-on-nist-cyber-ai-profile</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-hpc-comment-on-eu-cra-delegated-act-on-delaying-dissemination-of-notifications-about-vulnerabilities-and-incidents</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-releases-eu-policy-roadmap-2024-2029</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-coalition-shares-views-on-eu-roadmap-on-post-quantum-cryptography</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-predictions-for-2024</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cybersecurity-regulatory-harmonization-hearing-highlights-need-for-public-private-sector-partnerships</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/cyberspace-solarium-commission-2-0-with-mark-montgomery-dcp-s2-e1</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/decrypt-the-grid</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/decrypt-the-grid---cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/decrypt-the-grid-cybernext</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/detour-or-deadlock-decoding-the-suspended-un-cybercrime-treaty-negotiations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/developing-a-national-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/digi-americas-alliance-duke-university-and-recorded-future-release-latam-financial-sector-threat-landscape-2025-report</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/digi-americas-brings-multinational-government-delegation-to-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/digital-identity-crisis-the-need-for-a-national-digital-identity-strategy-in-the-u-s</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/diverse-perspectives-stronger-defenses-growing-the-cyber-workforce-through-diversity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/dns-security-in-focus-a-multistakeholder-path-forward-under-nis2</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/dns-security-in-focus-rsa-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/dual-drone-eos-a-boost-to-the-domestic-drone-and-counter-drone-industries</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/easterly-reflects-on-time-at-cisa</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/energy-sector-companies-sign-on-to-g7-cybersecurity-pledge</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/enterprise-data-center-transparency-and-security-workshop-summary-report</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/enterprise-environment-visibility</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-10-kemba-walden-reflections-of-an-acting-national-cyber-director</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-2-un-cybercrime-convention-with-kaja-ciglic</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-3-policy-defcon-with-beau-woods-and-harley-geiger</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-4-10-years-of-the-cavalry-with-joshua-corman</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-5-the-new-dod-cyber-strategy-with-deputy-assistant-secretary-mieke-eoyang</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-6-congressional-cyber-policy-with-former-rep-jim-langevin</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-7-uk-security-for-emerging-tech-with-irfan-hemani</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-8-the-dmca-triennial-process-with-dojs-jason-gull</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/episode-9-australian-cyber-policy-with-ambassador-brendan-dowling</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/eu-cyber-policy-with-despina-spanou-dcp-s2-e5</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/eu-releases-digital-europe-work-programmes-for-2025-2027</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/european-commission-2028-2034-budget-proposal-includes-substantial-increase-for-cyber-digital-programmes</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/europes-dma-a-cybercriminals-paradise</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/europes-evolving-security-strategy-implications-for-u-s-companies</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/eus-cyber-resilience-act-can-bolster-security-but-lacks-structure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/eus-cyber-resilience-act-enters-into-force</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/eus-digital-markets-act-puts-the-security-onus-on-mobile-users</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap---advancing-risk-management-cybersecurity-privacy-and-ai</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-2024-identity-authentication-and-the-road-ahead-policy-forum</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-a-conversation-with-rodrigo-chaves-robles-president-of-costa-rica</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-cyber-in-war-lessons-from-the-russia-ukraine-conflict</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-cybernext-dc-2023</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-secure-dns-and-the-evolution-of-nist-sp-800-81</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/event-recap-spring-into-privacy-with-the-nist-privacy-engineering-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/examining-critical-infrastructure-cybersecurity-and-resilience-a-ccpl-tabletop-exercise-after-action-report</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/examining-the-intricacies-of-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/examining-the-white-houses-national-cyber-strategy-webinar</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/exchange-of-good-cybersecurity-practices-between-mexico-and-the-u-s</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/extensive-artificial-intelligence-executive-order-defines-administrations-plans</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fcc-proposes-overly-complex-iot-cybersecurity-labeling-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fedramp-20x-a-new-era-of-cloud-security-and-industry-collaboration</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fedramp-finalizes-emerging-technology-prioritization-framework</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fedramp-signals-acceleration-of-requirements-for-machine-readable-packages-in-the-rev5-process</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fedramp-unveils-next-phase-of-modernization</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fighting-the-adversarial-use-of-ai-innovation-in-cyber-insurance-incident-response</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fincen-212-billion-in-likely-financial-crimes-linked-to-identity-verification-breakdowns</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/fincen-ransomware-payments-peaked-in-2023</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/french-cyber-bills-set-dangerous-precedent</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/groundhogs-day-all-over-again-uk-wants-encryption-backdoor-for-apple-users</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/growing-a-diverse-workforce-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/hacking-in-hollywood</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/hacking-policy-council-comments-on-nists-responsibilities-from-ai-eo</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/hacking-policy-council-comments-to-new-york-state-department-of-health-on-proposed-hospital-cybersecurity-requirements</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/has-progress-made-been-in-federal-cybersecurity-csc-2-0-wants-more</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/hearing-highlights-industry-calls-for-brazilian-national-digital-security-agency</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/house-bill-would-jump-ahead-of-in-progress-efforts-to-secure-software-at-federal-agencies</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/house-oversight-hearing-on-combating-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/how-existing-security-frameworks-can-help-meeting-bulk-data-rule-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/improving-hardware-component-vulnerability-disclosure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/industry-coalition-urges-commerce-secretary-lutnick-to-prioritize-funding-nist-cyber-efforts</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/industry-coalitions-push-for-nists-secure-software-development-framework-as-basis-of-cisas-secure-by-design-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/industry-groups-urge-white-house-to-nominate-new-national-cyber-director</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/information-sharing---u-s-legal-and-regulatory-guidance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/insights-from-the-2025-latam-ciso-summit---rio-de-janeiro-brazil</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/insights-from-the-annual-latam-ciso-summit-costa-rica</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/introducing-distilling-cyber-policy-episode-s01-e01-eu-cyber-resilience-act-with-mep-bart-groothuis</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/introducing-distilling-cyber-policy-episode-s02e01-eu-cyber-resilience-act-with-mep-bart-groothuis</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/is-it-time-for-mandatory-multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/is-phishing-resistant-mfa-table-stakes</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/its-time-for-the-insurance-industry-to-get-creative-with-incident-response</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/japanese-regulator-balances-cybersecurity-competition-concerns-in-msca-implementation-guidelines</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/japans-new-active-cyber-defense-law-a-strategic-evolution-in-national-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/joint-industry-comments-push-for-permanent-fcc-schools-and-libraries-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/joint-letter-of-experts-on-cra-and-vulnerability-disclosure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/joint-letter-to-ofac-re-vulnerability-guidance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/k-12-institutions-at-risk-of-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/landmark-sec-rule-requires-cybersecurity-risk-and-incident-disclosures</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/latam-ciso-report-2023-insights-from-industry-leaders</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/latam-ciso-summit-2023-what-should-we-expect</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/latin-american-companies-governments-need-more-focus-on-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/managing-risk-and-security-with-technology-policy-and-law</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/meeting-the-homeland-c-usa-threat</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/meeting-the-homeland-drone-threat-a-table-top-exercise-exposes-the-gaps-in-authorities-and-resources</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/mobile-future-pathways-to-continued-improvement-in-mobile-security-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/most-promising-development-of-2023-government-focus-on-cyber-policy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/multiple-organizations-request-30-day-extension-on-circia-comments</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/national-cybersecurity-awareness-month-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/nato-cant-truly-defend-cyberspace-without-private-partnerships</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ncd-coker-reflects-on-oncds-successes-lessons-learned-and-future</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ndaa-and-cybersecurity-with-grant-schneider</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ndaa-and-cybersecurity-with-grant-schneider-dcp-s2-e6</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/network-resilience-coalition-launches-to-address-threats-to-outdated-network-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/network-resilience-coalition-offers-recommendations-for-improving-network-infrastructure-security-in-new-white-paper</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/new-cybersecurity-executive-order-same-mission-protecting-americas-digital-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/new-network-resilience-coalition-launches-to-address-threats-to-outdated-network-infrastructure-on-a-global-scale</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/new-report-highlights-need-for-investment-to-reduce-systemic-risks-of-ransomware-in-latin-america</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/next-phase-of-pall-mall-process-begins-on-governance-of-hacking-tools-and-markets</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ninth-circuit-avoids-vulnerability-disclosure-precedent-following-amicus-brief</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/nist-analyzing-collusion-threats-in-the-semiconductor-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/nist-csf-2-0-includes-positive-changes-need-for-greater-consistency-practical-guidance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/nstac-report-details-abuse-of-domestic-infrastructure-findings-and-recommendations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ntia-report-reveals-support-for-open-ai-models</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/oama-poses-security-threats-for-enterprise-users</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/offensive-cyber-operations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/offensive-cyber-operations-with-stacy-omara-and-leonard-bailey-dcp-s2-11</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/oncd-releases-detailed-cyber-strategy-implementation-plan</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/oncds-prioritizing-regulatory-harmonization-with-rfi</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/open-source-software-security-should-focus-on-adoption-of-memory-safe-programming-languages</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/outcomes-from-the-2023-counter-ransomware-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/podcast-artificial-intelligence-and-chatbots-helpful-or-harmful</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/pqc-lead-the-way-or-fall-behind</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/prioritizing-cybersecurity-for-state-government-how-a-whole-of-government-approach-benefits-all</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/progress-made-challenges-remain-bringing-privacy-into-enterprise-risk-management</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/progress-report-national-cyber-workforce-and-education-strategy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/proposed-far-rule-on-data-localization-would-undermine-u-s-cybersecurity-competitiveness</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/protecting-mobile-security-in-a-competitive-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/protecting-network-resiliency</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/public-sector-ai-governance-build-on-existing-strong-foundations</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/putting-the-dc-in-def-con-and-other-cybersecurity-events</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/putting-the-work-into-workshop-with-nists-privacy-engineering-program</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/ransomware-costly-and-impactful-and-now-a-staple-national-security-risk</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/real-id-no-longer-focuses-on-most-pressing-problems</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/recap---offensive-cyber-operations-charting-a-legal-and-strategic-path-forward</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/recommendations-from-white-house-ransomware-summit</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/red-teaming-large-language-models-at-def-con-31</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/reframing-the-conversation-a-deep-dive-into-the-encryption-debate</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/refreshing-americas-cyber-posture-the-new-national-cybersecurity-strategy-and-how-to-make-sure-it-succeeds</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/report---addressing-international-it-concentration-risk-a-five-eyes-informed-exercise</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/report-how-a-whole-of-government-approach-to-cybersecurity-can-help-states</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/research-needed-for-the-good-and-bad-ai-cybersecurity-use-cases</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/risks-associated-with-it-monoculture-needs-further-examination</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/rsa-readout-asia-pacific</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/rsa-readout-europe</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e-8-the-dmca-triennial-process-with-dojs-jason-gull</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e02-un-cybercrime-convention-with-kaja-ciglic</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e03-the-lost-podcasters-guide-to-policy-defcon-with-beau-woods-harley-geiger</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e04-10-years-of-the-cavalry-with-joshua-corman</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e06-congressional-cyber-policy-with-former-rep-jim-langevin</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e09-australian-cyber-policy-with-ambassador-brendan-dowling</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e10-kemba-walden---reflections-of-an-acting-national-cyber-director</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s01-e11-special-episode---a-look-ahead-to-cyber-policy-in-2024</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e01-cyberspace-solarium-commission-2-0-with-mark-montgomery</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e03-the-u-s-data-security-eo-with-lee-licata-and-grant-dasher</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e04-eu-cyber-policy-with-despina-spanou</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e04-the-national-vulnerabilities-database-with-kent-landfield-john-banghart</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e05-the-new-dod-cyber-strategy-with-deputy-assistant-sec-mieke-eoyang</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s02-e07-uk-security-for-emerging-tech-with-ifran-hemani</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/s2-e3-responsible-cyber-power-with-shehzad-charania</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/sec-targeting-cisos-execs-over-breaches</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/securing-the-future-of-ai-whats-next</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/shoring-up-subsea-cable-security</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/shoring-up-subsea-security-a-comprehensive-action-plan-to-promote-submarine-cable-resiliency-security-governance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/singapore-international-cyber-week-2024-striving-for-digital-trust-amid-u-s-election-uncertainty</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/six-functions-intertwined-the-nist-cybersecurity-framework-2-0-is-here</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/special-episode-a-look-ahead-to-cyber-policy-in-2025-dcp-s2-bonus</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/special-episode-a-look-at-cyber-policy-in-2026-dcp-s2-e12</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/spooky-cyber-terms</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/spotlight-on-the-nist-privacy-framework-it-takes-a-village</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/spotlight-on-the-nist-privacy-framework-three-years-old-and-making-an-impact</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/state-fed-cyber-leaders-discuss-resilience-in-light-of-evolving-threat-budget-landscapes</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/state-policy-blueprint-puts-states-at-the-center-of-digital-identity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/striking-a-balance-preserving-secs-cyber-rules-amid-incident-reporting-backlash</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-center-for-cybersecurity-policy-and-law-other-orgs-call-on-the-white-house-to-nominate-national-cyber-director</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-center-for-cybersecurity-policy-and-laws-amicus-brief---united-states-vs-google-llc</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-center-for-cybersecurity-policy-laws-amicus-brief-in-epic-games-inc-v-google-llc-et-al</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-center-for-cybersecurity-policy-laws-amicus-epic-games-inc-v-google-llc-et-al</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-clocks-ticking-why-cisa-2015-must-be-renewed-now</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-counter-ransomware-initiative-with-hamish-hansford-dcp-s2-e8</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-dhs-western-hemisphere-conference-reaffirming-promises-and-forging-stronger-alliances</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-future-of-fedramp</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-good-the-not-so-good-and-the-puzzling</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-international-counter-ransomware-initiative-from-forming-and-norming-to-performing</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-national-vulnerability-database-with-kent-landfield-and-john-banghart-dcp-s2-e4</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-path-to-banning-ransomware-payments</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-role-of-cybersecurity-information-sharing-amid-geopolitical-tensions</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-securities-and-exchange-commission-obstructs-national-security</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-strategic-role-of-cybersecurity-in-national-ai-initiatives</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-u-s-and-un-cybercrime-convention-progress-concerns-and-uncertain-commitments</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-u-s-data-security-eo-with-lee-licata-and-grant-dasher-dcp-s2-e3</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-u-s-data-security-eo-with-lee-licata-and-grant-dasher-part-2</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-u-s-navys-cyber-strategy-with-anne-marie-schumann-dcp-s2-e9</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/the-uk-psti-act-comes-into-effect</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/threats-edition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/through-the-looking-glass-an-updated-vision-for-the-office-of-the-national-cyber-director</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/to-hack-back-or-not-hack-back-that-is-the-question-or-is-it</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/trump-eo-aims-to-streamline-critical-infrastructure-resilience</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/trusted-app-stores-protecting-security-and-integrity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/u-s-cybersecurity-funding-to-latin-america-a-critical-investment-for-regional-and-national-stability</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/u-s-government-advances-tiktok-restrictions</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/uks-investigatory-powers-act-could-negatively-impact-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/unga-2025-ai-security-and-human-capital---preparing-the-workforce-for-tomorrow</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/unraveling-the-impact-of-ustrs-wto-reversal-on-cybersecurity-and-global-trade</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/untangling-the-web-of-redlines-the-un-cybercrime-convention-possible-stalemate</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/virginia-supreme-court-expands-computer-crime-law-raising-legal-issues-for-ethical-hackers</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/vulnerability-management-under-the-cyber-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/what-does-a-government-shutdown-mean-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/what-is-dns---a-dns-security-primer</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/what-states-can-learn-from-north-carolinas-approach-to-securing-government</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/what-we-learned-at-singapore-international-cyber-week</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/whats-new-with-the-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/where-the-eus-cyber-resilience-act-stands</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/white-house-announces-effort-to-help-k-12-schools-with-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/white-house-hosts-ai-aspirations-conference</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/white-house-standards-strategy-promotes-participation-increased-workforce</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/white-houses-iot-labeling-effort-has-potential-must-avoid-pitfalls</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/white-paper-protecting-the-use-of-artificial-intelligence-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/who-controls-whether-your-ai-agents-can-be-found-takeaways-from-rsa-roundtable-on-the-ai-agent-discovery-gap</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/will-trump-uphold-bidens-cybersecurity-order-key-ai-and-vulnerability-management-provisions-at-stake</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/wont-someone-think-of-the-cybersecurity-recent-agreements-on-cross-border-data-flows</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/www-centerforcybersecuritypolicy-org-insights-and-research</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/yet-another-blog-about-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/yet-another-blog-about-cyber-defense-part-i-the-lexicon</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/insights-and-research/zscaler-wiz-and-infoblox-join-as-new-members-of-the-cybersecurity-coalition</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/blog-post</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/brainteasers</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/comments</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/news</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/papers-reports</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/podcast</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/category/webinars-and-events</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/government</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/identity</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/management</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/security</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/topics/technology</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/enterprise-data-center-transparency-and-security-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/hardware-centric-coordinated-vulnerability-disclosure-practices-initiative</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/mobile-future-pathways-to-continued-improvement-in-mobile-security-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/on-demand-assurance</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/the-future-of-fedramp2</loc>
    </url>
    <url>
        <loc>https://www.centerforcybersecuritypolicy.org/emergent-issues/vulnerability-management-coalition</loc>
    </url>
</urlset>