<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.kieransky.com/case-studies.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/contact.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/credentials.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/crisis.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/cyber-portfolio.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/frameworks.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/intelligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/publications.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/regulatory-delivery.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/regulatory-hub.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/research.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/threat-radar.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/read/</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/viewer.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/14-400-seconds-to-comply-the-sovereign-ciso-doctrine-and-the-future-of-corporate-cyber-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/14400-seconds-to-comply.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/2026-cyber-risk-reset-liability-is-the-new-attack-surface.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/2026-cyber-risk-reset.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/advanced-exploitation-techniques-zero-day-research-custom-shellcode-bypass-engineering-post-exploitation-tradecraft-elite-security-operators.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/advanced-exploitation-techniques.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversarial-pattern-recognition-in-ai-systems-a-red-team-framework-for-emerging-web-exploitation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversarial-pattern-recognition-in-ai-systems.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversary-simulation-in-regulated-environments.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversary-simulation-regulated-environments-tiber-eu-dora-tlpt-governance-architecture-financial-sector-threat-led-penetration.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/agentic-ai-beyond-guardrails-adaptive-risk-architectures-for-enterprise-autonomy.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/agentic-ai-beyond-guardrails.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/agentic-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-control-plane.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-driven-identity-intelligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-engineering-doctrine-extract-chunk-prompt-evaluate-the-four-phase-engineering-model-for-production-grade-government-ai.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-engineering-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-governance-and-security-architecture-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-governance-meets-cyber-governance-the-emerging-duty-of-convergence-risk-management-and-board-accountability-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-governance-meets-cyber-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-incident-command-systems-crisis-governance-for-autonomous-systems.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-incident-command-systems.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-security-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-sovereignty-in-the-justice-stack-controlling-models-metadata-and-meaning-a-sovereignty-framework-for-national-control-of-judicial-ai-assets.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-sovereignty-in-the-justice-stack.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-systems-cyber-doctrine-governance-and-operational-control-of-algorithmic-risk.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-systems-cyber-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-that-survives-court-wins-the-market-the-doctrine-of-litigation-grade-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai-that-survives-court-wins-the-market.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks-compliance-driven-security-blueprint-for-regulated-enterprises.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/aligning-azure-security-with-saudi-nca-caf-mcra.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/aligning-sabsa-with-eu-regulatory-frameworks.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/antifragile-identity.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/api-security-under-attack-penetration-testing-rest-graphql-grpc-interfaces-owasp-api-security-top-10-emerging-attack-vectors-flagship-edition.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/api-security-under-attack.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-access-by-design.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-anonymous-power.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-cloud-native-ai-stacks.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-the-ai-control-plane.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-the-ai-native-enterprise-identity-as-infrastructure-technical-debt-as-liability-and-the-repricing-of-enterprise-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting-the-ai-native-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/assurance-under-pressure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/audit-proof-by-design-cra-nis2-compliance-without-slowing-engineering.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/audit-proof-by-design.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/audit-proof-resilience-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/audit-ready-by-design.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/auditing-the-sabsa-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/automation-at-scale-python-ansible-rest-apis-in-cni-infrastructure-as-code-and-policy-as-code-at-scale-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/automation-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/autonomous-identity-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex-enterprises-a-risk-aligned-security-architecture-methodology.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/azure-security-by-design-architecture-risk-compliance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/bcp-battle-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/bcp-black-swan-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-binary-edges-how-hyperedge-structured-knowledge-graphs-eliminate-clause-fragmentation-in-llm-driven-contract-attribute-extraction.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-binary-edges.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-certification-campaigns.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-compliance-how-sabsa-transforms.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-perimeter-security-physical-cyber-convergence-in-airports-unified-physical-cyber-security-operations-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-perimeter-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-scanning-why-vulnerability-scanners-miss-68-percent-critical-security-findings-manual-penetration-testing-fills-gap-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-scanning.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-speech-to-text-end-to-end-ai-pipelines-for-transcription-and-intelligence-the-full-stack-ai-pipeline-architecture-for-judicial-intelligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-speech-to-text.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-the-perimeter-identity-centric-security-in-azure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure-advanced-identity-security-patterns-for-transformation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-tick-box-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-aligned-ciso-blueprint-delivering-3-roi-resilience-across-nis2-dora-compliance-mandates.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-aligned-ciso-blueprint.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-governance-infographic.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-grade-cyber-resilience-technical-risk-to-executive-accountability-fair-quantification-and-board-reporting-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-grade-cyber-resilience.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/boardroom-collapse-in-45-seconds-the-zero-hour-command-protocol.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/boardroom-collapse-in-45-seconds.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/bridging-strategy-and-execution-security-architect-in-24x7-cni-board-risk-appetite-to-operational-defence-posture-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/bridging-strategy-and-execution.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and-response-a-complete-security-operations-centre-blueprint.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-a-cloud-native-soc-on-microsoft-azure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-resilient-architectures-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-secure-azure-platforms-for-government-and-defence-cloud-environments-architecture-patterns-for-mission-critical-workloads.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/caf-in-practice.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cisco-aci-deep-dive-tenant-vrf-bridge-domain-epg-design-policy-driven-micro-segmentation-in-multi-tenant-data-centres-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cisco-aci-deep-dive.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ciso-2027-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/citrix-netscaler-and-f5-secure-application-delivery-for-aviation-waf-ssl-offload-and-load-balancing-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/citrix-netscaler-and-f5.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-container-penetration-testing-aws-azure-gcp-kubernetes-security-validation-offensive-techniques-cloud-native-attack-paths-analysis.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-container-penetration-testing.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-first-identity-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-governance-at-scale-regulated-sovereign-markets.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets-policy-driven-governance-for-multi-jurisdictional-compliance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-security-architecture-under-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/codified-intelligence-establishing-standards-for-interoperable-ai-a-standards-framework-for-ai-interoperability-across-government-departments.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/codified-intelligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/commanding-the-crisis.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous-security-validation-annual-penetration-tests-automated-breach-attack-simulation-continuous-attack-surface-management.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous-security-validation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous-vulnerability-assessment-penetration-testing-cvapt-model-automated-scanning-manual-testing-threat-intelligence-assurance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous-vulnerability-assessment-penetration-testing.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber-governance-for-the-regulated-enterprise-multi-regulatory-compliance-dora-nis2-eu-ai-act-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber-governance-for-the-regulated-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber-maturity-as-a-currency.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber-resilience-as-a-revenue-engine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber-resilience-in-operational-technology.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/data-governance-and-security-architecture.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign-standards-a-strategic-architecture-for-regulated-organisations.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/defending-the-kingdom-azure-saudi-sovereign-standards.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-cyber-resilient-airport-networks-ot-it-segregation-for-airside-landside-passenger-systems-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-cyber-resilient-airport-networks.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-secure-by-default-azure-architectures-for-high-sensitivity-environments-embedding-security-controls-at-the-foundation-layer.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-ultra-high-reliability-ai-services-observability-resilience-and-devsecops-the-convergence-of-observability-resilience-and-security-for-judicial-ai.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-ultra-high-reliability-ai-services.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/digital-resilience-by-design-anti-fragile-infrastructure-architecture-that-gets-stronger-under-stress-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/digital-resilience-by-design.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/doctrine-of-digital-proof-operationalising-trust-in-ai-driven-judicial-systems-a-formal-framework-for-establishing-evidentiary-trust-in-machine-generated-transcripts.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/doctrine-of-digital-proof.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/doing-more-with-less.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/dora-aligned-architecture-using-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/dora-compliance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/dora-s-ai-vendor-trap-liability-flows-capital-charges-and-board-exit-strategies.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/doras-ai-vendor-trap.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/dr-doctrine-2026.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/drp-weaponisation-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/end-to-end-cyber-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/engineering-truth-the-ai-pipeline-as-an-instrument-of-national-integrity-building-ai-systems-worthy-of-national-trust.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/engineering-truth.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise-firewall-modernisation-for-critical-national-infrastructure-ips-encrypted-visibility-policy-engineering-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise-firewall-modernisation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust-enforcement-building-the-secure-cloud-adoption-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise-scale-azure-security-landing-zones-to-zero-trust.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/evidence-over-opinion.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/executive-summary-polished-final-v9.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/executive-summary-zero-hour-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fiduciary-defence-dossier-template-v7.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fiduciary-defence-dossier-template.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fortifying-the-pipeline-devsecops-doctrine-for-ai-enabled-judicial-services-security-first-ci-cd-for-machine-learning-in-government-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fortifying-the-pipeline.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-audit-to-advantage.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-mandate-to-competitive-advantage.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-to-command-authority.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-to-competitive-advantage.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-to-conformity-operationalising-cra-and-nis2.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-to-conformity.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-compliance-to-resilience.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-findings-to-fixes-remediation-driven-penetration-testing-programme-closes-security-gap-through-governance-framework-flagship-edition.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-findings-to-fixes.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-pentest-to-threat-intelligence-offensive-security-findings-feed-strategic-threat-intelligence-mitre-att-ck-proactive-defence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-pentest-to-threat-intelligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-playbooks-to-performance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-pov-to-production-the-blueprint-for-resilient-ai-in-public-infrastructure-crossing-the-valley-of-death-between-ai-proof-of-value-and-national-deployment.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-pov-to-production.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-prototype-to-public-infrastructure-engineering-production-grade-ai-transcription-the-engineering-doctrine-for-scaling-ai-from-lab-to-live-service.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-prototype-to-public-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-regulation-to-runtime-engineering-cra-nis2-dora-into-product-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-regulation-to-runtime.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-scapegoat-to-sovereign-the-ciso-authority-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from-scapegoat-to-sovereign.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/global-identity-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/governing-agentic-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/governing-cyber-risk-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/governing-machine-identities.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/harmonizing-dora.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/high-availability-and-disaster-recovery-for-mission-critical-aviation-sub-second-failover-and-zero-data-loss-recovery-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/high-availability-and-disaster-recovery.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/iam-governance-elite-v4.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/iam-governance-elite.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-as-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-first-azure-architecture-entra-id-pim-conditional-access.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional-access-at-scale-designing-the-enterprise-identity-control-plane.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-governance-as-infrastructure-translating-policy-into-automated-control-architecture-for-the-autonomous-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-governance-as-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-is-the-new-perimeter-zero-trust-governance-blueprint-identity-centric-security-at-enterprise-scale-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-is-the-new-perimeter.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-warehouse-to-enforcement-edge.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/implementing-sabsa-in-complex-enterprises.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/information-governance-for-autonomous-metro-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/infrastructure-penetration-testing-active-directory-network-segmentation-lateral-movement-exploiting-defending-enterprise-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/infrastructure-penetration-testing.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/institution-grade-recovery-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/institutional-dr-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/institutionalising-product-security-operating-model-cra-nis2.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/institutionalising-product-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/integrating-sabsa-across-the-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/interim-ciso.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ironclad-anonymization-deterministic-redaction-frameworks-for-the-ministry-of-justice-engineering-near-zero-leakage-pii-redaction-for-judicial-ai-at-national-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ironclad-anonymization.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/iso-27001-2025-resilience-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/joiner-mover-leaver-to-institutional-control.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/judicial-ai-at-scale-architecting-resilient-secure-and-governed-platforms-a-sovereign-infrastructure-blueprint-for-national-scale-judicial-ai.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/judicial-ai-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/mergers-and-acquisitions-cyber-risk-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/modern-penetration-testers-playbook-mastering-burp-suite-pro-metasploit-custom-exploit-development-enterprise-security-engagements.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/modern-threat-detection-defender-for-cloud-sentinel-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at-scale-building-an-integrated-detection-analytics-platform.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/navigating-nca-ecc-saudi-arabia-national-cybersecurity-authority-essential-controls-penetration-testing-compliance-kingdom-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/navigating-nca-ecc-saudi-arabia.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/nis2-guide.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/nist-800-53-rev5-resilience-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/offensive-security-in-practice-comprehensive-framework-penetration-testing-web-api-infrastructure-methodology-governance-flagship-edition.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/offensive-security-in-practice.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-doctrine-for-responsible-ai-engineering-the-engineering-playbook-for-operationalising-ai-ethics-at-enterprise-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-doctrine-for-responsible-ai-engineering.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-resilience-as-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-resilience-by-design-engineering-zero-downtime-operations-disciplined-change-management-and-validation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-resilience-by-design-the-governance-doctrine-for-essential-entity-survival.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-resilience-by-design.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-resilience-under-regulation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational-technology-security-under-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security-perimeter-doctrine-level-implementation-framework-for-enterprises.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operationalising-zero-trust-in-microsoft-cloud.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/owning-the-risk.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/post-quantum-readiness-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/prevention-is-dead-the-rise-of-resilience-based-ai-risk-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/prevention-is-dead.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/privileged-access-as-regulated-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/product-security-as-doctrine-board-grade-model-cra-nis2-sbom.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/product-security-as-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/provable-autonomy-the-governance-architecture-for-mission-critical-ai.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/provable-autonomy.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/quantum-identity.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/red-team-insights-blue-team-resilience-purple-team-methodology-closing-detection-response-gap-enterprise-security-operations-centre.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/red-team-insights-blue-team-resilience.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/regulation-as-code-operationalising-cra-nis2-dora.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/regulation-as-code.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/regulatory-confidence-engineering.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-armageddon-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-by-design-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-command-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-reckoning-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-redlines.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilience-regime-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilient-runways-deterministic-network-architecture-for-air-traffic-fault-tolerant-network-fabrics-for-aviation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilient-runways.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption-embedding-threat-modelling-and-ma-cyber-due-diligence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/risk-driven-cloud-migration-secure-azure-adoption.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sabsa-centric-enterprise-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sabsa-for-supply-chain-security.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/saviynt-iga-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/saviynt-sod-new-control-plane.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sdf-board-governance-infographic-v5.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/secure-azure-platforms-for-government-defence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/secure-by-default-azure-architecture-for-high-sensitivity-environments.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/secure-by-design-prove-by-evidence-product-security-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/secure-by-design-prove-by-evidence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises-prescriptive-architecture-patterns-for-multi-subscription-estates.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-azure-at-scale-zero-trust-blueprint.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-generative-ai-in-schools-a-red-team-driven-framework-for-safeguarding-compliance-and-risk-reduction.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-generative-ai-in-schools.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-azure-transformation-journey-embedding-security-from-strategy-to-execution-a-comprehensive-transformation-security-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-azure-transformation-journey.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture-mcra-in-ksa-enterprises-a-practitioner-level-guide.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-sands-mcra-implementation-in-ksa-enterprises.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-skies-zero-trust-micro-segmentation-in-aviation-ot-it-policy-driven-network-isolation-for-aviation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-skies.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security-assurance-in-azure-transformation-programmes-frameworks-controls-and-governance-a-comprehensive-enterprise-assurance-model.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security-assurance-in-azure-transformation-programmes.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security-reporting-that-drives-action-translate-technical-penetration-test-findings-board-level-risk-decisions-executive-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security-reporting-that-drives-action.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/simulating-the-adversary-tiber-eu-dora-tlpt-threat-led-penetration-testing-financial-services-sector-architecture-framework-flagship-edition.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/simulating-the-adversary.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure-architecture-satisfying-kingdom-sovereignty-requirements.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sovereign-cloud-security-in-saudi-arabia.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/strategic-resilience-command.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/synthetic-intelligence-as-a-service-orchestrating-the-judicial-api-ecosystem-designing-the-api-layer-for-national-judicial-intelligence-services.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/synthetic-intelligence-as-a-service.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/tabletop-to-reality.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/testing-modern-attack-surface-cloud-container-api-mobile-security-validation-post-perimeter-enterprise-architecture-governance-flagship-edition.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/testing-the-modern-attack-surface.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/testing-the-system-not-the-slides.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-2035-breakpoint-ai-cryptographic-collapse-and-the-end-of-voluntary-security-models.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-2035-breakpoint.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-247-soc-optimising-siem-soar-workflows-real-time-threat-detection-incident-response-financial-services-operations-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-247-soc.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-4-hour-clock-board-liability-in-the-age-of-dora-nis2-and-ai-regulation.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-4-hour-clock.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-ai-attack-surface-autonomous-agents-tool-misuse-and-the-rise-of-machine-speed-e.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-ai-attack-surface.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-autonomy-protocol-governing-non-human-identities-in-the-autonomous-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-autonomy-protocol.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-risk-doctrine-board-level-control-of-autonomous-ai-before-it-controls-you.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-risk-doctrine-tech-specs-pdf.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-risk-doctrine-tech-specs.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-agentic-risk-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ai-driven-threat-frontier.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ai-security-assurance-crisis.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-api-first-ai-state-reusable-intelligence-services-for-government-designing-composable-ai-services-for-cross-government-interoperability.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-api-first-ai-state.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-architecture-of-accountability-designing-observability-and-compliance-into-ai-building-auditable-transparent-and-compliant-ai-from-the-ground-up.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-architecture-of-accountability.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-auditory-record-architecting-sovereign-fidelity-in-automated-judicial-transcription-a-doctrine-level-blueprint-for-national-scale-speech-sovereignty.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-auditory-record.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-boardroom-cyber-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ciso-autonomy-mandate-command-control-and-governance-for-agentic-ai-systems.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ciso-autonomy-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ciso-identity-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ciso-transformation-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-conformity-advantage-product-security-as-differentiator.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-conformity-advantage.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-continuity-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-defensible-ciso-an-evidence-based-ai-risk-doctrine-for-regulatory-and-board-assurance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-defensible-ciso.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-future-of-privileged-access-zsp-jit-vault-architecture-securing-administrative-power-in-high-trust-environments-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-future-of-privileged-access.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-governance-deficit.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-governance-premium-repricing-cyber-risk.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-governance-premium.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-control-plane-zero-trust-governance-for-agentic-ai-and-regulated-enterprises.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-control-plane.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-hegemony.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-moat.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-utility-architecting-global-iam-as-foundational-gxp-infrastructure.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-identity-utility.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-institutional-liability-doctrine-governance-as-legal-infrastructure-in-the-autonomous-a.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-institutional-liability-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-integration-imperative.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-last-mile-of-cyber-governance.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-modern-penetration-testers-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-n-ary-mandate-using-hyperedge-knowledge-graphs-to-eliminate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-n-ary-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-ofgem-compliance-paradox.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-regulatory-product-security-doctrine-audit-proof-software-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-regulatory-product-security-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-regulatory-readiness-playbook-cra-nis2-engineering-control.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-regulatory-readiness-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-resilience-mandate-engineering-stability-in-national-transcription-systems-operational-resilience-engineering-for-mission-critical-judicial-ai.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-resilience-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-responsible-core-institutionalizing-evaluation-and-ethical-guardrails-in-government-llms-a-governance-framework-for-responsible-ai-deployment-in-public-sector.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-responsible-core.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sabsa-board-reporting-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sabsa-sovereignty-model.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sap-payroll-transformation-playbook.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-semantic-gavel-precision-llm-summarisation-in-high-stakes-litigation-engineering-legal-grade-ai-summarisation-for-court-proceedings.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-semantic-gavel.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-banking-protocol-architecting-regulatory-controlled-pam-grc-autonomous-defence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-banking-protocol.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-courtroom.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-defensibility-framework-full.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-defensibility-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-sovereign-zero-trust-model.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-trust-fabric-identity-network-and-governance-in-one-security-model-converging-iam-and-policy-governance-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-trust-fabric.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-unified-shield-architecting-detection-and-response-with-microsoft-defender-and-sentinel-converging-xdr-and-siem-for-operations.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-unified-shield-defender-sentinel-convergence.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-velocity-mandate-ciso-architecture-for-the-zero-latency-agentic-enterprise.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-velocity-mandate.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-zero-hour-doctrine-how-leaders-prevent-institutional-collapse-in-the-age-of-algorithmic-crisis.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-zero-hour-doctrine.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat-detection-through-offensive-testing-red-team-operations-expose-siem-gaps-harden-detection-rules-real-time-response-capability.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat-detection-through-offensive-testing.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat-intelligence-integration-within-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat-management-for-24x7-operations-networks-detection-engineering-and-soc-runbooks-for-critical-infrastructure-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat-management-for-24x7-operations.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise-azure-environments-five-stage-quantified-assessment-framework.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/trust-nothing-verify-everything-zero-trust-maturity-model.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/web-application-security-in-depth-owasp-top-10-business-logic-flaws-zero-day-discovery-penetration-testing-framework-practitioners.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/web-application-security-in-depth.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/why-ai-pilots-fail-under-regulatory-scrutiny-the-90-day-control-architecture-for-enterprise-deployment.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/why-ai-pilots-fail-under-regulatory-scrutiny.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-hour-doctrine-publisher-abstract-v7.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-hour-doctrine-publisher-abstract.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-latency-trust.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-ai-architecture-securing-autonomous-agents-apis-and-decision-systems.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-ai-architecture.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-identity-at-scale.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-identity-governance-and-administration-iga.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-identity-governance-iga.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-segmentation-for-airport-24x7-operations-networks-cisco-aci-and-ngfw-reference-architecture-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-segmentation-for-airport-operations.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust-transformation-with-sabsa.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust.html</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/14%2C400%20seconds%20to%20comply%20-%20the%20sovereign%20ciso%20doctrine%20and%20the%20future%20of%20corporate%20cyber%20governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/2026%20cyber%20risk%20reset-%20liability%20is%20the%20new%20attack%20surface.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/AI_Governance_and_Security_Architecture_Embedding_ISO42001_Within_SABSA_EU_AI_Act_High_Risk_AI_Management_System_Enterprise_Compliance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Aligning_SABSA_with_EU_Regulatory_Frameworks_Practitioner_Guide_NIS2_DORA_GDPR_Multi_Framework_Architecture_Compliance_Convergence_Strategy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Assurance%20Under%20Pressure%20-%20Delivering%20Regulatory-Grade%20Cyber%20Outcomes%20Against%20Fixed%20Deadlines%20in%20Mission-Critical%20Environments.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Audit-Ready%20by%20Design%20-%20Embedding%20Continuous%20Compliance%20into%20High-Consequence%20Operating%20Environments%20Without%20Slowing%20the%20Business.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Auditing_the_SABSA_Framework_Achieving_ISO27001_Compliance_Through_Architecture_Led_Assurance_Enterprise_Audit_Governance_Certification_Readiness.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Beyond%20Tick-Box%20Security%20-%20Engineering%20Defensible%20Assurance%20Outcomes%20Under%20NIS%20and%20Ofgem%20Oversight%20at%20National%20Enterprise%20Scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Beyond_Compliance_How_SABSA_Transforms_Security_Architecture_into_Business_Value_ROI_Competitive_Advantage_Procurement_Board_Confidence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Bridging%20Strategy%20and%20Execution%20-%20Building%20Cyber%20Risk%20Governance%20That%20Holds%20in%20Energy%20and%20Utilities%20Regulated%20Operating%20Environments.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Building_Resilient_Architectures_SABSA_Applied_Critical_Infrastructure_Protection_NIS2_IEC62443_NIST_CSF_Operational_Continuity_Defence_Strategy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/CAF%20in%20Practice%20-%20Designing%2C%20Executing%20and%20Defending%20Cyber%20Assessment%20Campaigns%20End-to-End%20Under%20Full%20Regulator%20Oversight.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Cloud_Security_Architecture_Under_SABSA_Navigating_Multi_Cloud_Complexity_NIS2_Alignment_Enterprise_Cloud_Security_Doctrine_Regulated_Sector.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Cyber%20Maturity%20as%20a%20Currency%20-%20Redefining%20Assurance%20Through%20NIS2%20and%20CAF%20Self-Assessment%20Frameworks%20for%20Regulated%20Operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Cyber%20Resilience%20in%20Operational%20Technology%20-%20Meeting%20Ofgem%20Expectations%20Without%20Slowing%20the%20Grid%20in%20Energy%20and%20Utilities%20Environments.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/DORA_Aligned_Architecture_Using_SABSA_to_Meet_Digital_Operational_Resilience_Requirements_Financial_Sector_ICT_Risk_TLPT_Incident_Reporting.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Data_Governance_and_Security_Architecture_Applying_SABSA_to_GDPR_Data_Protection_Obligations_Sovereignty_Privacy_by_Design_Regulated_Enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Doing%20More%20With%20Less%20-%20Delivering%20Enterprise-Grade%20Cyber%20GRC%20in%20Lean%20and%20Resource-Constrained%20Regulated%20Infrastructure%20Teams.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/End-to-End%20Cyber%20Governance%20-%20Owning%20Risk%2C%20Assurance%20and%20Delivery%20Across%20Regulated%20Infrastructure%20Environments%20with%20Conviction.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Evidence%20Over%20Opinion%20-%20Building%20Cyber%20Programmes%20That%20Prove%20Rather%20Than%20Claim%20Compliance%20to%20Regulators%2C%20Auditors%20and%20Boards.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/From%20Audit%20to%20Advantage%20-%20Turning%20NIS%20and%20CAF%20Compliance%20into%20Strategic%20Resilience%20Capability%20and%20Sustained%20Commercial%20Leverage.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/From%20Compliance%20to%20Resilience%20-%20Operationalising%20NIS2%20and%20CAF%20into%20Measurable%20Cyber%20Maturity%20for%20Critical%20National%20Infrastructure%20Operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/From%20Playbooks%20to%20Performance%20-%20Uplifting%20Incident%20Response%20Capability%20in%20NIS-Regulated%20Environments%20to%20Operational%20Command%20Standard.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Governing_Cyber_Risk_SABSA_Based_Board_Level_Accountability_Risk_Appetite_Architecture_Governance_Regulated_Enterprise_NIS2_DORA_Oversight.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Implementing_SABSA_Complex_Enterprise_Environments_Practitioners_Field_Guide_Multi_Cloud_Hybrid_Legacy_Architecture_Led_Deployment_Strategy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Integrating_SABSA_Across_the_Enterprise_Multi_Framework_Architecture_ISO27001_NIS2_IEC62443_Unified_Security_Architecture_Regulatory_Compliance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Mergers_and_Acquisitions_Cyber_Risk_SABSA_Based_Due_Diligence_Framework_AICE_Architecture_Integration_Security_Assessment_Deal_Lifecycle.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Operational%20Resilience%20Under%20Regulation%20-%20Translating%20CAF%20Assessments%20into%20Executive-Grade%20Decision%20Intelligence%20for%20Regulated%20Boards.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Operational_Technology_Security_Under_SABSA_Bridging_IT_OT_Convergence_IEC62443_NIS2_Industrial_Control_Systems_Critical_Infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Owning%20the%20Risk%20-%20Engineering%20Risk%20Registers%20That%20Drive%20Board-Level%20Cyber%20Decisions%20in%20Critical%20National%20Infrastructure%20Operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Post_Quantum_Readiness_Architecting_Cryptographic_Agility_with_SABSA_NIST_FIPS_203_204_205_PQC_Migration_Enterprise_Resilience_Strategy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Regulatory%20Confidence%20Engineering%20-%20Designing%20Cyber%20Programmes%20Built%20to%20Withstand%20NIS%20and%20Ofgem%20Scrutiny%20Without%20Blinking.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/SABSA_Centric_Enterprise_Security_Architecting_NIS2_Ready_ISO27001_Aligned_Resilience_at_Scale_Institutional_Architecture_Doctrine_Regulated_Enterprises.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/SABSA_for_Supply_Chain_Security_Architecting_Resilience_Across_Third_Party_Ecosystems_NIS2_DORA_ISO27001_Vendor_Risk_Architecture_Strategy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Tabletop%20to%20Reality%20-%20Designing%20High-Fidelity%20Cyber%20Exercises%20That%20Demonstrably%20Improve%20Resilience%20in%20Regulated%20Operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Testing%20the%20System%20Not%20the%20Slides%20-%20Advanced%20Tabletop%20Methodologies%20for%20Operators%20of%20Essential%20Services%20Under%20NIS%20Regulatory%20Oversight.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/The%20Last%20Mile%20of%20Cyber%20Governance%20-%20Where%20NIS%20Programmes%20Fail%20and%20How%20to%20Engineer%20Assurance%20That%20Holds%20Under%20Regulator%20Pressure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/The%20Ofgem%20Compliance%20Paradox%20-%20Moving%20from%20Checkbox%20Security%20to%20Measurable%20Risk%20Reduction%20Across%20Regulated%20Energy%20Operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/The_SABSA_Board_Reporting_Framework_Communicating_Cyber_Risk_at_Executive_Level_NIS2_DORA_Governance_Risk_Appetite_Metrics_Oversight.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/The_SABSA_Sovereignty_Model_Unifying_NIS2_GDPR_IEC62443_Defensible_Architecture_Data_Sovereignty_Regulatory_Control_Enterprise_Security_Doctrine.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Threat_Intelligence_Integration_Within_SABSA_Contextual_to_Operational_Defence_MITRE_ATT_CK_NIS2_Threat_Modelling_Architecture_Enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/Zero_Trust_Transformation_Integrating_SABSA_Modern_Network_Security_NIST_SP800_207_BeyondCorp_Enterprise_Zero_Trust_Architecture_at_Scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/advanced_exploitation_techniques_zero_day_research_custom_shellcode_bypass_engineering_post_exploitation_tradecraft_elite_security_operators.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversarial%20pattern%20recognition%20in%20ai%20systems%20a%20red-team%20framework%20for%20emerging%20web%20exploitation.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/adversary_simulation_regulated_environments_tiber_eu_dora_tlpt_governance_architecture_financial_sector_threat_led_penetration.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/agentic%20ai%20beyond%20guardrails%20-%20adaptive%20risk%20architectures%20for%20enterprise%20autonomy.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20driven%20identity%20intelligence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20engineering%20doctrine%20-%20extract%20chunk%20prompt%20evaluate%20-%20the%20four-phase%20engineering%20model%20for%20production-grade%20government%20ai.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20governance%20meets%20cyber%20governance%20-%20the%20emerging%20duty%20of%20convergence%20risk%20management%20and%20board%20accountability%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20incident%20command%20systems%20-%20crisis%20governance%20for%20autonomous%20systems.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20sovereignty%20in%20the%20justice%20stack%20-%20controlling%20models%20metadata%20and%20meaning%20-%20a%20sovereignty%20framework%20for%20national%20control%20of%20judicial%20ai%20assets.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20systems%20cyber%20doctrine-%20governance%20and%20operational%20control%20of%20algorithmic%20risk.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ai%20that%20survives%20court%20wins%20the%20market%20-%20the%20doctrine%20of%20litigation-grade%20security.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks-compliance-driven-security-blueprint-for-regulated-enterprises.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/antifragile%20identity.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/api_security_under_attack_penetration_testing_rest_graphql_grpc_interfaces_owasp_api_security_top_10_emerging_attack_vectors_flagship_edition.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting%20access%20by%20design.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting%20anonymous%20power%20a%20zero-trust%20blueprint%20for%20senior%20insiders.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting%20cloud-native%20ai%20stacks%20-%20a%20strategic%20framework%20for%20migrating%20.net%20to%20python-react.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting%20the%20ai%20control%20-%20enterprise%20governance%20for%20the%20agentic%20era.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/architecting%20the%20ai-native%20enterprise-%20identity%20as%20infrastructure%2C%20technical%20debt%20as%20liability%2C%20and%20the%20repricing%20of%20enterprise%20security.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/audit-proof%20by%20design%20-%20cra%20nis2%20compliance%20without%20slowing%20engineering.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/automation%20at%20scale%20python%20ansible%20rest%20apis%20in%20cni%20-%20infrastructure-as-code%20and%20policy-as-code%20at%20scale%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/autonomous%20identity%20governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex-enterprises-a-risk-aligned-security-architecture-methodology.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond%20binary%20edges%20how%20hyperedge-structured%20knowledge%20graphs%20eliminate%20clause%20fragmentation%20in%20llm-driven%20contract%20attribute%20extraction.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond%20certification%20campaigns.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond%20perimeter%20security%20physical-cyber%20convergence%20in%20airports%20-%20unified%20physical-cyber%20security%20operations%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond%20speech-to-text%20-%20end-to-end%20ai%20pipelines%20for%20transcription%20and%20intelligence%20-%20the%20full-stack%20ai%20pipeline%20architecture%20for%20judicial%20intelligence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure-advanced-identity-security-patterns-for-transformation.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/beyond_scanning_why_vulnerability_scanners_miss_68_percent_critical_security_findings_manual_penetration_testing_fills_gap_enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-aligned%20ciso%20blueprint%20-%20delivering%203%C3%97%20roi%20resilience%20across%20nis2%20%26%20dora%20compliance%20mandates.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/board-grade%20cyber%20resilience%20technical%20risk%20to%20executive%20accountability%20-%20fair%20quantification%20and%20board%20reporting%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/boardroom%20collapse%20in%2045%20seconds%20-%20the%20zero-hour%20command%20protocol.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/bridging%20strategy%20and%20execution%20security%20architect%20in%2024x7%20cni%20-%20board%20risk%20appetite%20to%20operational%20defence%20posture%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and-response-a-complete-security-operations-centre-blueprint.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/building-secure-azure-platforms-for-government-and-defence-cloud-environments-architecture-patterns-for-mission-critical-workloads.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cisco%20aci%20deep%20dive%20tenant%20vrf%20bridge%20domain%20epg%20design%20-%20policy-driven%20micro-segmentation%20in%20multi-tenant%20data%20centres%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ciso_2027_playbook-sovereign%20ai%20resilience%20%26%20quantum-proof%20identity.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/citrix%20netscaler%20and%20f5%20secure%20application%20delivery%20for%20aviation%20-%20waf%20ssl%20offload%20and%20load%20balancing%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud%20first%20identity%20governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets-policy-driven-governance-for-multi-jurisdictional-compliance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cloud_container_penetration_testing_aws_azure_gcp_kubernetes_security_validation_offensive_techniques_cloud_native_attack_paths_analysis.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/codified%20intelligence%20-%20establishing%20standards%20for%20interoperable%20ai%20-%20a%20standards%20framework%20for%20ai%20interoperability%20across%20government%20departments.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/commanding%20the%20crisis%20-%2090-day%20roadmap%20to%20boardroom%20confidence%20.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous_security_validation_annual_penetration_tests_automated_breach_attack_simulation_continuous_attack_surface_management.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/continuous_vulnerability_assessment_penetration_testing_cvapt_model_automated_scanning_manual_testing_threat_intelligence_assurance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/cyber%20governance%20for%20the%20regulated%20enterprise%20-%20multi-regulatory%20compliance%20dora%20nis2%20eu%20ai%20act%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign-standards-a-strategic-architecture-for-regulated-organisations.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing%20cyber-resilient%20airport%20networks%20-%20ot%20it%20segregation%20for%20airside%20landside%20passenger%20systems%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing%20ultra-high-reliability%20ai%20services%20-%20observability%20resilience%20and%20devsecops%20-%20the%20convergence%20of%20observability%20resilience%20and%20security%20for%20judicial%20ai.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/designing-secure-by-default-azure-architectures-for-high-sensitivity-environments-embedding-security-controls-at-the-foundation-layer.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/digital%20resilience%20by%20design%20anti-fragile%20infrastructure%20-%20architecture%20that%20gets%20stronger%20under%20stress%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/doctrine%20of%20digital%20proof%20-%20operationalising%20trust%20in%20ai-driven%20judicial%20systems%20-%20a%20formal%20framework%20for%20establishing%20evidentiary%20trust%20in%20machine-generated%20transcripts.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/dora%27s%20ai%20vendor%20trap%20-%20liability%20flows%2C%20capital%20charges%2C%20and%20board%20exit%20strategies.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/engineering%20truth%20-%20the%20ai%20pipeline%20as%20an%20instrument%20of%20national%20integrity%20-%20building%20ai%20systems%20worthy%20of%20national%20trust.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise%20firewall%20modernisation%20for%20critical%20national%20infrastructure%20-%20ips%20encrypted%20visibility%20policy%20engineering%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust-enforcement-building-the-secure-cloud-adoption-framework.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/executive_summary_polished_final%20v9.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fiduciary_defence_dossier_template%20v7.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/fortifying%20the%20pipeline%20-%20devsecops%20doctrine%20for%20ai-enabled%20judicial%20services%20-%20security-first%20ci-cd%20for%20machine%20learning%20in%20government%20infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20compliance%20mandate%20to%20competitive%20advantage%20in%20the%20ai%20era.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20compliance%20to%20competitive%20advantage%20board-level%20cyber%20governance%20under%20dora%20%26%20nis2.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20compliance%20to%20conformity%20-%20operationalising%20cra%20and%20nis2.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20pov%20to%20production%20-%20the%20blueprint%20for%20resilient%20ai%20in%20public%20infrastructure%20-%20crossing%20the%20valley%20of%20death%20between%20ai%20proof-of-value%20and%20national%20deployment.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20prototype%20to%20public%20infrastructure%20-%20engineering%20production-grade%20ai%20transcription%20-%20the%20engineering%20doctrine%20for%20scaling%20ai%20from%20lab%20to%20live%20service.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20regulation%20to%20runtime%20-%20engineering%20cra%20nis2%20dora%20into%20product%20security.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from%20scapegoat%20to%20sovereign%20-%20the%20ciso%20authority%20doctrine.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from_findings_to_fixes_remediation_driven_penetration_testing_programme_closes_security_gap_through_governance_framework_flagship_edition.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/from_pentest_to_threat_intelligence_offensive_security_findings_feed_strategic_threat_intelligence_mitre_att_ck_proactive_defence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/global%20identity%20at%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/governing%20agentic%20enterprise%20-%20from%20shadow%20ai%20to%20autonomous%20security.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/governing%20machine%20identities.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/harmonizing%20dora%20-%20how%20to%20stop%20duplicating%20controls%20and%20build%20a%20single%20resilience%20framework%20for%20european%20finserv.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/high-availability%20and%20disaster%20recovery%20for%20mission-critical%20aviation%20-%20sub-second%20failover%20and%20zero-data-loss%20recovery%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/iam_governance_elite_v4.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity%20as%20doctrine.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity%20governance%20as%20infrastructure%20-%20translating%20policy%20into%20automated%20control%20architecture%20for%20the%20autonomous%20enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity%20is%20the%20new%20perimeter%20zero%20trust%20governance%20blueprint%20-%20identity-centric%20security%20at%20enterprise%20scale%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity%20warehouse%20to%20enforcement%20edge.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional-access-at-scale-designing-the-enterprise-identity-control-plane.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/information%20governance%20for%20autonomous%20metro%20infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/infrastructure_penetration_testing_active_directory_network_segmentation_lateral_movement_exploiting_defending_enterprise_infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/institutionalising%20product%20security%20-%20operating%20model%20cra%20nis2.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/ironclad%20anonymization%20-%20deterministic%20redaction%20frameworks%20for%20the%20ministry%20of%20justice%20-%20engineering%20near-zero-leakage%20pii%20redaction%20for%20judicial%20ai%20at%20national%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/joiner%20mover%20leaver%20to%20institutional%20control.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/judicial%20ai%20at%20scale%20-%20architecting%20resilient%20secure%20and%20governed%20platforms%20-%20a%20sovereign%20infrastructure%20blueprint%20for%20national-scale%20judicial%20ai.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at-scale-building-an-integrated-detection-analytics-platform.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/modern_penetration_testers_playbook_mastering_burp_suite_pro_metasploit_custom_exploit_development_enterprise_security_engagements.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/navigating_nca_ecc_saudi_arabia_national_cybersecurity_authority_essential_controls_penetration_testing_compliance_kingdom_framework.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/offensive_security_in_practice_comprehensive_framework_penetration_testing_web_api_infrastructure_methodology_governance_flagship_edition.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational%20doctrine%20for%20responsible%20ai%20engineering%20-%20the%20engineering%20playbook%20for%20operationalising%20ai%20ethics%20at%20enterprise%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational%20resilience%20by%20design%20engineering%20zero-downtime%20operations%20-%20disciplined%20change%20management%20and%20validation%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operational%20resilience%20by%20design%20the%20governance%20doctrine%20for%20essential%20entity%20survival.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security-perimeter-doctrine-level-implementation-framework-for-enterprises.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/prevention%20is%20dead%20the%20rise%20of%20resilience-based%20ai%20risk%20governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/privileged%20access%20as%20regulated%20infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/product%20security%20as%20doctrine%20-%20board-grade%20model%20cra%20nis2%20sbom.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/provable%20autonomy%20-%20the%20governance%20architecture%20for%20mission-critical%20ai.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/red_team_insights_blue_team_resilience_purple_team_methodology_closing_detection_response_gap_enterprise_security_operations_centre.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/regulation%20as%20code%20-%20operationalising%20cra%20nis2%20dora.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/resilient%20runways%20deterministic%20network%20architecture%20for%20air%20traffic%20-%20fault-tolerant%20network%20fabrics%20for%20aviation%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption-embedding-threat-modelling-and-ma-cyber-due-diligence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/saviynt%20iga%20at%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/saviynt%20sod%20new%20control%20plane.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sdf_board_governance_infographic%20v5.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/secure%20by%20design%20prove%20by%20evidence%20-%20product%20security%20doctrine.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing%20generative%20ai%20in%20schools%20-%20a%20red%20team-driven%20framework%20for%20safeguarding%2C%20compliance%2C%20and%20risk%20reduction.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing%20the%20skies%20zero%20trust%20micro-segmentation%20in%20aviation%20ot%20it%20-%20policy-driven%20network%20isolation%20for%20aviation%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises-prescriptive-architecture-patterns-for-multi-subscription-estates.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-azure-transformation-journey-embedding-security-from-strategy-to-execution-a-comprehensive-transformation-security-framework.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture-mcra-in-ksa-enterprises-a-practitioner-level-guide.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security-assurance-in-azure-transformation-programmes-frameworks-controls-and-governance-a-comprehensive-enterprise-assurance-model.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/security_reporting_that_drives_action_translate_technical_penetration_test_findings_board_level_risk_decisions_executive_governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/simulating_the_adversary_tiber_eu_dora_tlpt_threat_led_penetration_testing_financial_services_sector_architecture_framework_flagship_edition.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure-architecture-satisfying-kingdom-sovereignty-requirements.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/synthetic%20intelligence%20as%20a%20service%20-%20orchestrating%20the%20judicial%20api%20ecosystem%20-%20designing%20the%20api%20layer%20for%20national%20judicial%20intelligence%20services.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/testing_modern_attack_surface_cloud_container_api_mobile_security_validation_post_perimeter_enterprise_architecture_governance_flagship_edition.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%202035%20breakpoint%20%20ai%2C%20cryptographic%20collapse%2C%20and%20the%20end%20of%20voluntary%20security%20models.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%204-hour%20clock%20board%20liability%20in%20the%20age%20of%20dora%2C%20nis2%2C%20and%20ai%20regulation.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20agentic%20ai%20attack%20surface%20-%20autonomous%20agents%2C%20tool%20misuse%2C%20and%20the%20rise%20of%20machine-speed%20e.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20agentic%20autonomy%20protocol%20-%20governing%20non-human%20identities%20in%20the%20autonomous%20enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20agentic%20risk%20doctrine%20-%20board-level%20control%20of%20autonomous%20ai%20before%20it%20controls%20you.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20agentic%20risk%20doctrine%20-%20tech%20specs.%20pdf.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20ai%20security%20-%20assurance%20crisis.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20ai-driven%20threat%20frontier%20-%20zero%20trust%2C%20identity%20%26%20supply%20chain%20resilience.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20api-first%20ai%20state%20-%20reusable%20intelligence%20services%20for%20government%20-%20designing%20composable%20ai%20services%20for%20cross-government%20interoperability.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20architecture%20of%20accountability%20-%20designing%20observability%20and%20compliance%20into%20ai%20-%20building%20auditable%20transparent%20and%20compliant%20ai%20from%20the%20ground%20up.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20auditory%20record%20-%20architecting%20sovereign%20fidelity%20in%20automated%20judicial%20transcription%20-%20a%20doctrine-level%20blueprint%20for%20national-scale%20speech%20sovereignty.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20boardroom%20cyber%20playbook%20-%20governance%2C%20resilience%2C%20and%20value%20creation.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20ciso%20autonomy%20mandate%20-%20command%2C%20control%2C%20and%20governance%20for%20agentic%20ai%20systems.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20ciso%20identity%20mandate.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20ciso_transformation_playbook%20from%20cost%20centre%20to%20chief%20trust%20officer.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20conformity%20advantage%20-%20product%20security%20as%20differentiator.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20defensible%20ciso%20-%20an%20evidence-based%20ai%20risk%20doctrine%20for%20regulatory%20and%20board%20assurance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20future%20of%20privileged%20access%20zsp%20jit%20vault%20architecture%20-%20securing%20administrative%20power%20in%20high-trust%20environments%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20governance%20deficit.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20governance%20premium%20-%20repricing%20cyber%20risk.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20identity%20control%20plane%20-%20zero-trust%20governance%20for%20agentic%20ai%20and%20regulated%20enterprises.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20identity%20hegemony.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20identity%20moat.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20identity%20utility%20-%20architecting%20global%20iam%20as%20foundational%20gxp%20infrastructure.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20institutional%20liability%20doctrine%20-%20governance%20as%20legal%20infrastructure%20in%20the%20autonomous%20a.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20integration%20imperative.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20n-ary%20mandate%20-%20using%20hyperedge%20knowledge%20graphs%20to%20eliminate.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20regulatory%20product%20security%20doctrine%20-%20audit-proof%20software%20at%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20regulatory%20readiness%20playbook%20-%20cra%20nis2%20engineering%20control.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20resilience%20mandate%20-%20engineering%20stability%20in%20national%20transcription%20systems%20-%20operational%20resilience%20engineering%20for%20mission-critical%20judicial%20ai.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20responsible%20core%20-%20institutionalizing%20evaluation%20and%20ethical%20guardrails%20in%20government%20llms%20-%20a%20governance%20framework%20for%20responsible%20ai%20deployment%20in%20public%20sector.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20sap%20payroll%20transformation%20playbook%20-%20mitigating%20risk%20and%20maximizing%20value%20in.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20semantic%20gavel%20-%20precision%20llm-summarisation%20in%20high-stakes%20litigation%20-%20engineering%20legal-grade%20ai%20summarisation%20for%20court%20proceedings.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20sovereign%20%20defensibility%20framework%20full.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20sovereign%20banking%20protocol%20-%20architecting%20regulatory-controlled%20pam%2C%20grc%20%2C%20autonomous%20defence.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20sovereign%20courtroom%20-%20scaling%20azure%20ai%20for%20resilient%20legal%20operations.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20sovereign%20zero%20trust%20model%20-%20data%20immunity%20and%20supply%20chain%20resilience%20in%202026.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20trust%20fabric%20identity%20network%20and%20governance%20in%20one%20security%20model%20-%20converging%20iam%20and%20policy%20governance%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20velocity%20mandate%20-ciso%20architecture%20for%20the%20zero-latency%20agentic%20enterprise.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the%20zero-hour%20doctrine%20-%20how%20leaders%20prevent%20institutional%20collapse%20in%20the%20age%20of%20algorithmic%20crisis.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the-unified-shield-architecting-detection-and-response-with-microsoft-defender-and-sentinel-converging-xdr-and-siem-for-operations.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/the_247_soc_optimising_siem_soar_workflows_real_time_threat_detection_incident_response_financial_services_operations_governance.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat%20management%20for%2024x7%20operations%20networks%20-%20detection%20engineering%20and%20soc%20runbooks%20for%20critical%20infrastructure%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/threat_detection_through_offensive_testing_red_team_operations_expose_siem_gaps_harden_detection_rules_real_time_response_capability.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise-azure-environments-five-stage-quantified-assessment-framework.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/web_application_security_in_depth_owasp_top_10_business_logic_flaws_zero_day_discovery_penetration_testing_framework_practitioners.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/why%20ai%20pilots%20fail%20-%20under%20regulatory%20scrutiny%20%20the%2090-day%20control%20architecture%20for%20enterprise%20deployment.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero%20latency%20trust.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero%20trust%20identity%20at%20scale.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust%20ai%20architecture%20-%20securing%20autonomous%20agents%2C%20apis%2C%20and%20decision%20systems.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust%20identity%20governance%20and%20administration%20%28iga%29.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero-trust%20segmentation%20for%20airport%2024x7%20operations%20networks%20-%20cisco%20aci%20and%20ngfw%20reference%20architecture%20-%20prof%20kieran%20upadrasta.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.kieransky.com/docs/zero_hour_doctrine_publisher_abstract%20v7.pdf</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
</urlset>
