<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://web.isc2ncrchapter.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://web.isc2ncrchapter.org/important-security-news-flash-regarding-ssh-vulnerabilities/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/bringing-new-entrants-into-a-hundred-year-business/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-member-endorsement-process-goes-online/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/opportunity-for-young-people/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/transparency-and-the-journey-to-digital-health/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/white-house-strategy-proposes-the-next-cyber-career-trend/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2016-isc2-security-congress-general-session-to-focus-on-ciso-impact/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/former-pittsburgh-steel-worker-and-former-new-orleans-saxophonist-partner-to-cover-cybersecurity-blind-spots/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-career-path-that-leads-from-economics-to-data-analytics/</loc><lastmod>2016-08-29T00:24:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/in-cybersecurity-professional-practice-transcends-politics/</loc><lastmod>2016-08-29T00:24:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-course-and-book-discounts/</loc><lastmod>2017-05-15T22:41:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-james-simonetti/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/from-town-hall-to-margaritaville-security-congress-member-events/</loc><lastmod>2016-09-04T22:11:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/call-for-nominations-2017/</loc><lastmod>2016-10-09T22:39:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-infosec17-edition/</loc><lastmod>2017-07-03T06:05:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-we-learned-from-this-months-european-gisws-report/</loc><lastmod>2017-06-29T03:06:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-aoba-mari/</loc><lastmod>2017-06-26T01:32:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/weekly-security-headlines-still-crying-and-fireball/</loc><lastmod>2017-06-21T23:45:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/earn-cpes-with-bug-bounty/</loc><lastmod>2017-06-20T23:32:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-samana-haider/</loc><lastmod>2017-06-19T22:59:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/five-reasons-to-nominate-someone-for-the-first-isc%c2%b2-emea-islas/</loc><lastmod>2017-06-18T22:34:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-frederico-hakamine/</loc><lastmod>2017-06-16T21:48:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/weekly-security-headlines-wannacry-spillover-mickey-mouse-hacked-docusign-phishing-and-560-million-passwords/</loc><lastmod>2017-06-15T21:38:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-stop-and-remediate-wannacry/</loc><lastmod>2017-05-18T17:45:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-haruhiko-kurita/</loc><lastmod>2017-07-04T06:33:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/continuing-the-conversation-spearphishing/</loc><lastmod>2017-07-06T07:22:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-malware-malware-malware/</loc><lastmod>2017-07-07T07:32:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/recognize-the-best-in-cybersecurity-guide-for-isc%c2%b2-emea-isla-nominators/</loc><lastmod>2017-07-12T09:12:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-for-cybersecurity-job-healthcare-is-hiring/</loc><lastmod>2017-07-13T09:22:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-we-make-the-cybersecurity-profession-agile/</loc><lastmod>2017-07-16T11:21:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-jae-h-moon/</loc><lastmod>2017-07-20T12:31:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-isla-winners-from-around-the-world/</loc><lastmod>2017-07-24T13:31:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/being-the-fly-on-the-wall-the-latest-observations-from-the-isc%c2%b2-members-gdpr-task-force/</loc><lastmod>2017-07-24T13:31:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/weekly-security-headlines-iot-and-ransomware/</loc><lastmod>2017-07-26T14:08:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/associate-spotlight-meet-lucy-chaplin/</loc><lastmod>2017-07-27T14:18:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/continuing-the-conversation-more-secure-cloud/</loc><lastmod>2017-08-03T17:05:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-notpetya-and-the-most-hackable-countries-in-the-world/</loc><lastmod>2017-08-06T18:38:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/associate-spotlight-meet-paul-mcaleer/</loc><lastmod>2017-08-08T19:17:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-weekend-warriors-sim-swapping-and-more/</loc><lastmod>2017-08-10T20:01:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-hatem-ahmed-el-sahhar/</loc><lastmod>2017-08-14T21:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-iot-and-got/</loc><lastmod>2017-08-15T21:35:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-it-the-solution-to-filling-cybersecurity-workforce-gap/</loc><lastmod>2017-08-21T23:34:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-paul-arnaud-wernert/</loc><lastmod>2017-08-17T22:01:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-ronald-ricohermoso/</loc><lastmod>2017-08-22T23:50:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-black-hat-edition/</loc><lastmod>2017-08-24T00:01:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-hacking-atms-hbo-and-more/</loc><lastmod>2017-08-25T00:11:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-rob-turner/</loc><lastmod>2017-08-29T01:30:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/siem-understanding-parsing-and-correlating-logs/</loc><lastmod>2017-08-31T02:58:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-payouts-and-panic/</loc><lastmod>2017-09-01T03:09:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/umuc-cybersecurity-advanced-degree-fellowship-cadf-program/</loc><lastmod>2017-08-15T21:04:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-does-125000-isc%c2%b2-members-mean-to-you/</loc><lastmod>2017-09-12T05:41:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-real-solution-to-youth-cyber-crime/</loc><lastmod>2017-09-14T06:36:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-pseudo-ransomware-and-security-budgets/</loc><lastmod>2017-09-15T06:54:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/gartner-expects-93-billion-in-security-spend-but-whats-missing/</loc><lastmod>2017-09-18T08:17:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-mark-a-singer/</loc><lastmod>2017-09-18T08:17:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/whats-your-favorite-isc%c2%b2-member-benefit/</loc><lastmod>2017-09-20T09:00:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-word-malware-cloud-disasters-and-more/</loc><lastmod>2017-09-21T09:16:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-adam-boulton/</loc><lastmod>2017-09-22T09:25:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/top-10-isc%c2%b2-webcasts-of-2017/</loc><lastmod>2017-09-24T10:05:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-spying-stealing/</loc><lastmod>2017-09-26T11:18:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-tom-musgrave/</loc><lastmod>2017-09-29T12:19:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-collar-jobs-act-can-support-cyber/</loc><lastmod>2017-10-02T13:14:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-world-cup-it-and-everything-in-between/</loc><lastmod>2017-10-04T14:01:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/natural-disasters-put-the-a-in-the-cia-triad-to-test/</loc><lastmod>2017-10-09T15:07:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/open-source-and-associated-risks-are-the-new-normal/</loc><lastmod>2017-10-05T14:11:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/lack-of-training-and-resources-plagues-it-security-teams/</loc><lastmod>2017-10-10T15:45:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ciso-vs-cio-turf-war-casts-shadow-cybersecurity/</loc><lastmod>2017-10-11T16:18:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-do-you-know-where-your-data-records-are/</loc><lastmod>2017-10-12T16:35:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-jasmin-landry/</loc><lastmod>2017-10-15T18:38:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-mr-toh-tai-ann/</loc><lastmod>2017-10-16T19:11:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-congress-edition/</loc><lastmod>2017-10-17T19:32:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/so-what-makes-isc%c2%b2-events-different-from-the-rest/</loc><lastmod>2017-10-19T20:21:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/call-for-nominations-2018/</loc><lastmod>2017-10-03T20:54:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/leadership-problem-cybersecurity-poorly-understood-by-top-management/</loc><lastmod>2017-10-20T20:33:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-hackers-breaches-and-fake-news/</loc><lastmod>2017-10-22T21:00:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-non-eu-based-businesses-may-be-affected-by-the-eu-general-data-protection-regulation-gdpr/</loc><lastmod>2017-10-23T21:25:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/join-the-isc%c2%b2-community/</loc><lastmod>2017-10-24T21:41:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-bridget-kenyon/</loc><lastmod>2017-10-25T21:50:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-all-the-hacking/</loc><lastmod>2017-10-26T22:21:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/krack-exploit-ruining-your-day/</loc><lastmod>2017-10-31T00:47:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-john-mccumber/</loc><lastmod>2017-11-01T01:03:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-tony-harris/</loc><lastmod>2017-11-01T01:03:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-from-krack-to-the-doj/</loc><lastmod>2017-11-03T01:34:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-peter-oboyle/</loc><lastmod>2017-11-04T01:44:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-tiffany-temple/</loc><lastmod>2017-11-07T02:44:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-certification-matters-for-cloud-service-providers/</loc><lastmod>2017-11-08T03:04:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cyber-security-awareness-month/</loc><lastmod>2017-11-09T03:15:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-melanie-oldham/</loc><lastmod>2017-11-10T03:25:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-hopping-around/</loc><lastmod>2017-11-12T04:23:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-andre-koenegras/</loc><lastmod>2017-11-13T04:59:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-legislation-key-to-security-in-iot/</loc><lastmod>2017-11-16T06:45:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-richard-carpenter/</loc><lastmod>2017-11-15T05:54:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-headlines-passwords-remain-a-problem-for-some-but-dont-be-spooked-by-cyber/</loc><lastmod>2017-11-20T07:58:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/has-science-fiction-become-reality/</loc><lastmod>2017-11-20T07:58:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-denise-murtagh-dunne/</loc><lastmod>2017-11-22T08:26:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-greg-harris/</loc><lastmod>2017-11-26T10:06:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/iso-27001-between-the-reality-and-the-myth/</loc><lastmod>2017-11-27T10:32:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/weekly-security-headlines-hearings-guidelines-and-news/</loc><lastmod>2017-11-29T11:24:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-brencil-kaimba/</loc><lastmod>2017-12-01T13:09:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/mobile-payment-systems-disruptive-development-and-cyber-risks/</loc><lastmod>2017-12-04T14:03:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ready-set-go-5-steps-to-set-yourself-up-for-certification-success/</loc><lastmod>2017-12-05T14:48:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-tweaks-how-certification-helps/</loc><lastmod>2017-12-06T15:19:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/introducing-isc%c2%b2-emea-isla-2017-finalist-patrick-wheeler/</loc><lastmod>2017-12-10T16:11:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-roundup-were-all-in-this-together/</loc><lastmod>2017-12-06T15:19:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-marco-fernandes/</loc><lastmod>2017-12-11T16:22:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/holiday-shoppers-may-avoid-taking-uber-with-online-shopping-but-they-are-still-at-risk-of-cyberattacks/</loc><lastmod>2017-12-13T16:47:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2s-ten-most-popular-emea-webinars/</loc><lastmod>2017-12-14T17:03:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-endorsement-demystified/</loc><lastmod>2017-12-17T18:08:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/as-cyber-grows-more-popular-so-do-techniques-for-developing-security-skills/</loc><lastmod>2017-12-18T18:19:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-mario-bardowell/</loc><lastmod>2017-12-19T18:32:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/exploring-industrial-cyber-physical-security-enhancement/</loc><lastmod>2017-12-20T18:49:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-james-packer/</loc><lastmod>2018-01-01T22:35:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/breached-data-keeping-it-secret-doesnt-make-it-go-away/</loc><lastmod>2017-12-21T19:05:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/with-new-leadership-at-the-helm-dhs-may-recruit-more-talent/</loc><lastmod>2018-01-01T22:35:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-now-registered-with-credential-engine/</loc><lastmod>2018-01-03T23:00:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/share-your-cybersecurity-insight-in-new-orleans/</loc><lastmod>2018-01-07T23:52:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/winners-of-the-isc%c2%b2-emea-isla-are-revealed/</loc><lastmod>2018-01-10T00:32:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2018-board-of-directors-election-results/</loc><lastmod>2017-12-17T09:13:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/reaching-more-cybersecurity-professionals-in-a-growing-market/</loc><lastmod>2018-01-15T02:41:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-todd-painter/</loc><lastmod>2018-01-17T03:06:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/4-things-you-need-to-know-about-the-isc%c2%b2-cissp-cat-exam/</loc><lastmod>2018-01-22T05:06:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/happy-new-security-year/</loc><lastmod>2018-01-23T05:34:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/holiday-risks-shopping-scams-in-retail-travel-and-hospitality/</loc><lastmod>2018-01-25T06:59:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/do-you-feel-what-i-feel-cybersecuritys-impact-of-humans-and-machines/</loc><lastmod>2018-01-31T08:24:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-secure-summit-uk-insights-iot-legislation-is-coming-can-manufacturers-get-their-act-together/</loc><lastmod>2018-01-29T07:52:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-secure-summit-uk-insights-digital-forensics-past-present-and-future/</loc><lastmod>2018-02-01T08:43:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-sohail-awad/</loc><lastmod>2018-02-04T10:19:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-the-cissp-cat-exam-like/</loc><lastmod>2018-02-06T10:42:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/top-10-cloud-security-webinars/</loc><lastmod>2018-02-11T12:26:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-david-schneider/</loc><lastmod>2018-02-14T13:16:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/check-off-a-new-years-resolution-speak-at-a-cybersecurity-event/</loc><lastmod>2018-02-18T14:56:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-simon-morgan/</loc><lastmod>2018-02-20T15:19:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-secure-summit-uk-insights-the-future-impact-of-ai-in-cybercrime/</loc><lastmod>2018-02-21T15:32:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/limited-time-opportunity-free-forensics-lab/</loc><lastmod>2018-02-25T16:46:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-timothy-meryweather/</loc><lastmod>2018-02-27T17:22:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/center-for-cyber-safety-and-education-named-nonprofit-of-the-year/</loc><lastmod>2018-02-28T17:33:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/gdpr-with-a-smile/</loc><lastmod>2018-03-01T17:47:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-hiring-an-issue-for-all/</loc><lastmod>2018-03-05T19:12:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-wai-sheng-cheng/</loc><lastmod>2018-03-12T20:29:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/throwback-thursday-security-congress-in-austin/</loc><lastmod>2018-03-14T20:56:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ways-to-earn-cissp-cpes/</loc><lastmod>2018-03-14T20:56:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/associate-of-isc%c2%b2-spotlight-rachel-phillips/</loc><lastmod>2018-03-19T22:39:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-focus-on-cyber-risk-is-it-time-to-stop-talking-security/</loc><lastmod>2018-03-29T01:50:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/welcome-to-the-lexicon-project/</loc><lastmod>2018-03-30T02:09:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hiring-a-cybersecurity-worker-heres-what-you-need-to-know/</loc><lastmod>2018-04-02T03:04:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/scholarship-opportunities-with-isc%c2%b2-and-the-center-for-cyber-safety-and-education/</loc><lastmod>2018-04-09T04:53:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/people-and-technology-a-two-pronged-approach-to-closing-the-skills-gap/</loc><lastmod>2018-04-11T05:16:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-does-cissp-cat-mean-for-you/</loc><lastmod>2018-04-16T06:18:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-bryan-bell/</loc><lastmod>2018-04-19T06:51:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-minority-cybersecurity-workers-face-workplace-disadvantages/</loc><lastmod>2018-05-03T11:16:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ghana-chapter-plays-key-role-in-securing-republics-digital-journey/</loc><lastmod>2018-04-19T06:51:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/user-awareness-keeps-cybersecurity-jobseekers-busy/</loc><lastmod>2018-05-10T12:58:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-debi-carr/</loc><lastmod>2018-05-13T13:43:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-item-writing-explained/</loc><lastmod>2018-05-15T14:12:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/two-steps-to-a-robust-security-culture/</loc><lastmod>2018-05-16T14:55:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/enable-isc%c2%b2-members-can-access-cloud-security-training-from-a-cloud-guru/</loc><lastmod>2018-05-20T16:42:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/associate-of-isc%c2%b2-thien-phan/</loc><lastmod>2018-05-23T17:43:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2765-2/</loc><lastmod>2018-04-13T16:53:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/announcing-the-isla-government-finalists/</loc><lastmod>2018-05-28T19:31:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-paul-bryant/</loc><lastmod>2018-06-06T22:03:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-bangalore/</loc><lastmod>2018-06-03T21:12:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-gender-gap-female-and-male-cybersecurity-pros-have-more-in-common-than-not/</loc><lastmod>2018-06-12T00:16:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-back-secure-summit-dc/</loc><lastmod>2018-06-21T02:51:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-spotlight-kreesan-govender/</loc><lastmod>2018-07-03T06:40:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-the-ciso-well-positioned-to-mitigate-operational-risk/</loc><lastmod>2018-07-08T08:37:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/attacks-happen-be-ready/</loc><lastmod>2018-07-11T10:34:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-security-concerns-grow-as-incidents-rise/</loc><lastmod>2018-07-15T11:59:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-ssdc/</loc><lastmod>2018-07-18T12:37:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/icandocyber-denise-murtagh-dunne/</loc><lastmod>2018-07-22T14:09:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-spotlight-dr-mari-spina/</loc><lastmod>2018-07-25T14:37:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-millennials-dont-see-career-path-in-cybersecurity/</loc><lastmod>2018-08-06T18:26:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/make-a-lasting-impact-while-in-new-orleans-during-isc%c2%b2-security-congress/</loc><lastmod>2018-08-15T21:48:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-hawaii/</loc><lastmod>2018-08-27T01:15:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/10-discount-on-isc%c2%b2-direct-training-seminars-for-ncr-chapter-members/</loc><lastmod>2018-06-27T18:24:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/dont-be-a-sitting-duck-in-the-next-ot-cyberattack/</loc><lastmod>2018-08-30T02:11:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/uptick-in-cybersecurity-job-searches-confirms-openness-to-new-employment/</loc><lastmod>2018-09-04T03:06:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/data-privacy-laws-in-europe-and-california-a-boon-to-jobseekers/</loc><lastmod>2018-09-06T03:56:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/thinktank-named-fastest-growing-it-webinar-channel/</loc><lastmod>2018-09-07T04:19:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-london/</loc><lastmod>2018-09-07T04:19:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-growing-nuisance-how-to-fend-off-bad-bots/</loc><lastmod>2018-09-09T04:40:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-ways-to-get-the-most-out-of-security-congress/</loc><lastmod>2018-09-10T05:07:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-first-hand-experience-with-cissp-cat/</loc><lastmod>2018-09-11T05:30:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapters-spotlight-leadership-meetings/</loc><lastmod>2018-09-17T07:05:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/avoiding-the-security-pitfalls-of-digital-transformation/</loc><lastmod>2018-09-20T07:44:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-your-cybersecurity-advocate-5-questions-with-tony-vizza/</loc><lastmod>2018-09-20T07:44:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-rema-deo/</loc><lastmod>2018-09-23T08:21:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/now-available-cissp-issap-and-cissp-issep-training/</loc><lastmod>2018-09-24T08:38:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/one-year-since-equifax/</loc><lastmod>2018-09-26T09:03:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/making-cyber-threats-big-data-manageable/</loc><lastmod>2018-09-25T08:48:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-is-gender-an-issue-in-cyber-security-and-what-can-be-done-to-redress-the-balance/</loc><lastmod>2018-09-30T10:19:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-london-chapter-developing-education-framework/</loc><lastmod>2018-10-01T10:31:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-issap-spotlight-patrick-liu/</loc><lastmod>2018-10-03T10:59:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/register-to-attend-cybermaryland-2018/</loc><lastmod>2018-09-13T09:16:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-hayato-kiriyama/</loc><lastmod>2018-10-04T11:11:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-importance-of-a-strong-cybersecurity-culture/</loc><lastmod>2018-10-07T11:57:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-singapore/</loc><lastmod>2018-10-05T11:24:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-meet-shelly-epps/</loc><lastmod>2018-10-08T12:31:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-does-a-successful-cybersecurity-team-look-like/</loc><lastmod>2018-10-08T12:31:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/free-gdpr-course-for-members/</loc><lastmod>2018-10-08T12:31:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-shinji-abe/</loc><lastmod>2018-10-09T12:47:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-ana-ferreira/</loc><lastmod>2018-10-09T12:47:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-the-ciso-matters/</loc><lastmod>2018-10-10T12:57:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-organizations-with-strong-cybersecurity-cultures-prepare-their-teams/</loc><lastmod>2018-10-11T13:18:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/blockchain-in-security-lessons-learned-from-nation-state-experience/</loc><lastmod>2018-10-17T14:56:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/censor-robots-using-ai-to-redact-confidential-information/</loc><lastmod>2018-10-18T15:13:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-making-cybersecurity-cool-to-close-the-skills-gap/</loc><lastmod>2018-10-18T15:13:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-crossing-a-border-assume-youll-be-searched/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-the-challenge-of-securing-industrial-environments/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-how-to-stop-phishing-patch-the-users/</loc><lastmod>2018-10-18T15:13:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-cyber-pros-flock-to-presentation-on-tools-tips-and-techniques/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-theresa-payton-stop-blaming-the-user/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-should-you-get-cyber-insurance/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-blockchain-the-future-of-cybersecurity/</loc><lastmod>2018-10-18T15:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-skills-shortage-soars-nearing-3-million/</loc><lastmod>2018-10-18T08:11:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-skills-shortage-soars-nearing-3-million-2/</loc><lastmod>2018-11-14T23:46:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-blockchain-the-future-of-cybersecurity-2/</loc><lastmod>2018-11-11T22:54:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-should-you-get-cyber-insurance-2/</loc><lastmod>2018-11-07T21:44:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-cyber-pros-flock-to-presentation-on-tools-tips-and-techniques-2/</loc><lastmod>2018-11-05T21:02:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-theresa-payton-stop-blaming-the-user-2/</loc><lastmod>2018-11-05T21:02:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-crossing-a-border-assume-youll-be-searched-2/</loc><lastmod>2018-11-04T20:33:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-the-challenge-of-securing-industrial-environments-2/</loc><lastmod>2018-10-28T17:47:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-how-to-stop-phishing-patch-the-users-2/</loc><lastmod>2018-10-24T16:54:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/live-from-isc2congress-making-cybersecurity-cool-to-close-the-skills-gap-2/</loc><lastmod>2018-10-24T16:54:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/censor-robots-using-ai-to-redact-confidential-information-2/</loc><lastmod>2018-10-22T16:11:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/workforce-study-methodology-and-defining-the-gap/</loc><lastmod>2018-11-19T00:46:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/csslp-members-your-feedback-is-requested/</loc><lastmod>2018-11-29T03:07:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-recap/</loc><lastmod>2018-11-27T02:47:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/highlights-from-security-congress-2018-and-what-to-look-forward-to/</loc><lastmod>2018-12-03T03:58:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-strengthen-your-cybersecurity-culture-despite-the-skills-shortage/</loc><lastmod>2018-12-06T04:56:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-creates-point-of-entry-to-cyber-career/</loc><lastmod>2018-12-09T06:03:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/honoring-the-fellows-of-isc%c2%b2/</loc><lastmod>2018-12-07T05:22:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/infographic-building-a-resilient-cybersecurity-culture/</loc><lastmod>2018-12-13T07:11:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-scholarships-from-isc%c2%b2-and-the-center-for-cyber-safety-and-education/</loc><lastmod>2018-12-14T07:31:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/so-you-think-you-can-cyber/</loc><lastmod>2018-12-19T08:46:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/deep-dive-into-cissp-salary-data/</loc><lastmod>2018-12-20T09:01:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/giving-tuesday/</loc><lastmod>2018-12-20T09:01:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-george-chacko/</loc><lastmod>2018-12-25T10:30:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-cyberattacks-pose-big-business-risks-around-the-globe/</loc><lastmod>2019-01-01T13:00:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-shawn-oreilly/</loc><lastmod>2019-01-03T13:47:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-presents-to-nice-working-group/</loc><lastmod>2019-01-06T14:54:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-and-isc%c2%b2-membership-recognized-by-the-ncsc/</loc><lastmod>2019-01-08T15:28:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hcispp-spotlight-ramana-krothapalli/</loc><lastmod>2019-01-09T15:53:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-named-as-finalist-for-best-professional-certification-program-award/</loc><lastmod>2019-01-14T16:58:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-issap-members-your-feedback-is-requested/</loc><lastmod>2019-01-22T19:32:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/beware-of-scams-this-holiday-season/</loc><lastmod>2019-01-27T20:46:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/thank-you-for-another-exciting-year/</loc><lastmod>2019-01-24T20:01:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-amy-mitchell/</loc><lastmod>2019-01-29T21:20:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2018s-top-10-webcasts/</loc><lastmod>2019-01-31T21:40:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/chapter-spotlight-peru/</loc><lastmod>2019-02-08T00:14:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-engineer-is-the-top-tech-job-for-2019/</loc><lastmod>2019-02-12T01:07:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-workforce-study-what-cybersecurity-certifications-are-you-pursuing-this-year/</loc><lastmod>2019-02-14T02:26:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-2019-call-for-speakers-is-open/</loc><lastmod>2019-02-15T02:39:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cert-magazine-salary-survey-says-ccsp-is-the-next-big-thing/</loc><lastmod>2019-02-19T03:31:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-is-the-top-business-concern-for-u-s-ceos/</loc><lastmod>2019-02-20T03:43:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/fast-facts-about-the-cissp/</loc><lastmod>2019-02-21T04:05:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/happy-data-privacy-day/</loc><lastmod>2019-02-22T04:16:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/planning-to-take-an-isc%c2%b2-certification-exam-get-your-free-certification-prep-kit/</loc><lastmod>2019-03-08T07:46:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-spotlight-renju-damodaran/</loc><lastmod>2019-03-19T10:21:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-does-our-partnership-with-cyberusa-mean/</loc><lastmod>2019-04-01T14:31:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-pros-are-not-feeling-the-love-again/</loc><lastmod>2019-04-11T18:18:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/announcing-the-isc%c2%b2-professional-development-institute/</loc><lastmod>2019-04-17T20:15:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-top-10-emea-webcasts-of-the-last-12-months/</loc><lastmod>2019-04-22T21:16:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/which-isc%c2%b2-certification-is-right-for-you/</loc><lastmod>2019-04-24T21:40:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-is-hot-hot-hot-says-cnbc/</loc><lastmod>2019-04-28T22:25:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/forget-the-next-big-thing-what-you-need-is-a-skilled-staff/</loc><lastmod>2019-04-29T22:50:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-member-spotlight-jasmine-rodriguez/</loc><lastmod>2019-04-30T23:03:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-recognized-as-top-cybersecurity-certification-program-by-sc-media/</loc><lastmod>2019-05-02T23:24:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-cybersecurity-reports-point-to-increased-need-for-retraining-and-vulnerability-management/</loc><lastmod>2019-05-07T00:45:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/female-cybersecurity-workers-are-younger-and-looking-to-lead/</loc><lastmod>2019-05-08T00:58:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-in-2019-events-and-exhibits-not-to-miss/</loc><lastmod>2019-05-09T01:07:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/your-key-to-professional-growth-invest-in-your-group-b-cpe-activities/</loc><lastmod>2019-05-22T06:00:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/building-a-strong-culture-of-security-from-the-professional-development-institute/</loc><lastmod>2019-05-23T06:10:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-time-is-now-to-build-on-womens-cybersecurity-gains/</loc><lastmod>2019-05-23T06:10:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/heavy-industrial-companies-grapple-with-cybersecurity-problems/</loc><lastmod>2019-05-28T07:21:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-secure-summit-emea-in-review/</loc><lastmod>2019-05-29T07:38:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/csslp-spotlight-john-kent/</loc><lastmod>2019-06-02T08:28:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/u-s-presidential-order-aims-to-bolster-federal-cybersecurity/</loc><lastmod>2019-06-03T08:38:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/right-to-repair-good-or-bad-for-cybersecurity/</loc><lastmod>2019-06-04T08:48:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/four-keys-to-investing-in-your-group-b-professional-development/</loc><lastmod>2019-06-13T11:14:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/investing-in-the-next-generation-of-cybersecurity-leaders/</loc><lastmod>2019-06-25T14:46:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-provides-insight-to-congressional-subcommittee-on-diversification-in-the-cybersecurity-workforce/</loc><lastmod>2019-06-26T14:55:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/gdpr-one-year-on/</loc><lastmod>2019-07-07T18:15:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/going-for-isc%c2%b2-certification-get-the-facts-before-you-choose-a-training-provider/</loc><lastmod>2019-06-30T16:01:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/be-part-of-the-workforce-study/</loc><lastmod>2019-07-08T18:37:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/additional-recognition-for-cybersecurity-certifications/</loc><lastmod>2019-07-10T19:04:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/writing-cybersecurity-articles-setting-up-your-writing-process/</loc><lastmod>2019-07-14T20:05:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-awards-for-leading-professionals/</loc><lastmod>2019-07-16T20:46:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-falls-short-in-organizations-undergoing-digital-transformation/</loc><lastmod>2019-07-31T01:19:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-falls-short-in-organizations-undergoing-digital-transformation-2/</loc><lastmod>2019-06-19T13:01:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-awards-for-leading-professionals-2/</loc><lastmod>2019-06-19T13:01:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/writing-cybersecurity-articles-setting-up-your-writing-process-2/</loc><lastmod>2019-06-19T13:01:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/additional-recognition-for-cybersecurity-certifications-2/</loc><lastmod>2019-06-19T13:01:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/be-part-of-the-workforce-study-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/gdpr-one-year-on-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/going-for-isc%c2%b2-certification-get-the-facts-before-you-choose-a-training-provider-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-provides-insight-to-congressional-subcommittee-on-diversification-in-the-cybersecurity-workforce-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/investing-in-the-next-generation-of-cybersecurity-leaders-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/four-keys-to-investing-in-your-group-b-professional-development-2/</loc><lastmod>2019-06-19T13:02:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/small-businesses-not-the-weakest-link-in-the-supply-chain-study-shows/</loc><lastmod>2019-08-01T01:35:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/emea-skills-gap-puts-cyber-workers-at-a-disadvantage-against-attackers/</loc><lastmod>2019-08-06T02:38:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-parent-trap-lack-of-knowledge-holds-children-back-from-cybersecurity-careers/</loc><lastmod>2019-08-13T05:20:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/lack-of-diligence-by-large-enterprises-can-create-vulnerabilities/</loc><lastmod>2019-08-13T05:20:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2019-security-congress-the-agenda-is-live/</loc><lastmod>2019-08-14T05:29:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-challenges-of-raising-user-security-awareness/</loc><lastmod>2019-08-15T05:57:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/small-businesses-need-new-security-solutions-but-arent-always-sure-which-ones/</loc><lastmod>2019-08-20T07:08:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/commit-plan-succeed/</loc><lastmod>2019-08-21T07:20:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ceos-cybersecurity-will-be-a-major-challenge-in-the-coming-decade/</loc><lastmod>2019-08-21T07:20:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-you-should-consider-a-security-certification-and-why-now-is-the-time/</loc><lastmod>2019-08-25T08:14:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/writing-cybersecurity-articles-getting-through-the-tough-times/</loc><lastmod>2019-08-26T08:26:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-certified-cloud-security-professionals-are-in-higher-demand-than-ever/</loc><lastmod>2019-08-27T08:38:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-meeting-with-department-of-commerce-to-discuss-cybersecurity-workforce-issues/</loc><lastmod>2019-08-29T09:06:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-vs-cissp-exams-how-are-they-different/</loc><lastmod>2019-08-28T08:48:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/center-day-at-congress/</loc><lastmod>2019-09-02T10:50:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/3-pro-tips-for-moving-from-it-to-security/</loc><lastmod>2019-09-03T11:26:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/most-cyber-workers-plan-to-see-out-their-careers-in-the-field/</loc><lastmod>2019-09-04T11:38:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-is-now-an-approved-professional-organisation-for-tax-relief-in-the-uk/</loc><lastmod>2019-09-23T17:25:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/salaries-for-cybersecurity-chiefs-soar/</loc><lastmod>2019-09-18T15:32:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-collaborative-alliance-to-develop-new-cybersecurity-council-and-professional-recognition-as-part-of-the-uks-national-cybersecurity-strategy/</loc><lastmod>2019-09-29T18:26:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/it-professionals-use-the-security-skills-shortage-to-your-advantage/</loc><lastmod>2019-10-03T20:03:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-and-ccsk-which-cloud-security-credential-is-right-for-you/</loc><lastmod>2019-10-06T20:38:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/vmware-acquisitions-highlight-the-importance-of-devsecops/</loc><lastmod>2019-10-07T20:53:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/getting-started-on-the-california-consumer-privacy-act/</loc><lastmod>2019-10-21T00:03:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-we-need-your-insight/</loc><lastmod>2019-10-23T00:54:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-many-facets-of-the-mentoring-experience/</loc><lastmod>2019-10-28T02:48:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-to-break-into-cybersecurity-without-direct-experience-find-out-how/</loc><lastmod>2019-10-28T02:48:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-national-capital-region-scholarships/</loc><lastmod>2019-09-15T18:46:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/update-new-isc%c2%b2-official-training-provider-s4-inc/</loc><lastmod>2019-10-29T03:00:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/attackers-are-targeting-it-service-providers/</loc><lastmod>2019-10-29T03:00:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-audits-are-now-standard-practice-in-ma/</loc><lastmod>2019-10-29T03:00:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-are-you-doing-for-cybersecurity-awareness-month/</loc><lastmod>2019-10-30T03:10:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-gamification-can-improve-employee-cybersecurity-compliance/</loc><lastmod>2019-10-30T03:10:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-infrastructure-viewed-as-a-tangible-asset-in-ma/</loc><lastmod>2019-11-01T03:39:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/pci-compliance-in-aws-simplified/</loc><lastmod>2019-11-04T04:58:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/common-lessons-fromdisparate-information-security-incidents/</loc><lastmod>2019-10-23T19:25:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/filling-the-need-of-healthcare-cybersecurity-professionals-requires-collaboration/</loc><lastmod>2019-11-06T05:46:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-ethics-how-far-is-too-far/</loc><lastmod>2019-11-08T06:32:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-kickoff-creating-a-safe-world/</loc><lastmod>2019-11-07T06:09:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-expert-ai-not-ready-for-cybersecurity/</loc><lastmod>2019-11-17T08:23:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/privacy-regulations-more-work-for-cyber-professionals/</loc><lastmod>2019-11-14T07:45:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-keynote-speaker-put-down-your-phone/</loc><lastmod>2019-11-11T07:15:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-securing-a-rapidly-changing-environment/</loc><lastmod>2019-11-20T08:54:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-day-2-from-pam-to-cyber-insurance-to-finding-a-voice/</loc><lastmod>2019-11-18T08:35:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-final-thoughts-being-there-for-others-part-1/</loc><lastmod>2019-11-21T09:07:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-congress-final-thoughts-being-there-for-others-part-2/</loc><lastmod>2019-11-22T09:30:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-estimates-cybersecurity-workforce-at-2-8-million/</loc><lastmod>2019-11-25T10:15:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-wanted-cybersecurity-workers/</loc><lastmod>2019-12-02T12:23:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-chapter-program-recognizes-outstanding-chapters/</loc><lastmod>2019-12-04T13:02:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/strategies-for-building-a-cybersecurity-dream-team/</loc><lastmod>2019-12-10T14:43:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/some-cyber-roles-are-overstaffed-while-others-are-understaffed/</loc><lastmod>2019-12-15T15:42:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-leaders-honored-by-sc-magazine-as-europes-most-influential-women-in-cybersecurity/</loc><lastmod>2019-12-16T15:58:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/workforce-study-most-cyber-workers-started-their-careers-elsewhere/</loc><lastmod>2019-12-17T16:21:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-global-factors-driving-data-privacy-regulation-part-1/</loc><lastmod>2019-12-19T17:19:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-global-factors-driving-data-privacy-regulation-part-2/</loc><lastmod>2019-12-22T18:13:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-is-the-top-concern-for-midmarket-executives/</loc><lastmod>2020-01-01T20:26:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/reflections-on-captain-sullys-isc2congress-keynote/</loc><lastmod>2020-01-05T21:39:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/enter-to-win-a-nintendo-switch-while-taking-free-professional-development-courses/</loc><lastmod>2020-01-08T22:28:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cyber-threats-to-healthcare-on-the-rise/</loc><lastmod>2020-01-14T23:58:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/job-satisfaction-is-high-among-cybersecurity-workers/</loc><lastmod>2020-01-21T01:52:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ai-and-machine-learning-in-demand-top-jobs-of-2019/</loc><lastmod>2020-01-22T02:06:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscps-we-need-your-input/</loc><lastmod>2020-01-23T02:23:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-lifeline-patient-safety-and-cybersecurity/</loc><lastmod>2020-01-24T02:54:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-back-and-looking-forward-to-2020/</loc><lastmod>2020-01-28T04:43:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/in-case-you-missed-it-recapping-security-congress-2019/</loc><lastmod>2020-01-29T04:58:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-navigate-an-uncertain-job-horizon/</loc><lastmod>2020-01-31T05:43:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-culture-makes-us-safer/</loc><lastmod>2020-02-04T07:07:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2019s-top-10-webcasts/</loc><lastmod>2020-02-04T07:07:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-yorks-new-data-breach-security-laws-increase-data-privacy-and-provide-security-controls-guidance/</loc><lastmod>2020-02-05T07:16:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/so-you-have-decided-to-become-cyber-security-certified-now-what/</loc><lastmod>2020-02-05T07:16:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/most-employers-dont-pay-full-cost-of-certifications/</loc><lastmod>2020-02-06T07:31:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/switching-from-other-fields-to-cybersecurity-is-profitable/</loc><lastmod>2020-02-10T08:24:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/open-source-secure-software-development-are-not-mutually-exclusive/</loc><lastmod>2020-01-27T04:22:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/wanted-cloud-security-skills/</loc><lastmod>2020-02-11T08:38:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/positively-impacting-the-next-generation-with-cyber-safety-day/</loc><lastmod>2020-02-12T08:51:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/no-limits-no-excuses-commit-to-certification-in-2020/</loc><lastmod>2020-02-12T08:51:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/certified-secure-software-lifecycle-professional-exam-updates/</loc><lastmod>2020-02-17T10:27:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-predictions-for-2020-from-the-isc%c2%b2-community-of-security-professionals-part-1/</loc><lastmod>2020-02-19T11:06:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-once-again-recognized-by-sc-media/</loc><lastmod>2020-02-18T10:36:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-expands-cybersecurity-awareness-efforts-in-australia-with-strategic-partnership/</loc><lastmod>2020-02-23T11:54:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-predictions-for-2020-from-the-isc%c2%b2-community-of-security-professionals-part-2/</loc><lastmod>2020-02-20T11:17:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/open-source-secure-software-development-are-not-mutually-exclusive-2/</loc><lastmod>2020-02-24T12:05:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/register-to-learn-about-cybersecurity-workforce-study-in-cis-webinar/</loc><lastmod>2020-02-26T12:32:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ransomware-and-your-business/</loc><lastmod>2020-02-27T12:55:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/breaches-increased-in-2019-but-the-number-of-exposed-records-declined/</loc><lastmod>2020-03-04T14:10:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/icymi-isc2-security-congress-call-for-speakers-is-open/</loc><lastmod>2020-03-01T13:34:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-ranks-sixth-in-salary-earning-potential/</loc><lastmod>2020-03-08T15:07:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/in-the-face-of-a-global-health-crisis-life-and-business-goes-on/</loc><lastmod>2020-03-17T17:21:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/under-attck-how-mitres-methodology-to-find-threats-and-embed-counter-measures-might-work-in-your-organization/</loc><lastmod>2020-03-18T17:36:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-architecture-concentration-exam-updates/</loc><lastmod>2020-03-24T18:46:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/threat-hunting-is-your-security-operation-ready-to-launch-such-a-program/</loc><lastmod>2020-03-30T20:28:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/white-paper-on-cloud-security-risks-and-how-to-mitigate-them/</loc><lastmod>2020-03-31T20:43:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ciso-stress-and-tenure-looking-beyond-the-numbers/</loc><lastmod>2020-04-01T20:52:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-cap-members-we-need-your-help/</loc><lastmod>2020-04-02T21:03:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/healthcare-is-the-preferred-target-of-cyber-attackers/</loc><lastmod>2020-04-05T21:41:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/lets-work-together/</loc><lastmod>2020-04-06T21:52:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-write-a-great-speaker-submission/</loc><lastmod>2020-04-07T22:03:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-membership-of-more-than-150000-is-helping-to-close-the-skills-gap/</loc><lastmod>2020-04-08T22:16:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/free-cyber-resources-for-children-during-covid-19/</loc><lastmod>2020-04-12T23:07:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-security-tips-for-your-aws-account/</loc><lastmod>2020-04-13T23:26:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-engineering-concentration-exam-updates/</loc><lastmod>2020-04-14T23:40:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecuritys-top-needed-skill-cloud-security/</loc><lastmod>2020-04-16T00:04:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-cryptography/</loc><lastmod>2020-04-17T00:28:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2020-global-achievement-awards-open-for-nominations/</loc><lastmod>2020-04-20T01:18:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cyber-threats-are-spiking-as-remote-worker-ranks-soar/</loc><lastmod>2020-04-22T01:41:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/six-key-advantages-of-isc2-online-instructor-led-training/</loc><lastmod>2020-04-23T01:54:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/wearing-it-with-pride-how-showing-off-your-isc2-credentials-can-make-a-difference/</loc><lastmod>2020-04-28T03:06:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-ways-ccsp-can-help-you-improve-cloud-security/</loc><lastmod>2020-04-29T03:34:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/working-remotely-and-staying-sane-in-a-covid-world/</loc><lastmod>2020-05-05T05:45:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-you-need-a-technical-and-strategic-view-of-cloud-security/</loc><lastmod>2020-05-13T07:24:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/keep-on-training-official-online-learning-helps-you-stay-focused-on-certification-goals/</loc><lastmod>2020-05-13T07:24:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/study-small-businesses-are-more-focused-on-iot-investments-than-cybersecurity/</loc><lastmod>2020-05-14T07:51:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/professional-development-institute-honored-with-2020-d2l-excellence-award/</loc><lastmod>2020-05-18T08:39:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/overview-of-the-latest-aws-security-service-amazon-detective/</loc><lastmod>2020-05-18T08:39:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/forget-the-tabletop-we-have-an-actual-exercise-for-bcp/</loc><lastmod>2020-05-20T09:08:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-reasons-to-pursue-a-cissp-concentration/</loc><lastmod>2020-05-26T10:12:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-covid-19-response-sees-nearly-50-of-cybersecurity-workers-reassigned-to-it-tasks/</loc><lastmod>2020-05-27T10:22:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-tips-to-stand-out-when-you-have-little-or-no-cyber-experience/</loc><lastmod>2020-05-28T10:33:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-skills-companies-are-hiring-for-in-2020/</loc><lastmod>2020-06-02T11:59:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-you-need-to-know-cissp-comparable-to-u-k-masters-degree-standard/</loc><lastmod>2020-06-09T13:27:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/3-ways-to-find-a-cybersecurity-mentor/</loc><lastmod>2020-06-08T13:16:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-first-line-of-defense-are-humans-doing-a-good-enough-job/</loc><lastmod>2020-06-16T15:26:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-career-tips-for-first-time-cybersecurity-job-seekers/</loc><lastmod>2020-06-24T17:06:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/let-your-voice-be-heard/</loc><lastmod>2020-06-24T17:06:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/bank-on-it/</loc><lastmod>2020-06-24T17:06:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-ways-to-break-down-the-cybersecurity-experience-barrier/</loc><lastmod>2020-06-28T18:17:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/in-support-of-federal-legislation-to-support-our-cybersecurity-workforce/</loc><lastmod>2020-06-28T18:17:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/study-pandemic-boosts-cybersecurity-demand/</loc><lastmod>2020-06-29T18:36:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/10-critical-skills-for-the-cybersecurity-workforce/</loc><lastmod>2020-07-08T21:27:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-cybersecurity-understaffing-lowers-ability-to-handle-cyber-threats/</loc><lastmod>2020-07-13T00:16:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/advice-from-3-cyber-pros-on-getting-certified/</loc><lastmod>2020-07-16T01:07:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/on-premise-accelerated-training-to-resume-at-firebrand/</loc><lastmod>2020-07-17T01:34:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-costa-rica-chapter-sharing-reflections-and-lessons-learned-from-maze-team-attack/</loc><lastmod>2020-07-23T02:50:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-costa-rica-chapter-sharing-reflections-and-lessons-learned-from-maze-team-attack-2/</loc><lastmod>2020-07-22T02:41:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/theres-training-and-theres-official-training-know-the-differences/</loc><lastmod>2020-07-24T03:03:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/stop-worrying-about-your-childs-online-safety-let-garfield-do-the-work/</loc><lastmod>2020-07-30T04:14:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/beware-of-tmi-cyber-crooks-are-watching/</loc><lastmod>2020-07-27T03:36:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/its-official-isc2-security-congress-will-be-virtual-this-year/</loc><lastmod>2020-08-05T05:37:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2019-sessions-to-catch-up-on/</loc><lastmod>2020-08-06T05:48:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-eliminate-leaky-s3-buckets-without-writing-a-line-of-code/</loc><lastmod>2020-08-10T07:12:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/professional-development-institute-adds-lab-course-free-member-access-to-2-cpes/</loc><lastmod>2020-08-18T09:02:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2019-sessions-to-catch-up-on-part-2/</loc><lastmod>2020-08-27T10:47:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/making-your-way-through-the-cloud/</loc><lastmod>2020-08-30T11:25:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/rethinking-security-predictions-for-2020-from-the-isc%c2%b2-community-of-security-professionals/</loc><lastmod>2020-09-01T11:50:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-shape-the-uk-cyber-security-council-by-becoming-a-trustee/</loc><lastmod>2020-09-02T12:00:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/5-ways-to-make-sure-you-hire-the-right-cybersecurity-team-member/</loc><lastmod>2020-09-08T13:10:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-effectively-set-up-aws-cloudtrail-in-5-steps/</loc><lastmod>2020-09-10T13:48:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/from-y2k-to-nyc-parking-meters-have-we-learned-anything-about-complacency-in-cybersecurity/</loc><lastmod>2020-09-13T14:22:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2019-sessions-to-catch-up-on-part-3/</loc><lastmod>2020-09-15T14:41:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-cybersecurity-is-a-great-choice-for-an-exciting-career/</loc><lastmod>2020-09-16T14:54:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ny-department-of-financial-services-brings-first-enforcement-action-under-its-cybersecurity-regulation/</loc><lastmod>2020-09-17T15:05:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-7-benefits-of-sscp-to-highly-successful-security-practitioners/</loc><lastmod>2020-09-22T16:06:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/same-as-it-ever-was-the-catch-22-of-cybersecurity-experience-remains-a-problem/</loc><lastmod>2020-09-27T17:06:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-problem-with-cyberhygiene/</loc><lastmod>2020-09-28T17:16:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-value-of-csslp-certification-is-surging/</loc><lastmod>2020-09-29T17:25:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/under-pressure-under-control/</loc><lastmod>2020-10-04T18:28:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-recap-sessions-to-catch-up-on-part-4/</loc><lastmod>2020-10-05T18:43:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-hr-can-improve-corporate-cybersecurity/</loc><lastmod>2020-10-06T18:52:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/keeping-your-cup-from-overflowing/</loc><lastmod>2020-10-07T19:04:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/can-the-u-s-election-process-be-hacked/</loc><lastmod>2020-10-12T20:03:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/garfield-for-virtual-classrooms/</loc><lastmod>2020-10-13T20:14:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-important-is-cybersecurity-in-ma/</loc><lastmod>2020-10-15T20:35:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/remote-working-underscores-the-need-for-qualified-cybersecurity-professionals/</loc><lastmod>2020-10-19T21:17:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/positive-view-of-cybersecurity-professionals-and-how-to-attract-people-to-the-field/</loc><lastmod>2020-10-19T21:17:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/center-names-2020-volunteer-and-partner-of-the-year/</loc><lastmod>2020-10-22T21:50:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/position-cybersecurity-senior-specialist-5373-department-cybersecurity-information-assurance-governance-risk-and-compliance-position-description-cybersecurity/</loc><lastmod>2020-10-01T09:35:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/not-all-life-savers-wear-white-coats/</loc><lastmod>2020-10-26T22:37:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-awareness-month/</loc><lastmod>2020-10-06T07:45:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-board-of-directors-election-results/</loc><lastmod>2020-11-01T23:55:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-human-element-of-zero-trust/</loc><lastmod>2020-11-03T00:08:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/greetings-from-the-new-isc2-ceo/</loc><lastmod>2020-11-05T00:36:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-does-the-cissp-exam-change/</loc><lastmod>2020-11-10T02:03:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-digital-future-needs-cybersecurity-leaders/</loc><lastmod>2020-11-11T02:13:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-get-the-experience-you-need-to-pursue-sscp-certification/</loc><lastmod>2020-11-12T02:36:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/share-your-expertise-help-develop-isc%c2%b2-exams/</loc><lastmod>2020-11-16T03:42:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-need-for-eyes-everywhere-asset-security/</loc><lastmod>2020-11-13T02:52:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-exam-retake-policy-change/</loc><lastmod>2020-11-16T03:42:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/insufficient-staffing-hindering-states-cybersecurity-efforts/</loc><lastmod>2020-11-16T03:42:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-hr-managers-guide-to-mitigating-cyber-attacks-in-healthcare/</loc><lastmod>2020-11-16T03:42:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cpes-for-cissps-at-isc2congress/</loc><lastmod>2020-11-17T03:53:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-javvad-malik/</loc><lastmod>2020-11-18T04:08:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-do-security-controls-help-implement-a-corporate-security-policy/</loc><lastmod>2020-11-18T04:08:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/virtual-networking-lounges-and-engagement-activities-at-isc2congress/</loc><lastmod>2020-11-18T04:08:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2020-isc2-cybersecurity-workforce-study-skills-gap-narrows-in-an-unusual-year/</loc><lastmod>2020-11-18T04:08:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/virtual-engagement-activities-at-isc2congress/</loc><lastmod>2020-11-18T04:08:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-panel-finding-the-balance-between-skill-and-usability/</loc><lastmod>2020-11-25T05:32:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-5g-security-two-sides-of-one-coin/</loc><lastmod>2020-11-24T05:21:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-opening-keynote-speaker-policy-and-technology-must-work-together/</loc><lastmod>2020-11-19T04:30:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/its-time-to-test-your-cissp-knowledge/</loc><lastmod>2020-11-19T04:30:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-tuesday-keynote-protecting-yourself-during-the-pandemic/</loc><lastmod>2020-11-28T06:06:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-post-incident-reviews-as-prevention/</loc><lastmod>2020-12-16T09:36:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/until-further-notice-isc2congress-keynote-prescribes-adaptive-recovery-and-resilience-in-cybersecurity-to-deal-with-ongoing-pandemic/</loc><lastmod>2020-12-15T09:22:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-recruiter-covid-had-a-minimal-impact-on-the-cybersecurity-job-market/</loc><lastmod>2020-12-14T09:13:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-do-you-do-when-no-one-is-watching/</loc><lastmod>2020-12-08T08:06:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-light-bulb-moment-the-job-of-cybersecurity-professionals-is-about-assessing-risk/</loc><lastmod>2020-12-03T07:09:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-we-got-this-adaptability-is-nothing-new-to-cybersecurity/</loc><lastmod>2020-12-20T10:17:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-center-wants-to-send-you-to-college-interested/</loc><lastmod>2020-12-17T09:46:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/study-certifications-boost-salaries-substantially/</loc><lastmod>2020-12-21T10:44:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-career-changing-magic-of-tidying-up/</loc><lastmod>2020-12-22T10:55:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/getting-ready-for-the-new-zealand-privacy-act-2020/</loc><lastmod>2020-12-27T11:48:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-jerome-leach/</loc><lastmod>2020-12-28T12:00:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-benefits-of-hcispp-extend-beyond-certification/</loc><lastmod>2021-01-06T13:57:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/patch-management-in-it-and-ot-environments/</loc><lastmod>2021-01-07T14:13:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/workforce-study-reviewing-cybersecuritys-pandemic-response/</loc><lastmod>2021-01-10T15:06:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-recipe-for-avoiding-software-failures/</loc><lastmod>2021-01-12T15:33:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/absolute-zero/</loc><lastmod>2021-01-13T15:43:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/can-i-ask-you-a-question/</loc><lastmod>2021-01-14T15:55:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-consultant-are-more-cissps-embracing-the-gig-economy/</loc><lastmod>2021-01-18T16:43:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/holiday-message-from-clar-rosso-isc%c2%b2-ceo/</loc><lastmod>2021-01-19T16:54:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-predictions-for-2021from-the-isc%c2%b2-community-of-security-professionals-part-1/</loc><lastmod>2021-01-20T17:08:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/top-webinars-of-2020/</loc><lastmod>2021-01-21T17:19:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-angus-macrae/</loc><lastmod>2021-01-24T17:59:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-years-resolution-write-for-the-isc%c2%b2-blog/</loc><lastmod>2021-01-25T18:08:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-is-pilot-testing-online-exam-proctoring-for-cissp-and-other-cybersecurity-certifications/</loc><lastmod>2021-01-26T18:18:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-supports-doe-competition-to-train-the-next-generation-of-cybersecurity-leaders/</loc><lastmod>2021-01-27T18:29:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-impact-of-covid-19-on-enterprise-it-security-teams/</loc><lastmod>2021-01-31T19:17:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-online-exam-explaining-the-isc%c2%b2-pilot-test/</loc><lastmod>2021-02-01T19:30:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-workforce-study-certifications-boost-salaries-by-an-average-of-18000/</loc><lastmod>2021-02-02T19:39:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-your-security-team-cloud-ready/</loc><lastmod>2021-02-03T19:57:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-cissp-is-the-most-valuable-security-certification-for-2021/</loc><lastmod>2021-02-07T21:12:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-access-control-and-network-segmentation-can-protect-your-assets/</loc><lastmod>2021-02-08T21:22:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-cybersecurity-webinars-available-on-demand-on-brighttalk/</loc><lastmod>2021-02-09T21:33:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/evolution-vs-extinction/</loc><lastmod>2021-02-09T21:33:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/biden-administration-seeks-9-billion-for-emergency-cybersecurity-improvements/</loc><lastmod>2021-02-10T21:45:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-for-resources-on-privacy-youve-come-to-the-right-place/</loc><lastmod>2021-02-11T22:13:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/remote-work-during-the-pandemic-what-we-got-wrong/</loc><lastmod>2021-02-15T23:00:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/employment-for-security-analysts-to-grow-31-by-2029/</loc><lastmod>2021-02-16T23:09:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-melissa-parsons/</loc><lastmod>2021-02-17T23:22:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/addressing-the-human-element-of-security-awareness-training-programs/</loc><lastmod>2021-02-18T23:34:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/using-a-crisis-wisely/</loc><lastmod>2021-02-18T23:34:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-small-businesses-and-big-enterprises-structure-their-cybersecurity-teams/</loc><lastmod>2021-02-22T00:34:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/quick-survey-solarwinds-incident/</loc><lastmod>2021-02-24T01:28:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-importance-of-a-good-software-security-policy/</loc><lastmod>2021-02-23T01:13:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/exceptions-to-security-policy-what-are-and-how-to-deal-with-them/</loc><lastmod>2021-02-25T01:44:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-predictions-for-2021-from-the-isc%c2%b2-community-of-security-professionals-part-2/</loc><lastmod>2021-02-26T01:55:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-do-i-advance-my-career-in-the-cybersecurity-field/</loc><lastmod>2021-03-01T02:27:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/responsibility-and-accountability-in-the-cloud-where-does-the-buck-stop/</loc><lastmod>2021-03-03T02:48:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/garfield-teaches-hawaii-students-how-to-be-safe-and-secure-online/</loc><lastmod>2021-03-04T03:03:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-you-can-take-the-cissp-exam-from-home/</loc><lastmod>2021-03-08T03:55:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-weeds-and-flowers-of-information-security/</loc><lastmod>2021-03-05T03:21:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/technology-and-the-new-frontier-of-the-healthcare-industry-the-internet-of-medical-things/</loc><lastmod>2021-03-09T04:06:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/global-achievement-awards-whats-new-in-2021/</loc><lastmod>2021-03-11T04:28:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-future-of-cybersecurity-in-higher-education-four-possible-scenarios/</loc><lastmod>2021-03-12T04:42:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/challenges-and-misconceptions-of-certificate-revocation-in-pki/</loc><lastmod>2021-03-14T05:00:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-says-cissp-and-ccsp-among-the-most-in-demand-it-certifications-of-2021/</loc><lastmod>2021-03-17T05:41:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-healthcare-internet-of-things-for-better-or-worse/</loc><lastmod>2021-03-18T05:50:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-are-the-phases-of-an-incident-response-plan/</loc><lastmod>2021-03-22T06:43:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-are-the-best-free-cybersecurity-webinars/</loc><lastmod>2021-03-24T07:01:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-chris-clinton/</loc><lastmod>2021-03-25T07:15:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/celebrating-women-in-cybersecurity-and-committing-to-diversity-equity-and-inclusion/</loc><lastmod>2021-03-29T07:59:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/6-tips-to-integrate-security-into-agile-application-development/</loc><lastmod>2021-03-30T08:09:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-crowdstrike-global-threat-report-finds-healthcare-orgs-in-the-social-engineering-crosshairs/</loc><lastmod>2021-03-30T08:09:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-predictions-for-2021-from-the-isc%c2%b2-community-of-security-professionals-part-3/</loc><lastmod>2021-03-31T08:18:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/positive-interest-in-stem-the-latest-side-effect-of-the-pandemic/</loc><lastmod>2021-04-04T08:59:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-cloud-security-certification-can-give-your-career-a-buzz/</loc><lastmod>2021-04-06T09:18:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/healthcare-security-security-with-life-and-death-consequences/</loc><lastmod>2021-04-07T09:32:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/tips-for-building-a-career-in-cybersecurity-from-women-whove-been-there/</loc><lastmod>2021-04-08T09:45:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-get-it-right-with-cybersecurity-training/</loc><lastmod>2021-04-11T10:32:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-would-a-lawyer-ever-need-an-information-security-professional/</loc><lastmod>2021-04-12T10:42:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-cybersecurity-community-increasingly-concerned-about-solarwinds-breach/</loc><lastmod>2021-04-13T10:55:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-and-the-creation-of-the-u-k-cyber-security-council/</loc><lastmod>2021-04-19T12:00:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/fbi-cybercrime-shot-up-in-2020-amidst-pandemic/</loc><lastmod>2021-04-15T11:16:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/so-many-awards-so-little-time-left-to-nominate-complete-your-global-achievement-award-nomination-today/</loc><lastmod>2021-04-20T12:11:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-mari-aoba/</loc><lastmod>2021-04-21T12:24:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/under-the-hood-inside-isc%c2%b2-exam-development-cycle/</loc><lastmod>2021-04-25T13:17:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hush-this-data-is-secret/</loc><lastmod>2021-04-27T13:40:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/deadline-is-extended-for-2021isc%c2%b2-global-achievement-awards-nominations/</loc><lastmod>2021-05-03T14:55:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/wanted-software-developers-with-a-security-mindset/</loc><lastmod>2021-05-04T15:05:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/updates-to-the-isc%c2%b2-cap-exam-what-is-changing/</loc><lastmod>2021-05-05T15:15:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/building-cyber-resilience-in-a-cloudy-world/</loc><lastmod>2021-05-11T16:25:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ibm-x-force-ransomware-was-the-preferred-attack-method-in-2020/</loc><lastmod>2021-05-12T16:36:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-delicate-balance-of-security-versus-usability/</loc><lastmod>2021-05-12T16:36:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/evolving-identity-why-legacy-iam-may-not-be-fit-for-purpose/</loc><lastmod>2021-05-16T17:17:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cyber-threats-the-financial-systems-top-risk/</loc><lastmod>2021-05-17T17:32:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/these-roles-require-cybersecurity-training/</loc><lastmod>2021-05-18T17:45:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-isc2-cybersecurity-career-pursuers-study-provides-insights-from-professionals-and-jobseekers-to-highlight-what-security-jobs-actually-entail/</loc><lastmod>2021-05-19T17:54:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/keeping-excess-out-of-access/</loc><lastmod>2021-05-20T18:05:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-shape-the-hcispp-exam/</loc><lastmod>2021-05-23T18:36:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-jason-lau/</loc><lastmod>2021-05-24T18:46:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/unlimited-access-to-free-industry-leading-cybersecurity-webinars/</loc><lastmod>2021-05-24T18:46:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/do-you-have-these-top-cyber-security-skills/</loc><lastmod>2021-05-26T19:14:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/creating-secure-software-requires-more-than-just-motivation/</loc><lastmod>2021-05-25T18:59:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-supports-nist-encouragement-of-inclusive-cybersecurity-terminology/</loc><lastmod>2021-05-31T20:15:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-misconfiguration-what-do-you-need-to-consider/</loc><lastmod>2021-06-01T20:29:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/whats-next-for-cybersecurity-workers-you-tell-us/</loc><lastmod>2021-06-02T20:40:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/many-cybersecurity-jobseekers-lack-a-full-understanding-of-the-role-they-seek/</loc><lastmod>2021-06-03T20:50:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/more-than-likely-or-less-than-probable-is-a-truly-quantitative-security-analysis-possible/</loc><lastmod>2021-06-06T21:33:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/healthcare-privacy-bigger-than-just-hipaa/</loc><lastmod>2021-06-07T21:50:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/online-proctor-exam-pilot-results/</loc><lastmod>2021-06-09T22:27:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/in-a-year-like-no-other-what-did-yours-look-like-take-the-survey/</loc><lastmod>2021-06-08T22:08:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/your-next-cybersecurity-hire-may-already-be-in-your-organization/</loc><lastmod>2021-06-13T23:26:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/its-official-isc%c2%b2-security-congress-is-back-for-the-11th-year-in-a-row/</loc><lastmod>2021-06-14T23:38:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-professional-development-institute-launches-three-new-courses/</loc><lastmod>2021-06-15T23:50:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-laurie-mack/</loc><lastmod>2021-06-21T00:51:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/survey-now-open-what-differences-did-the-year-make-in-cybersecurity/</loc><lastmod>2021-06-21T00:51:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hiring-from-within-and-retaining-cybersecurity-talent-building-your-strategy/</loc><lastmod>2021-06-22T01:14:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/software-security-testing-hidden-thoughts-can-cost-you/</loc><lastmod>2021-06-23T01:38:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/make-new-connections-with-isc%c2%b2-community/</loc><lastmod>2021-06-24T01:56:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/an-inside-look-at-cloud-security-from-industry-experts/</loc><lastmod>2021-06-25T02:06:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-shape-the-issmp-exam/</loc><lastmod>2021-06-30T03:04:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/best-practices-and-techniques-for-pseudonymization/</loc><lastmod>2021-07-01T03:22:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/whats-your-fail-safe-posture-before-you-learn-how-to-fly-learn-how-to-fall/</loc><lastmod>2021-07-07T05:10:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-the-best-way-to-achieve-cloud-security/</loc><lastmod>2021-07-12T06:26:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/u-s-government-equates-threat-of-ransomware-with-terrorism-ransomwareweek/</loc><lastmod>2021-07-14T06:57:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/business-continuity-the-light-in-a-time-of-darkness/</loc><lastmod>2021-07-13T06:47:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/prepare-your-defense-against-cybercriminals-with-ransomware-best-practice-resources-ransomwareweek/</loc><lastmod>2021-07-14T06:57:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-offers-free-access-to-ransomware-education-ransomwareweek/</loc><lastmod>2021-07-18T08:05:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/six-steps-to-protect-your-organization-from-ransomware-ransomwareweek/</loc><lastmod>2021-07-19T08:19:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/nist-has-come-out-with-its-own-ransomware-guidance-ransomwareweek/</loc><lastmod>2021-07-20T08:28:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/dod-adds-two-more-isc%c2%b2-certifications-to-requirements-for-cybersecurity-staff/</loc><lastmod>2021-07-20T08:28:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/igniting-passion-for-diversity-equity-and-inclusion-dei-cybersecurity-professionals-address-challenges-and-offer-tangible-advice-for-weaving-inclusion-into-our-industry/</loc><lastmod>2021-07-21T08:41:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-theresa-grafenstine/</loc><lastmod>2021-07-26T09:42:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-evangelist-or-zealot-where-to-draw-the-line/</loc><lastmod>2021-07-27T09:54:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/are-you-ready-for-isc%c2%b2-security-congress/</loc><lastmod>2021-08-03T11:12:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/implementing-controls-without-breaking-everything-including-the-bank/</loc><lastmod>2021-08-08T12:34:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-ccsp-certification-help-your-organization/</loc><lastmod>2021-08-05T11:40:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/trending-4500-cyber-pros-enroll-in-free-isc2-ransomware-course-in-less-than-a-month-in-order-to-fortify-their-preparedness-and-response-skills/</loc><lastmod>2021-08-09T12:49:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/be-the-strongest-link-in-your-organizations-supply-chain/</loc><lastmod>2021-08-10T13:28:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/malware-cybercrime-and-cloud-security/</loc><lastmod>2021-08-11T13:39:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-professionals-to-newcomers-focus-on-vendor-neutral-certifications/</loc><lastmod>2021-08-10T13:28:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-role-of-culture-in-compliance/</loc><lastmod>2021-08-12T13:52:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/relevance-requires-more-than-just-paying-attention/</loc><lastmod>2021-08-15T14:52:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ready-for-whats-new-at-isc%c2%b2-security-congress-in-2021/</loc><lastmod>2021-08-16T15:08:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ready-to-celebrate-global-achievement-award-winners/</loc><lastmod>2021-08-17T15:18:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-leaders-think-in-business-terms/</loc><lastmod>2021-08-18T15:41:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-pitfalls-of-poor-software-implementation/</loc><lastmod>2021-08-22T16:29:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-adesoji-ogunjobi/</loc><lastmod>2021-08-23T16:38:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ceo-clar-rosso-championing-isc%c2%b2-members-and-the-cybersecurity-profession/</loc><lastmod>2021-08-25T17:13:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-a-ciso-values-ccsp-training-and-certification/</loc><lastmod>2021-08-24T16:52:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/let-the-games-begin-tiktok-partners-with-nice-to-attract-young-cybersecurity-professionals/</loc><lastmod>2021-08-26T17:30:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-has-cap-certification-evolved-to-lead-in-risk-management/</loc><lastmod>2021-08-30T18:23:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/top-cybersecurity-podcasts/</loc><lastmod>2021-08-31T18:33:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/navigating-the-troubled-waters-of-risk-management/</loc><lastmod>2021-09-01T18:55:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/containers-in-the-cloud-key-benefits-and-challenges/</loc><lastmod>2021-09-01T18:55:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/asset-visibility-breaking-the-fourth-wall-in-cybersecurity/</loc><lastmod>2021-09-02T19:18:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2021-q3-updates-from-our-chairperson-and-ceo-membership-milestones-and-more/</loc><lastmod>2021-09-06T20:43:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/five-steps-to-get-a-cybersecurity-job/</loc><lastmod>2021-09-06T20:43:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/thinking-about-cap-or-cissp-heres-how-they-compare/</loc><lastmod>2021-09-07T20:52:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-security-congress-2021-is-now-fully-virtual/</loc><lastmod>2021-09-07T20:52:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-cloud-how-do-they-stack-up/</loc><lastmod>2021-09-08T21:25:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/code-red-hospitals-are-facing-a-major-ransomware-threat/</loc><lastmod>2021-09-09T21:43:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/get-ready-for-board-elections-beginning-soon/</loc><lastmod>2021-09-12T22:35:42-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-upcoming-u-s-labor-day-weekend-is-a-reminder-to-avoid-repeating-history/</loc><lastmod>2021-09-13T23:03:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-certification-vs-ccak-certificate-what-are-the-distinctions/</loc><lastmod>2021-09-13T23:03:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-the-cissp-right-for-me/</loc><lastmod>2021-09-14T23:16:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/do-you-hire-cyber-pros-lets-talk/</loc><lastmod>2021-09-17T00:11:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ready-for-isc%c2%b2-events-of-the-future/</loc><lastmod>2021-09-15T23:50:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/want-a-cybersecurity-job-keep-up-with-industry-developments/</loc><lastmod>2021-09-21T01:59:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-james-wright/</loc><lastmod>2021-09-20T01:25:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/mastering-identity-and-access-management-in-the-cloud/</loc><lastmod>2021-09-22T02:45:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/are-you-the-keymaster/</loc><lastmod>2021-09-23T02:54:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-the-impact-of-software-supply-chain-security-challenges/</loc><lastmod>2021-09-24T03:05:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/national-small-business-week-10-best-practices-for-small-business-cybersecurity/</loc><lastmod>2021-09-28T04:24:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/poll-cyber-pros-say-white-house-cybersecurity-summit-is-a-step-in-the-right-direction/</loc><lastmod>2021-09-27T04:07:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-tales-of-the-unexpected/</loc><lastmod>2021-09-29T04:35:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/is-there-really-a-shortage-in-cloud-security-skills/</loc><lastmod>2021-09-29T04:35:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ransomware-groups-reinvest-capital-to-improve-attack-methods/</loc><lastmod>2021-09-29T04:35:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-professional-cloud-security-manager-how-do-they-compare/</loc><lastmod>2021-10-01T05:00:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-importance-of-adopting-a-risk-management-approach-to-security-and-privacy/</loc><lastmod>2021-10-04T05:44:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ensuring-disaster-recovery-and-business-continuity-in-the-cloud/</loc><lastmod>2021-10-04T05:44:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/exclusive-resources-and-discounts-from-your-isc%c2%b2-membership/</loc><lastmod>2021-10-06T06:07:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-aj-yawn/</loc><lastmod>2021-10-07T06:21:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-does-not-end-with-implementing-controls/</loc><lastmod>2021-10-08T06:33:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-aws-cloud-certified-which-one-for-cloud-security/</loc><lastmod>2021-10-09T06:49:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-will-1-9-billion-for-cybersecurity-protect-american-infrastructure/</loc><lastmod>2021-10-12T07:29:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-exin-cloud-certifications-what-are-the-differences/</loc><lastmod>2021-10-10T07:09:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-continuous-monitoring-is-a-driver-of-effective-risk-management/</loc><lastmod>2021-10-11T07:19:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/younger-workers-security-is-a-hindrance/</loc><lastmod>2021-10-13T07:40:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-celebrates-cybersecurity-awareness-month-with-treasure-trove-of-knowledge-building-resources/</loc><lastmod>2021-10-17T08:40:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/house-delays-u-s-infrastructure-bill-vote-cybersecurity-funding-in-jeopardy-and-what-security-practitioners-say-needs-to-be-prioritized/</loc><lastmod>2021-10-14T08:03:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-the-chapters-being-honored-at-the-2021-isc%c2%b2-global-achievement-awards/</loc><lastmod>2021-10-18T08:59:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/overcoming-the-user-visibility-challenge/</loc><lastmod>2021-10-18T08:59:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-parents-keep-children-safe-online/</loc><lastmod>2021-10-18T08:59:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-megan-west-honoree-of-the-2021-isc%c2%b2-ceo-global-achievement-award/</loc><lastmod>2021-10-19T09:25:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-rich-owen-honoree-of-the-2021-isc%c2%b2-harold-f-tipton-lifetime-achievement-award/</loc><lastmod>2021-10-19T09:25:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-ccna-and-ccnp-data-center-what-are-the-key-differences/</loc><lastmod>2021-10-20T09:40:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-importance-of-correctly-scoping-your-information-systems/</loc><lastmod>2021-10-20T09:40:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-would-you-say-to-the-ceo-about-hiring-for-the-cloud/</loc><lastmod>2021-10-20T09:40:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-the-recipients-of-the-2021-isc%c2%b2-diversity-global-achievement-awards/</loc><lastmod>2021-10-22T10:05:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-addresses-the-cybersecurity-workforce-gap-with-new-entry-level-cybersecurity-certification-pilot-program/</loc><lastmod>2021-10-25T11:15:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-panel-dei-initiatives-come-down-to-choosing-talent/</loc><lastmod>2021-10-27T11:47:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-chris-krebs-keynote-address-fighting-cyber-adversaries-requires-new-thinking-and-approaches/</loc><lastmod>2021-10-26T11:38:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-ceo-welcomes-virtual-attendees-and-urges-them-to-focus-on-strong-team-development/</loc><lastmod>2021-10-25T11:15:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-lessons-learned-from-the-baltimore-ransomware-attack/</loc><lastmod>2021-10-31T12:54:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-adam-steltzner-keynote-perseverance-and-ingenuity-will-get-us-through-the-pandemic/</loc><lastmod>2021-10-27T11:47:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-different-about-cloud-security/</loc><lastmod>2021-11-02T13:24:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-critical-infrastructure-a-main-focus-of-security-congress-2021/</loc><lastmod>2021-11-01T13:04:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-lisa-forte-keynote-insider-threats-a-bigger-challenge-than-ever/</loc><lastmod>2021-11-01T13:04:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-diversity-the-key-to-cybersecuritys-future/</loc><lastmod>2021-11-03T13:33:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-the-time-is-now/</loc><lastmod>2021-11-07T14:51:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-the-recipients-of-the-2021-isc%c2%b2-government-professional-award/</loc><lastmod>2021-11-04T13:53:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-cybersecurity-workforce-study-skills-gap-narrows-but-more-help-is-needed/</loc><lastmod>2021-11-08T15:00:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-improvements-to-your-isc%c2%b2-cybersecurity-online-continuing-education/</loc><lastmod>2021-11-09T15:16:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-does-not-end-with-implementing-controls-2/</loc><lastmod>2021-11-08T15:00:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-ceo-clar-rosso-receives-cyber-futurist-executive-award/</loc><lastmod>2021-11-10T15:32:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-roela-santos-honoree-of-the-2021-isc%c2%b2-julie-peeler-franz-do-it-for-the-children-volunteer-award/</loc><lastmod>2021-11-14T16:32:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-exin-cloud-certifications-what-are-the-differences-2/</loc><lastmod>2021-11-09T15:16:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-threat-of-insecure-interfaces-and-apis/</loc><lastmod>2021-11-15T16:43:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-dr-christina-izuakor/</loc><lastmod>2021-11-16T16:54:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-microsoft-certified-azure-administrator-associate-how-does-vendor-focus-factor-in/</loc><lastmod>2021-11-21T17:47:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/we-heard-you-updates-to-the-isc%c2%b2-ethics-questions/</loc><lastmod>2021-11-22T17:56:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-cybersecurity-entry-level-certification-exam-topics-announced/</loc><lastmod>2021-11-29T19:58:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-chapter-creates-space-for-entry-level-members-and-professional-connections/</loc><lastmod>2021-11-28T19:38:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-security-congress-goes-west-las-vegas-here-we-come/</loc><lastmod>2021-12-01T20:23:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-dawn-of-true-iot-security/</loc><lastmod>2021-11-30T20:13:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-symantec-certified-cloud-credentials-how-do-they-compare/</loc><lastmod>2021-12-05T21:31:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/rookies-needed-experience-required/</loc><lastmod>2021-12-06T21:47:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-importance-of-security-control-baselines/</loc><lastmod>2021-12-07T22:03:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/insider-threats-can-turn-your-cloud-security-into-a-storm/</loc><lastmod>2021-12-08T22:16:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/four-cybersecurity-tips-everyone-should-know-before-black-friday-and-cyber-monday/</loc><lastmod>2021-12-08T22:16:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-best-way-to-start-your-cloud-security-career/</loc><lastmod>2021-12-09T22:39:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-prepare-for-cissp-exam-day/</loc><lastmod>2021-12-12T23:23:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-safe-and-secure-way-to-decommission/</loc><lastmod>2021-12-13T23:41:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissps-from-around-the-globe-an-interview-with-chinyelu-philomena-karibi-whyte/</loc><lastmod>2021-12-14T23:59:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/data-consistency-storage-in-the-cloud/</loc><lastmod>2021-12-16T00:09:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/poll-data-what-ceos-need-to-know-about-cybersecurity-going-into-2022/</loc><lastmod>2021-12-17T00:22:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/bringing-cybersecurity-to-the-board-and-vice-versa/</loc><lastmod>2021-12-20T01:00:37-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-cybersecurity-scholarship-opportunities-open-now/</loc><lastmod>2021-12-21T01:15:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-ransomware-study-collaboration-and-communication-are-essential-for-ransomware-readiness/</loc><lastmod>2021-12-23T01:34:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-google-cloud-certified-professional-cloud-security-engineer-which-shows-broader-mastery-in-cloud-security/</loc><lastmod>2021-12-22T01:24:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-relevant-work-experience-for-cissp/</loc><lastmod>2021-12-27T02:30:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-vs-microsoft-azure-certified-security-engineer-associate-how-does-vendor-focus-factor-in/</loc><lastmod>2021-12-29T02:59:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/top-books-to-prepare-you-for-cissp-exam/</loc><lastmod>2022-01-03T04:08:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-security-complements-data-privacy/</loc><lastmod>2022-01-12T05:57:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-cybersecurity-role-as-a-business-partner/</loc><lastmod>2022-01-12T05:57:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-other-type-of-shadow-it/</loc><lastmod>2022-01-13T06:08:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/find-a-new-cybersecurity-job-in-2022/</loc><lastmod>2022-01-14T06:23:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/decisions-decisions-and-the-role-of-authorization/</loc><lastmod>2022-01-14T06:23:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-do-cybersecurity-experts-predict-in-2022/</loc><lastmod>2022-01-17T07:06:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2021-isc%c2%b2-leadership-webinars-on-demand/</loc><lastmod>2022-01-19T07:30:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/looking-back-at-2021-and-forward-to-2022/</loc><lastmod>2022-01-24T09:00:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-were-the-best-cybersecurity-webinars-of-2021/</loc><lastmod>2022-01-24T09:00:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/whats-next-for-cybersecurity-in-2022/</loc><lastmod>2022-01-30T10:36:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/u-s-cyber-command-operation-targets-real-life-cyber-threats/</loc><lastmod>2022-02-01T10:58:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-opportunity-join-isc%c2%b2-regional-event-committees/</loc><lastmod>2022-01-31T10:45:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-future-of-work-without-workers/</loc><lastmod>2022-02-02T11:07:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/a-cybersecurity-role-has-topped-list-of-best-jobs/</loc><lastmod>2022-02-07T12:24:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-shape-the-csslp-exam/</loc><lastmod>2022-02-06T12:12:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/no-excuses-get-your-isc2-certification-done-in-2022/</loc><lastmod>2022-02-08T12:33:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/time-to-hit-the-books-training-course-is-available-for-candidates-preparing-for-the-new-isc%c2%b2-entry-level-cybersecurity-certification-pilot-exam/</loc><lastmod>2022-02-09T12:49:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-is-cybersecurity-one-of-the-best-fields-for-young-people-to-enter/</loc><lastmod>2022-02-10T13:00:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/register-today-for-the-isc%c2%b2-entry-level-cybersecurity-certification-pilot-exam/</loc><lastmod>2022-02-09T12:49:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-become-an-isc%c2%b2-volunteer-and-make-a-difference-in-the-cybersecurity-community/</loc><lastmod>2022-02-13T13:40:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-stakes-have-never-been-higher-how-to-expand-the-cyber-workforce/</loc><lastmod>2022-02-13T13:40:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/security-through-obscurity-it-doesnt-work/</loc><lastmod>2022-02-17T14:44:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/register-today-by-popular-demand-more-entry-level-cybersecurity-certification-pilot-exam-review-offerings-now-available/</loc><lastmod>2022-02-21T15:31:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/do-you-know-someone-interested-in-a-career-in-cybersecurity-at-just-125-the-new-pilot-exam-for-the-isc%c2%b2-entry-level-certification-can-catapult-their-career-forward/</loc><lastmod>2022-02-22T15:51:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/online-cissp-exam-coming-soon/</loc><lastmod>2022-02-23T16:04:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/lasting-impact-of-the-pandemic-lessons-from-the-2021-isc%c2%b2-workforce-study/</loc><lastmod>2022-02-24T16:13:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/elevating-the-risk-discussion-quantitative-analytics/</loc><lastmod>2022-03-03T18:04:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/legislation-watch-2021-state-cybersecurity-roundup-and-states-to-watch-in-2022/</loc><lastmod>2022-02-28T17:22:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/want-to-speak-at-isc%c2%b2-security-congress-2022-the-call-for-speakers-is-now-open/</loc><lastmod>2022-03-07T19:01:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-take-the-cissp-exam-online-registration-is-open/</loc><lastmod>2022-03-09T19:28:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/celebrating-the-black-history-of-cybersecurity/</loc><lastmod>2022-03-09T19:28:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-report-by-u-k-ncsc-highlights-the-impact-of-diversity-on-the-cybersecurity-workforce/</loc><lastmod>2022-03-14T20:40:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-pulse-survey-log4j-remediation-exposes-real-world-toll-of-the-cybersecurity-workforce-gap/</loc><lastmod>2022-03-16T21:15:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/catching-up-with-kaleb-worku-2020-knowbe4-black-americans-in-cybersecurity-scholarship-recipient/</loc><lastmod>2022-03-17T21:27:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/igniting-adoption-of-a-secure-software-development-lifecycle-a-guide-for-secure-software-champions/</loc><lastmod>2022-03-21T22:42:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/an-entry-level-cybersecurity-certification-why-every-employer-should-want-their-staff-to-have-one/</loc><lastmod>2022-03-22T22:55:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/celebrating-young-women-in-cybersecurity-weijia-yan-isc%c2%b2-undergraduate-scholarship-recipient/</loc><lastmod>2022-03-24T23:15:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/women-in-cyber-webinar-tackling-gender-bias-and-defining-success/</loc><lastmod>2022-03-28T00:12:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-dilemma-of-defense-in-depth/</loc><lastmod>2022-03-30T00:35:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/changes-to-the-cissp-exam-length-coming-soon/</loc><lastmod>2022-04-04T01:51:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/knowbe4-spreads-cyber-awareness-training-to-their-community/</loc><lastmod>2022-03-31T00:44:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-can-flexible-work-conditions-do-for-cyber/</loc><lastmod>2022-04-05T02:03:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-is-the-cissp-issmp-exam-changing/</loc><lastmod>2022-04-06T02:13:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-the-young-women-tackling-gender-bias-in-cybersecurity/</loc><lastmod>2022-04-08T02:46:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-concerns-cyber-pros-most-about-the-invasion-of-ukraine/</loc><lastmod>2022-04-11T03:27:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/going-for-isc%c2%b2-certification-get-the-facts-before-you-choose-a-training-provider-3/</loc><lastmod>2022-04-12T03:40:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/tips-from-a-ciso-how-to-create-a-security-program/</loc><lastmod>2022-04-14T04:06:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-you-win-big-in-vegas-global-achievement-awards-nominations-open-now/</loc><lastmod>2022-04-18T05:01:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-u-s-workers-worry-about-cyberattacks/</loc><lastmod>2022-04-19T05:28:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/summary-of-march-inside-isc2-webinar-stay-vigilant/</loc><lastmod>2022-04-21T05:52:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/winning-tactics-for-security-awareness-innovations-via-experience-1-of-2/</loc><lastmod>2022-04-21T05:52:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/associate-of-isc%c2%b2-spotlight-angel-sayani/</loc><lastmod>2022-04-24T06:45:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-is-neurodiversity-understanding-neurodiversity-and-its-prominence-in-cybersecurity/</loc><lastmod>2022-04-26T07:18:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-do-you-mean-my-email-isnt-free/</loc><lastmod>2022-05-02T08:28:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/we-stand-with-all-of-you/</loc><lastmod>2022-05-03T08:38:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/winning-tactics-for-security-awareness-innovations-via-experience-2-of-2/</loc><lastmod>2022-05-08T09:31:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/secure-london-stokes-debate-on-the-future-of-the-cybersecurity-workforce/</loc><lastmod>2022-05-11T10:08:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-does-volunteering-at-isc%c2%b2-mean-hear-from-volunteer-lisa-vaughan/</loc><lastmod>2022-05-15T11:02:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/celebrating-service-and-diversity-nominate-a-colleague-today/</loc><lastmod>2022-05-16T11:21:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/quantum-cybersecurity-addressing-the-boogeyman-in-the-room/</loc><lastmod>2022-05-19T11:59:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/why-are-ransomware-attacks-increasing-and-how-can-we-prevent-them/</loc><lastmod>2022-05-17T11:33:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-a-shakespearean-drama/</loc><lastmod>2022-05-22T12:34:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-hellenic-chapter-wins-award-for-creating-educational-materials/</loc><lastmod>2022-05-24T13:01:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ccsp-exam-many-changes-on-the-way/</loc><lastmod>2022-05-30T14:34:34-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/board-dashboard-and-bored/</loc><lastmod>2022-05-31T14:51:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hot-cybersecurity-technologies/</loc><lastmod>2022-06-01T15:02:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/you-can-join-the-isc%c2%b2-board-of-directors/</loc><lastmod>2022-06-06T16:27:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/report-cybersecurity-skills-gap-creates-vulnerabilities/</loc><lastmod>2022-06-12T17:42:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-advocates-for-membership-shares-opinions-on-proposed-uk-standards-and-pathway/</loc><lastmod>2022-06-13T18:01:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-prevent-burnout-among-cybersecurity-professionals-before-during-and-after-a-breach/</loc><lastmod>2022-06-14T18:10:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-entry-level-cybersecurity-certification-pilot-exam-reaches-1000-exam-milestone/</loc><lastmod>2022-06-15T18:21:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/journey-into-cybersecurity-conversations-with-cyber-newcomers-part-1/</loc><lastmod>2022-06-16T18:52:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-supports-members-with-thoughtful-response-to-sec-proposed-rule-on-cybersecurity-reporting/</loc><lastmod>2022-06-19T19:35:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/journey-into-cybersecurity-conversations-with-cyber-newcomers-part-2/</loc><lastmod>2022-06-20T19:46:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-united-states-department-of-justice-will-no-longer-prosecute-ethical-hackers/</loc><lastmod>2022-06-22T20:11:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/update-on-isc%c2%b2-entry-level-cybersecurity-certification-pilot/</loc><lastmod>2022-06-26T21:28:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/just-released-2022-isc%c2%b2-security-congress-agenda/</loc><lastmod>2022-06-27T21:41:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-concludes-online-proctored-exams-do-not-meet-exam-security-standards/</loc><lastmod>2022-06-27T21:41:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/u-s-state-and-federal-funding-for-cybersecurity-is-on-the-rise/</loc><lastmod>2022-06-28T22:06:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-mentorship-help-the-cybersecurity-workforce-gap/</loc><lastmod>2022-06-29T22:15:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/entry-level-cybersecurity-jobs-key-to-solving-workforce-gap/</loc><lastmod>2022-07-04T23:32:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/secure-north-america-apple-stories-how-technology-has-mediated-technology-through-history/</loc><lastmod>2022-07-06T23:53:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-your-organization-find-and-develop-the-next-generation-of-cybersecurity/</loc><lastmod>2022-07-11T00:43:40-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/secure-north-america-users-arent-the-weakest-link-theyre-your-allies/</loc><lastmod>2022-07-13T01:37:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/unconscious-bias-how-to-understand-identify-and-manage-it/</loc><lastmod>2022-07-15T02:17:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/infosecurity-europe-a-show-so-secure-a-train-strike-couldnt-break-it/</loc><lastmod>2022-07-18T02:49:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-create-successful-cissp-and-ccsp-study-groups/</loc><lastmod>2022-07-20T03:09:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/center-for-cyber-safety-and-education-begins-program-updates-to-increase-impact/</loc><lastmod>2022-07-19T02:59:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/four-steps-to-using-metrics-to-defend-your-security-budget/</loc><lastmod>2022-07-21T03:34:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-can-you-find-and-retain-new-cybersecurity-talent/</loc><lastmod>2022-07-22T03:44:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-politics-cybersecurity-global-issues-ian-bremmer-to-speak-as-isc%c2%b2-keynote/</loc><lastmod>2022-07-26T05:28:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hiring-managers-lead-on-entry-level-cybersecurity-job-descriptions/</loc><lastmod>2022-07-29T06:06:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-recognized-as-top-cybersecurity-certification/</loc><lastmod>2022-08-01T06:54:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-i-prepared-for-the-cissp-exam/</loc><lastmod>2022-08-02T07:04:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-july-15-2022/</loc><lastmod>2022-08-02T07:04:49-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-long-does-it-take-to-train-entry-level-cybersecurity-team-members/</loc><lastmod>2022-08-04T07:25:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-pledges-1-million-certified-in-cybersecurity/</loc><lastmod>2022-08-05T07:43:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-piloting-teams-while-under-pressure-carey-lohrenz-will-speak-as-an-isc%c2%b2-keynote/</loc><lastmod>2022-08-07T08:04:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/apac-security-leaders-come-together-at-secure-singapore/</loc><lastmod>2022-08-08T08:18:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-july-21-2022/</loc><lastmod>2022-08-09T08:29:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-and-others-commit-to-closing-the-cybersecurity-workforce-gap-while-at-the-white-house/</loc><lastmod>2022-08-10T08:39:52-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-july-29-2022/</loc><lastmod>2022-08-11T08:52:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-exam-changes-on-the-way/</loc><lastmod>2022-08-14T10:06:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-from-national-security-to-cartel-infiltration-ciaran-martin-and-robert-mazur-to-keynote/</loc><lastmod>2022-08-16T10:35:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/state-policymakers-tackling-cyber-issues-including-ransomware/</loc><lastmod>2022-08-15T10:20:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-why-you-wont-want-to-miss-it/</loc><lastmod>2022-08-18T11:10:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-august-5-2022/</loc><lastmod>2022-08-21T12:03:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-theme-empower/</loc><lastmod>2022-08-22T12:21:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/submit-your-comments-to-nist-regarding-hipaa-security/</loc><lastmod>2022-08-23T12:37:57-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-and-f5-examine-owasps-top-10-report-on-new-web-application-security-risks/</loc><lastmod>2022-08-25T13:02:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-empower-your-weekend-with-training/</loc><lastmod>2022-08-28T14:06:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-august-12-2022/</loc><lastmod>2022-08-29T14:21:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/effective-security-using-zero-trust-architecture/</loc><lastmod>2022-08-30T14:43:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-u-s-legislation-introduced-to-help-small-business-provide-cybersecurity-training/</loc><lastmod>2022-08-30T14:43:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/black-hat-usa-2022-are-cybersecurity-tool-standards-on-the-way/</loc><lastmod>2022-08-31T14:53:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-august-19-2022/</loc><lastmod>2022-09-01T15:16:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-to-cybersecurity-use-these-career-hacks-to-get-a-foot-in-the-door/</loc><lastmod>2022-09-01T15:16:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-hottest-it-security-technologies-in-2022/</loc><lastmod>2022-09-05T16:28:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/poll-cybersecurity-professionals-want-remote-work-options/</loc><lastmod>2022-08-24T06:00:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/poll-cybersecurity-professionals-want-remote-work-options-2/</loc><lastmod>2022-09-07T17:32:04-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-august-26-2022/</loc><lastmod>2022-09-08T18:09:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-certified-in-cybersecurity-entry-level-certification-officially-launches/</loc><lastmod>2022-09-11T18:47:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-empower-your-career/</loc><lastmod>2022-09-13T19:06:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-closing-the-cybersecurity-workforce-gap/</loc><lastmod>2022-09-15T19:31:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/become-an-isc%c2%b2-candidate-no-exam-experience-or-fees-required/</loc><lastmod>2022-09-14T19:21:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-cybersecurity-workforce-climate-in-asia/</loc><lastmod>2022-09-20T20:32:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-september-2-2022/</loc><lastmod>2022-09-22T21:10:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/enrollment-is-open-for-free-one-million-certified-in-cybersecurity/</loc><lastmod>2022-09-21T20:54:15-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/so-youre-certified-in-cybersecurity-now-what/</loc><lastmod>2022-09-26T22:15:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/assigning-tasks-to-less-experienced-cybersecurity-hires-depends-on-company-needs/</loc><lastmod>2022-09-27T22:25:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-september-9-2022/</loc><lastmod>2022-09-28T22:40:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-and-venafi-explore-the-strange-new-world-of-machine-identity-management/</loc><lastmod>2022-09-28T22:40:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-empowering-partnerships/</loc><lastmod>2022-09-29T22:59:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-ceo-clar-rosso-honored-by-sc-medias-women-in-it-security-program/</loc><lastmod>2022-10-08T01:15:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-september-16-2022/</loc><lastmod>2022-10-08T01:15:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-empowering-new-connections/</loc><lastmod>2022-10-08T01:15:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/your-cybersecurity-experience-is-needed-for-creating-new-u-s-ftc-regulations/</loc><lastmod>2022-10-08T01:15:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-september-23-2022/</loc><lastmod>2022-10-10T01:38:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/real-talk-with-ccsps-an-interview-with-jonas-bjork-ccsp/</loc><lastmod>2022-10-10T01:38:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/announcing-this-years-isc2-global-achievement-award-recipients-part-1/</loc><lastmod>2022-10-11T01:53:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/55000-cybersecurity-candidates-join-isc%c2%b2-workforce-programs-in-one-month/</loc><lastmod>2022-10-12T02:06:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/announcing-this-years-isc2-global-achievement-award-recipients-part-2/</loc><lastmod>2022-10-11T01:53:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-september-30-2022/</loc><lastmod>2022-10-13T02:15:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-october-7-2022/</loc><lastmod>2022-10-19T03:51:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/proposed-amendments-to-isc%c2%b2-bylaws-member-vote-opens-soon/</loc><lastmod>2022-10-18T03:32:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/hiring-inexperienced-cybersecurity-practitioners-whats-not-to-like/</loc><lastmod>2022-10-17T03:07:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/october-is-cybersecurityawarenessmonth/</loc><lastmod>2022-10-13T02:15:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-lessons-from-a-ransomware-attack/</loc><lastmod>2022-10-20T04:08:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-empowering-the-cyber-community/</loc><lastmod>2022-10-19T03:51:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-effective-cybersecurity-takes-collaboration/</loc><lastmod>2022-10-21T04:31:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-approach-cybersecurity-as-a-science/</loc><lastmod>2022-10-21T04:31:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-panel-why-apprenticeships-matter/</loc><lastmod>2022-10-22T04:41:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-ian-bremmer-is-technology-the-new-world-order/</loc><lastmod>2022-10-25T06:01:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/no-work-experience-dont-let-that-stop-you-from-pursuing-a-career-in-cybersecurity/</loc><lastmod>2022-10-24T05:35:05-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2congress-2022-highlighting-the-need-for-collaborative-defense/</loc><lastmod>2022-10-25T06:01:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-certified-in-cybersecurity-and-comptia-security-how-do-they-create-a-path-to-a-career-in-cybersecurity/</loc><lastmod>2022-10-26T06:18:43-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-collaborates-with-kisa-to-strengthen-cybersecurity-professional-development-in-emerging-economies/</loc><lastmod>2022-11-05T09:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-and-the-uk-cyber-security-council-professional-standards-pilot-program-what-it-means-for-members/</loc><lastmod>2022-10-28T07:09:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/as-the-cybersecurity-profession-grows-so-does-the-workforce-gap/</loc><lastmod>2022-11-05T09:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-october-21-2022/</loc><lastmod>2022-11-05T09:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurityawarenessmonth-mentorship-interview-series-part-1-mentors/</loc><lastmod>2022-11-05T09:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/reminder-isc%c2%b2-bylaw-voting-is-open/</loc><lastmod>2022-11-05T09:25:12-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-certified-in-cybersecurity-and-isaca-cybersecurity-fundamentals-how-do-they-compare/</loc><lastmod>2022-11-06T10:22:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/proposed-bylaws-amendments-what-they-mean/</loc><lastmod>2022-11-11T11:47:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurityawarenessmonth-mentorship-interview-series-part-2-mentees/</loc><lastmod>2022-11-09T11:25:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cloud-security-and-the-portable-career/</loc><lastmod>2022-11-13T12:11:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-october-28-2022/</loc><lastmod>2022-11-15T12:38:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-november-4-2022/</loc><lastmod>2022-11-27T15:20:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/elevating-diverse-voices-isc%c2%b2-announces-five-key-dei-partnerships/</loc><lastmod>2022-11-22T14:08:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/building-the-next-generation-of-security-and-privacy-professionals/</loc><lastmod>2022-11-20T13:40:19-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/effective-cybersecurity-board-reporting/</loc><lastmod>2022-11-17T13:08:44-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurityawarenessmonth-mentorship-interview-series-part-3-reverse-mentorship/</loc><lastmod>2022-11-16T12:54:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/considering-a-career-in-cybersecurity-ask-yourself-these-4-questions/</loc><lastmod>2022-12-01T16:07:08-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/avoiding-cloud-security-fails-excerpts-from-isc%c2%b2-security-congress-2022/</loc><lastmod>2022-12-04T16:48:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-november-11-2022/</loc><lastmod>2022-12-06T17:19:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/real-talk-with-ccsps-an-interview-with-matt-lee-ccsp/</loc><lastmod>2022-12-08T17:42:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/build-your-network-with-isc%c2%b2-and-built/</loc><lastmod>2022-12-11T18:29:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ot-the-new-gold-mine-for-hackers-and-how-cds-can-secure-it/</loc><lastmod>2022-12-12T18:43:14-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-november-18-2022/</loc><lastmod>2022-12-13T18:56:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/are-deepfakes-really-a-security-threat-member-recap-from-isc%c2%b2-security-congress-2022/</loc><lastmod>2022-12-14T19:12:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-board-of-directors-election-results-2/</loc><lastmod>2022-12-15T19:28:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/achieving-data-security-and-analytics-with-ai-member-recap-from-isc%c2%b2-security-congress-2022/</loc><lastmod>2022-12-18T20:09:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-december-2-2022/</loc><lastmod>2022-12-19T20:26:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-it-takes-to-be-a-cybersecurity-professional-the-non-technical-skills-you-need/</loc><lastmod>2022-12-19T20:26:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/working-with-the-u-s-government-an-overview-of-the-u-s-cybersecurity-maturity-model-certification/</loc><lastmod>2022-12-20T20:45:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-december-9-2022/</loc><lastmod>2022-12-21T20:56:48-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/level-up-your-cloud-security-skills-and-your-career-options/</loc><lastmod>2022-12-22T21:25:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/calling-all-cissps-help-shape-the-cissp-exam/</loc><lastmod>2022-12-26T22:18:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-annual-meeting-outcomes-bylaws-amendments-and-2023-board-of-directors/</loc><lastmod>2023-01-03T00:16:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/2022-isc%c2%b2-member-bloggers/</loc><lastmod>2023-01-04T00:32:46-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-december-16-2022/</loc><lastmod>2023-01-06T01:15:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/sscp-members-we-need-your-input/</loc><lastmod>2023-01-09T02:08:27-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/policy-brief-u-s-cyber-threat-intelligence-part-1-introduction-background/</loc><lastmod>2023-01-13T03:35:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc2-ceo-discusses-uk-and-global-cyber-challenges-at-chatham-house/</loc><lastmod>2023-01-11T03:00:36-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/seasons-greetings-from-isc2/</loc><lastmod>2023-01-17T04:40:45-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-top-ranked-webinars-of-2022-by-region/</loc><lastmod>2023-01-20T05:12:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-december-23-2022/</loc><lastmod>2023-01-23T06:22:11-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/policy-brief-u-s-cyber-threat-intelligence-part-2-summary-recommendations-challenges/</loc><lastmod>2023-01-25T06:51:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cissp-issaps-we-need-your-input/</loc><lastmod>2023-01-27T07:23:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-new-jersey-chapter-hosts-international-event-with-500-attendees/</loc><lastmod>2023-01-27T07:23:18-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-january-6-2023/</loc><lastmod>2023-01-30T08:09:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/help-shape-the-cgrc-exam-formerly-known-as-cap/</loc><lastmod>2023-01-31T08:28:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/predictions-2023-part-1-what-will-the-new-year-bring-for-the-infosec-community/</loc><lastmod>2023-02-02T09:10:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-january-13-2023/</loc><lastmod>2023-02-03T09:21:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/real-talk-with-ccsps-an-interview-with-vanessa-leite-ccsp-cissp/</loc><lastmod>2023-02-07T10:13:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-january-20-2023/</loc><lastmod>2023-02-07T10:13:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-to-earn-your-isc%c2%b2-certification/</loc><lastmod>2023-02-07T10:13:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/no-experience-no-problem-isc%c2%b2-recruits-140000-individuals-interested-in-a-cybersecurity-career/</loc><lastmod>2023-02-08T10:27:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/how-are-you-marking-data-privacy-day/</loc><lastmod>2023-02-09T10:41:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-january-27-2023/</loc><lastmod>2023-02-08T10:27:03-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/royal-mail-cyber-incident-is-an-ongoing-cyberattack-ceo-admits-to-mps/</loc><lastmod>2023-02-09T10:41:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-31-january-2023/</loc><lastmod>2023-02-10T10:53:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/essential-team-building-for-strong-cloud-security/</loc><lastmod>2023-02-12T11:16:32-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-february-3-2023/</loc><lastmod>2023-02-13T11:35:01-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-could-nists-cybersecurity-framework-2-0-be-the-beginning-of-international-best-practice/</loc><lastmod>2023-02-14T11:46:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-february-7-2023/</loc><lastmod>2023-02-14T11:46:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/juggling-the-demands-of-a-multicloud-environment/</loc><lastmod>2023-02-14T11:46:33-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/calling-all-cissp-issmp-and-cissp-certification-holders/</loc><lastmod>2023-02-16T12:18:55-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-circleci-attackers-stole-session-cookie-to-bypass-mfa/</loc><lastmod>2023-02-15T12:07:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-puts-members-at-the-center-of-our-cybersecurity-content-in-2023/</loc><lastmod>2023-02-20T13:28:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/predictions-2023-part-2-what-will-the-new-year-bring-for-the-infosec-community/</loc><lastmod>2023-02-17T12:28:51-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-february-10-2023/</loc><lastmod>2023-02-20T13:28:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-center-for-cyber-safety-and-education-looking-for-volunteer-leaders/</loc><lastmod>2023-02-21T13:46:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-certified-in-cybersecurity-exam-now-available-in-more-languages/</loc><lastmod>2023-02-21T13:46:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cap-is-now-certified-in-governance-risk-and-compliance-cgrc/</loc><lastmod>2023-02-23T14:26:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-february-15-2023/</loc><lastmod>2023-02-23T14:26:30-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-cybersecurity-managers-fear-catastrophic-cyber-event-now-likely-within-two-years/</loc><lastmod>2023-02-22T14:04:23-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/recession-what-recession-isc%c2%b2-study-shows-cybersecurity-expected-to-weather-tech-sector-jobs-downturn/</loc><lastmod>2023-02-23T14:26:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-white-house-cybersecurity-policy-maker-secure-open-source-software-even-if-it-benefits-adversaries-we-should-do-it-anyway/</loc><lastmod>2023-02-23T14:26:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-february-17-2023/</loc><lastmod>2023-02-26T15:48:16-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-february-21-2023/</loc><lastmod>2023-02-27T16:11:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-center-for-cyber-safety-and-education-evolves-its-mission-statement/</loc><lastmod>2023-02-27T16:11:26-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-research-finds-cybersecurity-professionals-to-be-least-impacted-by-layoffs-in-2023/</loc><lastmod>2023-03-01T16:31:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/succession-wealth-fails-to-keep-cyber-attackers-at-bay/</loc><lastmod>2023-02-28T16:22:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/provide-your-feedback-on-the-cissp-issep-exam-outline/</loc><lastmod>2023-03-01T16:31:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-february-24-2023/</loc><lastmod>2023-03-05T17:19:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-top-5-new-social-engineering-attacks-in-2023/</loc><lastmod>2023-03-03T16:55:09-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-significance-of-key-risk-indicators-in-organisations/</loc><lastmod>2023-03-02T16:45:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-security-congress-2023-begins-call-for-presentations/</loc><lastmod>2023-03-02T16:45:25-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/advance-your-cybersecurity-career-with-toolkits-from-isc%c2%b2-and-built/</loc><lastmod>2023-03-06T17:37:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/crypto-scammers-game-youtube-for-amplification-while-keeping-under-radar-researchers-find/</loc><lastmod>2023-03-07T17:57:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-february-28-2023/</loc><lastmod>2023-03-06T17:37:07-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-members-reveal-deep-skepticism-about-artificial-intelligence-and-machine-learning/</loc><lastmod>2023-03-07T17:57:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/u-s-dod-puts-cpd-at-heart-of-its-new-cyber-workforce-strategy/</loc><lastmod>2023-03-09T18:18:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/whats-driving-the-demand-for-grc-professionals-in-critical-infrastructure/</loc><lastmod>2023-03-07T17:57:31-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/white-house-cybersecurity-strategy-will-make-big-tech-step-up-in-ongoing-cyber-struggle/</loc><lastmod>2023-03-13T19:59:54-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/the-top-five-most-fun-cybersecurity-mistakes-in-tv-and-movies/</loc><lastmod>2023-03-09T18:18:53-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-march-3-2023/</loc><lastmod>2023-03-14T20:59:38-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/earn-cpe-credits-for-reading-isc%c2%b2-news-and-insights-with-our-quiz/</loc><lastmod>2023-03-15T21:11:00-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/can-a-barista-become-your-next-soc-analyst/</loc><lastmod>2023-03-16T21:22:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-march-7-2023/</loc><lastmod>2023-03-16T21:22:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/voices-of-women-in-cyber-isc%c2%b2-candidate-nidhi-kannoujia/</loc><lastmod>2023-03-19T22:09:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/international-womens-day-must-watch-webinars-by-women-in-cybersecurity/</loc><lastmod>2023-03-19T22:09:35-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/grace-hopper-the-woman-who-changed-how-we-code-and-test/</loc><lastmod>2023-03-16T21:22:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-march-10-2023/</loc><lastmod>2023-03-21T22:39:59-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/what-we-learned-from-the-royal-mail-ransomware-chat/</loc><lastmod>2023-03-20T22:27:39-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-march-14-2023/</loc><lastmod>2023-03-22T22:50:29-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/meet-the-2023-isc%c2%b2-bylaws-committee/</loc><lastmod>2023-03-23T22:59:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-where-next-as-europol-hails-rare-doppelpaymer-ransomware-success/</loc><lastmod>2023-03-23T22:59:56-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/update-new-process-for-isc%c2%b2-exam-registration/</loc><lastmod>2023-03-27T23:47:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/svb-collapse-a-stark-warning-for-technology-and-cybersecurity-startups/</loc><lastmod>2023-03-27T23:47:06-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-march-17-2023/</loc><lastmod>2023-03-26T23:30:47-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-listens-women-working-in-cybersecurity/</loc><lastmod>2023-03-30T00:43:20-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-lookalike-confusable-domains-fuel-phishing-attacks/</loc><lastmod>2023-03-29T00:07:41-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-march-21-2023/</loc><lastmod>2023-03-31T01:09:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/real-talk-with-ccsps-an-interview-with-panagiotis-soulos/</loc><lastmod>2023-03-31T01:09:10-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/ferrari-warns-customers-their-personal-data-might-have-been-hijacked/</loc><lastmod>2023-04-03T01:54:58-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-will-chatgpts-perfect-english-change-the-game-for-phishing-attacks/</loc><lastmod>2023-04-05T02:24:28-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-march-24-2023/</loc><lastmod>2023-04-04T02:11:17-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/women-in-cybersecurity-history-to-today/</loc><lastmod>2023-04-07T02:54:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/member-feedback-on-isc%c2%b2-2023-bylaws-requested-by-april-7/</loc><lastmod>2023-04-10T03:37:13-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-march-28-2023/</loc><lastmod>2023-04-07T02:54:02-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/analysis-hackers-exploit-zero-day-to-siphon-1-5-million-from-bitcoin-atms/</loc><lastmod>2023-04-11T03:47:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-cissp-exam-registration-process-for-2023/</loc><lastmod>2023-04-11T03:47:24-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cisa-moving-further-towards-pre-emptive-stance-with-ransomware-attack-alert-system/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-march-31-2023/</loc><lastmod>2023-04-13T04:37:50-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/new-adaptive-platform-customizes-online-certification-training-for-a-personalized-experience/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-april-4-2023/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-supports-cyber-newcomers/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/push-notification-is-more-secure-than-sms-2fa-so-why-the-reluctance-to-enable-it/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/latest-cyberthreats-and-advisories-april-7-2023/</loc><lastmod>2023-04-14T04:54:22-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/identity-management-day-2023-advice-from-cyber-pros/</loc><lastmod>2023-04-14T04:54:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/cybersecurity-industry-news-review-april-11-2023/</loc><lastmod>2023-04-14T04:54:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/identitymanagementday-best-practices-to-help-keep-your-organization-secure/</loc><lastmod>2023-04-14T04:54:21-05:00</lastmod></url><url><loc>https://web.isc2ncrchapter.org/isc%c2%b2-security-congress-in-nashville-see-yall-there/</loc><lastmod>2023-04-13T07:05:00-05:00</lastmod></url></urlset>
