<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.cybsafe.com</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/terms-of-website-use</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/about-us</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/products/guide</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/behave-hub</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/contact-us</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/products/plans</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/products/phish</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/products/respond</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/partners</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/our-technology</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/demo</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/research-library</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/privacy-notice</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/cookies-policy</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/anti-bribery</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/legal/ai</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/events</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/about-cybsafe-research-and-analysis</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/legal</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started/hiscox</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started/cfc</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started/partner</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started/victor-insurance</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/get-started/evolve</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/project-nexus</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/10-most-important-cyber-security-articles</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/10-ways-to-make-cyber-security-part-of-your-working-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/11-things-rsa-2026-told-us-about-the-human-side-of-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/3-approaches-remote-work</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/3-concepts-that-spell-success-in-security-awareness-personalization</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/3-mistakes-people-make-with-cyber-security-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/5-factors-strong-cybersecurity-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/5-takeaways-from-our-measuring-security-behaviours-in-financial-services-webinar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/5-ways-to-get-more-from-cyber-security-awareness-campaigns</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/6-ways-to-make-your-security-nudges-better</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/7-reasons-why-security-awareness-training-is-important</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/a-security-awareness-practitioners-guide-to-infosec-2022</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/achievement-unlocked-how-behavioral-science-transforms-device-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/ai-cybersecurity-is-chatgpt-safe</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/an-open-letter-to-cisos-security-leaders</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/are-phishing-attacks-on-the-rise</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/artificial-intelligence-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/better-cyber-defences</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/burnout-in-the-tech-industry</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/can-bs-make-sat-stick</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/can-fun-personalization-really-change-security-behaviors</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cocktail-party-effect-vulnerable-to-cyber-attack</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/combat-cyber-crime</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-crime-continues-to-soar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-criminals-are-using-covid-19-cover-stories-in-new-phishing-attacks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-criminals-take-down-largest-companies</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-security-goals-in-security-behavior</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-security-research-library</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cyber-security-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cybersecurity-awareness-month-ideas</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cybsafe-a-leader-in-forrester-wave-human-risk-management-solutions-q3-2024</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cybsafe-book-list</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/cybsafe-secures-3-5m-series-a-investment</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/damage-cyberbullying-does-organizations</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/demonstrating-security-awareness-value-to-senior-stakeholders-blog</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/demystifying-the-eu-ai-act</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/digital-operational-resilience-act-dora</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/does-isolation-restrict-remote-worker-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/dora-financial-institutions</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/employment-identity-theft</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/enhancing-a-cybersecurity-teams-reputation-communication-and-policies</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/executive-phishing-prevention</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/experts-7-1950s-inspired-principles-for-cyber-resilience</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/experts-speak-out-four-reasons-your-cyber-risk-strategy-needs-a-reboot</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/fighting-cybercrime</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/forrester-names-cybsafe-a-security-awareness-training-leader</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/four-different-types-of-security-awareness-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/free-virtual-summit-on-the-people-culture-and-social-aspects-of-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/from-home-sweet-home-to-home-safe-home-how-to-maintain-security-when-employees-work-remotely</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/gains-and-losses</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/gdpr</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/genai-for-security-awareness-can-genais-predictive-analytics-transform-tired-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/genai-for-security-awareness-what-most-people-miss</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/get-your-people-interested-in-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/goodbye-security-awareness-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-can-phishing-affect-a-business</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-can-we-prepare-for-the-challenges-of-hybrid-working</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-cybsafe-turns-a-perceived-cyber-security-risk-into-another-line-of-defence</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-does-personality-influence-your-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-financial-service-organisations-need-to-adapt-for-hybrid-working</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-our-desire-for-consistency-could-prevent-more-cyber-attacks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-successful-was-the-uks-national-cyber-security-strategy-ncss-2016-2021</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-build-good-cyber-security-habits</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-deal-with-ransomware</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-get-phishing-simulations-right</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-get-ransomware-remediation-and-protection-right</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-identify-a-phishing-email</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-increase-the-perceived-value-for-what-you-do-to-manage-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-make-data-backups-a-regular-part-of-everyones-day</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-make-money-with-law-firms-and-ransomware</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-make-your-security-awareness-training-more-effective</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-measure-behavior-long-read</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-secure-zoom-houseparty-and-other-video-conferencing-apps</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-strengthen-your-cybersecurity-with-user-research</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-talk-like-a-human-risk-manager-unleashing-the-language-of-credibility</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-unlock-cams-huge-potential-for-behavior-change</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/how-to-write-like-cybsafe</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/human-centered-security-why-a-cyber-strategy-should-prioritize-people</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/influence-long-term-security-behaviors</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/interlinking-genai-and-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/intro-to-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/is-your-digital-footprint-making-you-prone-to-attacks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/its-time-to-stop-exposing-yourself-online</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/keep-your-company-secure-black-friday</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/knowledge-articulation-the-secret-sauce-in-genai-for-security-awareness</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/large-enterprises-beginning-to-question-sme-cyber-security-inaugural-cybsafe-supplier-cyber-security-study-finds</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/legal-webinar-recap-3-hard-truths-we-learned-about-lawyers</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/lesson-on-security-behaviors</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/lets-punish-phishing-victims-er-you-want-to-do-what</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/letting-your-security-awareness-training-down</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/long-read-how-to-measure-behaviour</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/managing-cyber-risk-in-a-hybrid-workplace</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/maximizing-security-awareness-engagement-how-the-pros-do-it</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/measuring-the-effectiveness-of-security-awareness-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/miscalculating-your-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/more-positive-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/nis2-beefing-up-security-for-critical-industries</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/official-guide-to-cybsafe-products-and-pricing</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/optimism-bias</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/people-are-not-the-problem</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/people-are-unique-cybersecurity-must-treat-them-like-it</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/people-dont-trust-cybersecurity-and-we-dont-blame-them</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/personalising-cybersecurity-in-the-workplace</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/phishing-insurance-executives-step-up</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/phishing-training-an-intelligent-approach</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/phoughts-on-phishing</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/post-pandemic-cisos-are-overlooking-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/protecting-people-running-on-autopilot</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/ransomware-as-a-service-raas</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/ransomware-attack-on-the-irish-health-service-executive</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/ransomware-trends-2023-predictions-for-this-year-and-beyond</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/rational-choices-in-cybersecurity-navigating-the-metrics-of-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/reducing-cyber-risk-could-be-impossible</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/rip-traditional-security-awareness-and-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/risks-threats-vulnerabilities-explained</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/romance-fraud-personal-lives-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/romance-scams-stats-for-organizations</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/sat-to-hrm-why-and-how-to-evolve-your-security-strategy</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-awareness-is-dead-4-things-holding-your-organization-back</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-awareness-is-dead-long-live-borderless-behavior-analytics</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-awareness-is-dead-long-live-borderless-security-awareness</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-awareness-predictions</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-awareness-security-culture-human-risk-management-specific-job-titles</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-behavior-change-like-entrepreneur</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-metrics-reboot-less-input-better-output-real-outcomes</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/security-nudges-behavioral-research</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/six-security-essentials-for-those-working-from-home</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/some-people-love-to-take-a-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/some-simulated-attacks-help-reduce-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/spotlight-creating-a-passphrase-ruleset</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/spotlight-have-you-got-multi-factor</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/tackle-cyber-crime</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/take-cyber-security-seriously</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/ten-key-topics-in-cyber-security-awareness-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-4-key-factors-for-a-successful-phishing-simulation</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-abc-guide-to-improving-information-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-anatomy-of-human-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-behave-newsletter-all-issues</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-best-way-to-avoid-17m-fines-is-to-stop-trying-to-avoid-17m-fines</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-dogma-of-security-awareness</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-frustration-factor</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-genai-story-isnt-just-about-technology</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-hidden-cost-of-cybersecuritys-masculinity-problem</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-internet-of-things-and-cyber-security-what-are-the-risks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-new-sec-cybersecurity-rules-whats-happened-so-far-how-its-changing-security-awareness-and-what-it-means-for-you</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-old-definition-and-the-new</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-true-story-of-a-prank-so-good-even-the-white-house-fell-for-it</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/the-two-most-common-phishing-scams</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/todays-cyber-criminals</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/tool-or-infrastructure-why-it-matters-for-hrm</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/top-18-questions-about-cybsafe</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/top-cyber-security-attitudes-and-behaviors</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/top-five-examples-of-nudge-theory-in-action</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/traditional-cyber-awareness-programmes-are-failing</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/training-derailed-experts-on-the-future-of-security-awareness</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/triple-pronged-threat-the-cyber-security-challenge</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/understanding-the-uk-online-safety-act-duties-to-protect-children-now-enforceable</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/using-ai-and-machine-learning-to-improve-cyber-defences-and-reduce-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/wake-up-call-the-human-element-in-the-uk-retail-cyberattacks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/wannacry-wont-be-the-last-high-profile-cyber-attack-we-suffer</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/want-my-national-insurance-number-just-ask</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/we-need-human-solutions-to-address-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/we-need-to-stop-referring-to-humans-as-security-assets</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/we-thought-we-needed-to-secure-remote-workers</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/what-exactly-is-security-awareness</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/what-is-human-aspect-of-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/what-is-human-risk-management</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/what-is-ransomware</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/when-nudge-security-is-a-waste-of-time</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/who-is-responsible-for-developing-a-cybersecurity-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-are-healthcare-organisations-targets-for-cyber-attacks</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-are-phishing-attacks-successful</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-are-you-snoozing-updates</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-cybersecurity-is-a-life-skill</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-disciplining-human-error-doesnt-work-when-it-comes-to-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-do-some-organisations-use-two-security-awareness-training-solutions-at-once</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-feedback-is-the-missing-puzzle-piece-in-your-cyber-security-strategy</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-gen-z-doesnt-care-about-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-language-matters-in-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-people-are-so-attached-to-their-dirty-password-habits</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-security-awareness-still-isnt-taken-seriously-and-how-to-fix-it</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-security-awareness-training-fails</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-some-people-may-take-more-security-risks-when-working-remotely</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-the-average-persons-cyber-security-knowledge-should-worry-you</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-we-already-have-that-data-is-bs</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-we-need-new-and-better-human-cyber-risk-metrics</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/why-your-organization-needs-vpns-now-more-than-ever</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/will-data-metrics-and-a-scientific-approach-eventually-eliminate-all-human-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/you-keep-saying-the-human-side-of-cybersecurity-which-one-do-you-mean-there-are-six</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/your-security-goals-are-worthless-there-we-said-it</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/blog/zero-trust-is-up-post-covid-19-but-youd-be-wrong-for-thinking-it-will-keep-networks-safe</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/beyond-awareness-how-to-finally-get-taken-seriously-as-a-security-awareness-hrm-professional</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/ebook-financial-services-making-the-new-hybrid-working-world-work</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/ebook-legal</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/ebook-ransomware-is-real</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/how-to-measure-behavior</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/hybrid-working-is-not-an-excuse-for-more-crap-e-learning</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/new-approach-simulated-phishing-campaigns</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/people-centric-cyber-security-e-book</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/rise-of-ransomware</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/e-books/security-awareness-dead-or-dying</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2023-security-awareness-predictions-report</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2024-gartner-four-steps-to-develop-outcome-driven-metrics-for-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2024-gartner-generative-ai-security-and-risk-management</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2024-gartner-how-to-make-your-cybersecurity-program-more-defensible-to-stakeholders</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2024-gartner-the-security-and-risk-management-leaders-guide-to-the-sec-disclosure-rules</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2024-security-awareness-predictions-report</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/2025-predictions-report</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/banking-on-trust-how-consumer-banking-behavior-is-swayed-by-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/behavior-change</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/cybsafe-culture-assessment-tool-whitepaper</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/gartner-5-communications-tactics-to-get-people-to-take-cyber-risk-more-seriously</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/genai-and-the-human-aspect-of-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/impact-2024-the-findings-whitepaper</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/impact-2025-the-findings</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/meaningful-metrics-whitepaper</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/nudging-the-gentle-art-of-persuasion</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/oh-behave-the-annual-cybersecurity-attitudes-and-behaviors-report-2025-2026</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/oh-behave-the-cybersecurity-attitudes-and-behaviors-report-2021-2025</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/personality-and-digital-footprints</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/rebooting-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/the-ultimate-people-centric-guide-to-ransomware-prevention</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/what-your-workforce-wishes-the-cyber-team-knew</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/whitepaper-legal</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/who-cares-about-cybersecurity-awareness-month</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/whitepapers/why-am-i-failing-to-engage-my-workforce-in-cybersecurity-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/2023-security-predictions-survey</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/30-ways-increase-security-awareness-engagement</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/behaviour-iq-webinar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/borderless-cyber-security-webinar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/bots-gone-wild</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/business-email-compromise-evolved</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/business-risk-reduction-sebdb</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/cyber-skillup</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/demonstrating-security-awareness-value-to-senior-stakeholders</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/free-webinar-30-10-2024-applying-the-oh-behave-findings-to-sat-programs</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/free-webinar-cybsafes-2025-security-awareness-predictions</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/free-webinar-security-awareness-in-2023</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/how-ai-is-transforming-human-risk-management-in-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/how-to-talk-like-a-human-risk-manager</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/how-to-use-sebdb-to-drive-a-more-behavior-focused-security-program</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/human-risk-factors-in-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/human-risk-metrics-ciso</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/hybrid-working</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/influencing-specific-security-behaviors-life-examples</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/intuition-webinar-do-you-people-focus-more-on-your-people-than-you-do</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/law-society-webinar-the-human-aspect-of-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/maturing-sat-programs-into-human-risk-management-strategies</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/maximizing-user-engagement-during-cybersecurity-awareness-month</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/meaningful-metrics-webinar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/new-science-security-nudges</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/nudge-nudge-wink-wink</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/office-of-the-future-webinar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/oh-behave-findings</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/on-demand-webinar-punishment-in-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/punishment-in-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/ransomware-attack-law-firms</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/security-awareness-is-dying</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/the-human-aspect-of-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/ultimate-people-centric-ransomware-prevention</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/webinar-reducing-phishing-risk-in-the-insurance-industry</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/webinars/what-genai-means-for-security-awareness-in-2024</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/autumn-2023</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/autumn-2024</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/autumn-2025</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/spring-2024</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/spring-2025</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/summer-2024</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/summer-2025</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/winter-2023</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/winter-2025</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/releases/winter-2026</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/building-a-positive-security-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/building-a-security-program-from-scratch</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/communicating-security-to-senior-executives</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/creating-a-security-conscious-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/cybersecurity-as-a-life-skill</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/dont-reinvent-the-wheel</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/empowering-a-security-team</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/episode-29-bridging-psychology-and-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/evolving-with-technology</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/global-security-and-local-implementation</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/having-a-people-centric-cybersecurity-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/how-leaders-build-a-strong-security-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/how-you-incentivize-human-behavior</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/human-risk-calls-for-human-solutions</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/humanizing-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/identifying-a-strong-security-culture</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/interdisciplinary-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/investigations-and-forensics</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/keep-it-simple-keep-it-secure</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/mental-health-culture-and-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/navigating-burnout</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/psychological-safety-in-cybersecurity</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/security-awareness-efforts-fall-short-now-what</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/standardizing-appropriate-cyber-behavior</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/the-impact-of-collaboration</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/the-importance-of-building-trust</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/urgency-in-adopting-human-risk-management</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/why-compliance-matters</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/podcast/why-everyone-should-be-a-frontline-defender-in-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/cybersecurity-automation-should-focus-on-human-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/forresters-pronounces-security-awareness-official-now-what</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/human-risk-management</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/human-risk-management-moving-from-awareness-to-action</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/simulated-phishing</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/value/types-of-interventions-that-change-security-behavior</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/free-cybersecurity-awareness-month-planning-tool</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/ransomware-toolkit</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/security-awareness-engagement-taxonomy</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/security-awareness-engagement-toolkit</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/security-nudges-taxonomy</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/free-cybersecurity-tools/the-nudge-toolkit</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/education</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/financial-services</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/hastings-group</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/healthcare-pharmaceutical</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/tag-international</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/case-studies/technology</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/events/human-risk-forums</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/events/human-risk-management-strategy-session</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/events/the-impact-conference</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/23-of-people-consider-cybersecurity-posture-when-choosing-a-bank-as-customer-expectations-move-beyond-compliance</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/a-quarter-of-uk-businesses-have-been-cryptojacked-reveals-new-research</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/almost-three-quarters-of-uk-businesses-employing-staff-with-vulnerable-passwords-cybsafe-analysis-reveals</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/british-start-cybsafe-launches-service-uses-behavioural-science</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/business-exposed-employees-spill-more-secrets-to-ai-than-they-would-to-friends-in-the-bar</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cloud-distribution-partners-cybsafe-disrupt-cyber-security-aware</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cyber-security-leaders-from-the-ico-the-bank-of-england-the-hut-group-aviva-and-kpmg-announced-as-speakers-for-peepsec</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybersecurity-awareness-month-needs-a-human-touch-with-only-42-satisfied-with-current-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybersecurity-awareness-month-participants-show-50-higher-trust-in-employers-security-stance</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-announced-fstech-awards-2018-finalist</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-appoints-vps-sales-finance</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-becomes-an-associate-partner-to-the-centre-for-research-and-evidence-on-security-threats</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-expands-to-north-america-with-the-appointment-of-atlanta-based-distributor-starlink-north-america</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-finds-two-thirds-of-enterprise-suppliers-quizzed-about-their-cyber-security-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-has-been-named-in-the-q4-2021-now-tech-report-for-security-awareness-and-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-invites-cyber-security-professionals-to-contribute-to-new-academic-research-into-the-impact-of-simulated-phishing</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-launches-sebdb-2-0-to-help-organizations-measure-and-change-security-behaviors</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-place-cyber-security-training-heart-law-societys-service</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-raises-28m-series-b-funding-round</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-research-workplace-cybersecurity-gap</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafe-secures-5-6-million-series-a1-investment-round</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/cybsafes-new-behavioural-risk-platform-challenges-the-security-awareness-and-training-status-quo</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/enterprise-it-leaders-demanding-more-stringent-cyber-security</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/financial-conduct-authority-partners-cybsafe-tackle-human-aspect</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/financial-service-workers-are-putting-in-longer-hours-since-the-start-of-the-pandemic-leading-them-to-worry-about-making-mistakes</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/human-error-to-blame-for-9-in-10-uk-cyber-data-breaches-in-2019</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/ico-data-analysis-healthcare-and-education-sectors-retain-spot-as-most-vulnerable-to-cyber-risk</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/new-research-shows-high-regard-for-cybersecurity-teams-within-organizations-but-visibility-issues-persist</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/only-1-in-10-workers-remembers-all-their-cyber-security-training</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/peepsec2020-is-coming</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/phishing-dominates-uk-cyber-threat-landscape-shows-analysis-of-latest-ico-figures</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/qa-partners-with-cybsafe-to-disrupt-cyber-security-awareness-market</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/remote-working-poses-significant-security-risk-to-uks-sme-businesses-new-research-reveals</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
  <url>
    <loc>https://www.cybsafe.com/press-releases/study-almost-40-of-workers-share-sensitive-information-with-ai-tools-without-employers-knowledge</loc>
    <lastmod>2026-04-10</lastmod>
  </url>
</urlset>