<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//mccarthycyberreadiness.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://mccarthycyberreadiness.com/integrating-your-cyber-insurance-into-your-incident-response-efforts/</loc>
		<lastmod>2026-01-25T19:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2025/09/AdobeStock_1502502271-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/its-official-privilege-for-forensic-reports-is-dead-heres-why-and-what-to-do-next/</loc>
		<lastmod>2026-01-25T19:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2025/08/img-5-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2025/10/diagram-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2025/10/diagram-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/sec-bod-guidance-for-cisos/</loc>
		<lastmod>2026-01-29T04:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2025/10/SEC-BOD-Guidance-1-e1769659747964.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/are-you-ready-to-effectively-engage-with-your-board-bod/</loc>
		<lastmod>2026-01-29T21:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/01/Colin-CISO100-Pic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/why-the-us-nist-says-your-technical-tactical-cyber-incident-response-plan-cirp-is-now-insufficient/</loc>
		<lastmod>2026-02-16T15:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/02/R3-diagram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/how-to-ensure-that-your-cirp-is-aligned-with-your-cybersecurity-risks/</loc>
		<lastmod>2026-02-20T00:03:33+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/02/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/iran-developments-proactive-containment-options/</loc>
		<lastmod>2026-03-01T05:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/your-annual-report-may-be-your-biggest-cybersecurity-risk/</loc>
		<lastmod>2026-03-12T21:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/03/image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/03/image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/03/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://mccarthycyberreadiness.com/the-other-significant-nist-change-for-cirps-detect/</loc>
		<lastmod>2026-04-02T21:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/04/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://mccarthycyberreadiness.com/wp-content/uploads/2026/04/image-1.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->