<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.security-architecture.org</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/team</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/blog</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/dictionary</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/subscribe-to-podcast</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/contact</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/about-us</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/launch-pad</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/home-copy</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episodes</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/shows</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/events</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/search</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/albarius</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/arcanna-ai-augments-security-operation-centers</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/ceo-of-astrix-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/ceo-of-tamnoon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie034-pangea</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie035-valence-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie036-anchain</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie037-safebase</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie038-hiddenlayer</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie039-relyance-ai</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie040-phalanx</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie041-c2a-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie042-aembit</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie043-critical-matrix</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie044-bastionzero</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie045-siometrix</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie046-iceberg-cyber</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie047-cyera</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie048-seemetrics</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie049-caido</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie051-1up</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie052-suridata</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie053-medstack</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie054-discern-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie055-trustle</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie056-entitle</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie057-kobalt</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie058-menlo-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie059-phishfirewall</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie060-armis</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie061-docontrol</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie062-gytpol</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie063-hackerverse</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie064-cypienta</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie065-island</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie066-ammolite-analytx</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie067-cassie-crossley---author-of-software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie068-dune-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie069---ross-haleliuk---author-of-cyber-for-builders</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie070-richard-stiennon-security-yearbook</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie071-cork</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie072</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie073-cybersecurity-first-principles</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie074-deepcove-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie075-adamnetworks</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie076-jolera</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie077-augmentt</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie078-data-more</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie079-inside-cyber</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie080-rene-sylvain-bedard</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie081-alex-east</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie082-peter-cohan</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie083-seemplicity</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie084-vorlon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie085-albarius</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie086-charles-henderson-coalfire</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie087-gurucul</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie088-cybersecuritys-dirty-secret</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie089-rose-it-services</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie090-tonic-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie092-omnitrust</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/cie50-baar-technologies</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/e027-moty-jacob-ceo-of-surf-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/e031-sivan-tehila-ceo-of-onyxia-cyber</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/glimps</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/lacework-cspm</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/mammoth-cyber</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/netskope-mimecast-integration</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e01-anton-chuvakin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e02-bitglass</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e03-zscaler</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e04-netskope</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e05-checkpoint</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e06-forcepoint</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e07-iboss</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e08-moneyball</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e09-cato</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s01e10-mcafee</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e02-perimeter-81</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e03-bitglass</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e04-netskope</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e05-zscaler</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e06-appgate</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e07-iboss</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e08-check-point-odosecurity</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e09-twingate</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e1-kickoff</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e10-palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e11-tehama</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e12-akamai</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e13-moneyball</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e14-fortinet</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e15-beyondtrust</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e16-axis-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s02e17-beyondcorp</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e01-kickoff</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e02-neuralegion</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e03-snyk</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e04-cloud-defense</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e05-moneyball</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e06-checkmarx</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e07-garantir</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s03e08-cider-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e01-kickoff</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e02-forcepoint</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e03-talon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e04-skyhigh</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e05-island</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e06-menlo-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e07-seraphic-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e08-moneyball</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e09-perception-point</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s04e10-surf-security</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s05e01-kickoff</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/s05e02-uptycs</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/sophos-new-xdr-and-ace</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/episode/squarex</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/application-security-questions</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/beyond-perimeter-architecture-part-1</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/beyond-perimeter-architecture-part-2-cloud-security-web-gateway-or-how-gartner-calls-them-secure-access-service-edge-sase</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/cloud-security-adoption-2021-sase</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/cloud-security-adoption-2021-sase-second</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/cyberattack-surface-widens-as-world-sees-increase-in-remote-work</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/evolution-of-go-to-market-partner-enablement</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/evolution-of-go-to-market-partner-enablement-02</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/evolution-of-go-to-market-product-alignment</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/evolution-of-go-to-market-selecting-partners</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/evolution-of-go-to-market-services-alignment</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/four-steps-to-provide-high-end-consulting-from-home</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/hello-world</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/if-a-tree-falls-in-the-forest-does-it-make-a-sound</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/introducing-our-fist-season-and-topic-sase</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/medical-devices-on-the-iot-put-lives-at-risk</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/sase-outbound-browsing</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/season-2-ztna-remote-access-question</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/security-software-as-a-service-and-why-its-the-way-to-go-for-the-next-five-years</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/sa-blog-posts/the-perimeter-security-paradigm-shifts-left</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/abhi-sharma</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/abhi-veldurthy</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/al-yang</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/alex-east</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/alex-marshall</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/alex-shan</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/alon-jackson</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/alon-levin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/amir-khayat</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/amit-bareket</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/anton-chuvakin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/balaji-gopalan</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/bill-latin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/bob-gilbert</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/brian-brown</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/brian-kenyon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/cara-wolf</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/carlson-choi</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/cassie-crossley</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/charles-henderson</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/chris-sestito</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/chuck-brooks</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/dan-amiga</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/daniel-krivelevich</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/daniel-schiappa</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/david-dellapelle</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/david-goldschlag</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/david-greenfield</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/david-redekop</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/david-sequino</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/derik-belair</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/dheeraj-joshi</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/dino-boukouris</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/dr-chase-cunningham</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/emile-fugulin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/emiliano-berenbaum</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/eric-mishayev</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ezz-tahoun</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/fernando-montenegro</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/frederic-grelot</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/gadi-bashvitz</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ganesh-pai</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/gareth-rushgrove</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/george-avetisov</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/gil-azrielant</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/greg-irwin</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/gregory-pepper</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ian-y-garrett</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jaap-mantel</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jack-britton</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/james-brotsos</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jason-garbis</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jason-georgi</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jian-zhen</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/jim-fulton</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/joshua-crumbaugh</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/kieran-miller</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/lee-kappon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/mariana-padilla</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/marina-segal</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/michael-argast</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/michael-bakaic</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/michael-koyfman</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/mike-krygier</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/mike-schuricht</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/moty-jacob</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/nadir-izrael</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/nathan-howe</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/nick-edwards</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/nicolas-st-pierre</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/nim-nadarajah</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/noa-zilberman</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/oliver-friedrichs</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/omar-romero</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/omri-weinberg</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/patrick-foxhoven</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/paul-martini</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/paul-vallee</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/peter-cohan</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/petrica-ruta</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/poornima-debolle</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/rafi-wanounou</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ravid-circus</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/rene-sylvain-bedard</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/richard-stiennon</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/rick-howard</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ron-nissim</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ross-haleliuk</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/ross-young</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/roy-fridman</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sai-venkataraman</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sandro-janita</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/saryu-nayyar</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/seth-spergel</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/setu-kulkarni</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/shantanu-bhattacharya</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sharon-goldberg</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sharon-isaaci</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/shirley-salzman</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sivan-tehila</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/sriram-balasubramanian</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/tal-kollender</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/tal-zamir</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/tanya-janca</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/trevor-combs</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/victor-fang</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/vivek-ramachandran</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/yoni-shohet</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/yotam-segev</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/guests/zuly-gonzalez</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s01-sase-outbound</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s02-sase-ztna-remote-access</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s03</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s04</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s05</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s06</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s07</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s08</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s09</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/seasons/s10</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/launch-pad/lacework-cspm</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/launch-pad/netskope-mimemcast-integration</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/launch-pad/sophos-new-xdr-and-ace</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/show/cyber-inspiration</loc>
    </url>
    <url>
        <loc>https://www.security-architecture.org/show/launch-pad</loc>
    </url>
</urlset>