<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//elasticito.co.uk/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://elasticito.co.uk/a-practical-guide-to-attack-surface-management/</loc>
		<lastmod>2023-03-30T17:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/02/A-Practical-Guide-to-Attack-Surface-Management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/02/A-Practical-Guide-to-Attack-Surface-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/a-practical-guide-to-attack-surface-management-2/</loc>
		<lastmod>2023-03-30T17:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/03/Blue-White-Online-Business-Webinar-Twitter-Header-640-%C3%97-200-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/03/Blue-White-Online-Business-Webinar-Twitter-Header-640-%C3%97-200-px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/why-it-is-important-to-assess-and-monitor-third-party-risk/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Why-It-Is-Important-to-Assess-and-Monitor-Third-Party-Risk_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Why-It-Is-Important-to-Assess-and-Monitor-Third-Party-Risk_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Black-Kite-making-the-case-for-cyber-risk-assessment-automation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-monitoring-third-party-cyber-risk-at-scale.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/5-cyber-security-tips-to-keep-your-business-safe/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/11/5-Cyber-Security-Tips-to-Keep-Your-Business-Safe_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/11/5-Cyber-Security-Tips-to-Keep-Your-Business-Safe_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/the-anatomy-of-a-data-breach/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/The-Anatomy-of-a-Data-Breach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/The-Anatomy-of-a-Data-Breach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Anatomy-of-a-Data-Breach_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Stats_Data-Protection-Worldwide_Anatomy-of-a-Data-Breach_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Data-Protection-Worldwide_Anatomy-of-a-Data-Breach_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/quantifying-third-party-cyber-risk/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Quantifying-Third-Party-Cyber-Risk_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Quantifying-Third-Party-Cyber-Risk_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/01/Elasticito-Black-Kite-cyber-risk-quantification-using-FAIR-Model.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/creating-a-whois-template-to-register-domains/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/How-To-Remove-Public-WHOIS-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/How-To-Remove-Public-WHOIS-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Workday_Domain-_-IP-Whois-ViewDNS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/01/Whitbread_Domain-_-IP-Whois-ViewDNS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/swipe-left-on-romance-scams-this-valentines-day/</loc>
		<lastmod>2023-03-30T17:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/02/Youre-hotter-than-the-bottom-of-my-laptop....png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/02/Youre-hotter-than-the-bottom-of-my-laptop....png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/7-questions-to-ask-about-cyber-insurance/</loc>
		<lastmod>2023-03-30T17:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/09/7-Questions-to-Ask-About-Cyber-Insurance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/09/7-Questions-to-Ask-About-Cyber-Insurance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/using-cyber-risk-ratings-for-dora-compliance/</loc>
		<lastmod>2023-03-30T17:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/09/Using-Cyber-Risk-Ratings-for-DORA-Compliance-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/09/Using-Cyber-Risk-Ratings-for-DORA-Compliance-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/05/Black-Kite-Cyber-Risk-Rating-B.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/3-steps-to-holistic-third-party-risk-management/</loc>
		<lastmod>2023-03-30T17:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/3-Steps-to-Holistic-Third-Party-Risk-Management_Cover-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/3-Steps-to-Holistic-Third-Party-Risk-Management_Cover-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Table_3-Steps-to-Holistic-Third-Party-Risk-Management_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/3-Steps-to-Holistic-Third-Party-Risk-Management_Elasticito-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/4-ways-to-use-security-ratings-tools-to-automate-risk-assessments/</loc>
		<lastmod>2023-03-30T17:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/4-Ways-to-Use-Security-Ratings-Tools-to-Automate-Risk-Assessments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/4-Ways-to-Use-Security-Ratings-Tools-to-Automate-Risk-Assessments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Third-party-networks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-Cyber-risk-assessment-Example-Corp-Oct-2022.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-assessing-procurement-short-list-vendors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-third-party-cyber-risk-benchmarking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-monitoring-third-party-cyber-risk-at-scale.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Black-Kite-filtering-third-parties-using-SmartTags.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/elasticito-limited-announces-commitment-to-growing-global-cyber-security-success-by-becoming-a-cyber-security-awareness-month-2022-champion/</loc>
		<lastmod>2023-03-30T17:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Add-a-heading-1200-%C3%97-628-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/10/Untitled-design-1-e1664973631767.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/will-conflict-in-ukraine-raise-the-risk-of-cyber-attacks-in-other-countries/</loc>
		<lastmod>2023-03-30T17:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/Elasticito-Cyber-Risk-Brief-Will-conflict-in-the-Ukraine-raise-the-risk-of-cyber-attacks_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/Elasticito-Cyber-Risk-Brief-Will-conflict-in-the-Ukraine-raise-the-risk-of-cyber-attacks_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/the-business-case-for-risk-quantification-for-third-parties/</loc>
		<lastmod>2023-03-30T17:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Cam4_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Yahoo_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Aadhaar_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/understanding-cyber-risk-exposure-for-vendors-in-russia-ukraine/</loc>
		<lastmod>2023-03-30T17:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Understanding-Cyber-Risk-Exposure-for-Vendors-in-Russia-and-Ukraine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Understanding-Cyber-Risk-Exposure-for-Vendors-in-Russia-and-Ukraine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Cyclops_Blink_persistence.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Capture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Black-Kite-Smart-Tags_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Untitled-design-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Untitled-design-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/a-business-perspective-of-supply-chain-risk/</loc>
		<lastmod>2023-03-30T17:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/A-Business-Perspective-of-Supply-Chain-Risk_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/A-Business-Perspective-of-Supply-Chain-Risk_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Risk-Response_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Supply-Wisdom_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Deloitte-Stats_Elasticito-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-do-you-determine-the-risk-impact-of-a-vendor/</loc>
		<lastmod>2023-03-30T17:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/How-Do-You-Determine-the-Risk-Impact-of-a-Vendor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/How-Do-You-Determine-the-Risk-Impact-of-a-Vendor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Vendor-Management-Over-Time_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Vendor-Types-and-Data-Risk_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Risk-Assessment-Matrix-Template-Key_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Risk-Assessment-Matrix-Template_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/03/Phinity-Third-Part-Risk_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/data-privacy-and-the-future-of-business/</loc>
		<lastmod>2023-03-30T17:09:31+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/Data-Privacy-and-the-Future-of-Business.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/Data-Privacy-and-the-Future-of-Business.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/NIST_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/3-essential-security-awareness-training-topics-for-2021/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/07/3-Essential-Security-Awareness-Training-Topics-for-2021_Elasticito-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/07/3-Essential-Security-Awareness-Training-Topics-for-2021_Elasticito-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/celebrate-cyber-security-awareness-month-2021/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/09/Celebrate-Cyber-Security-Awareness-Month-2021_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/09/Celebrate-Cyber-Security-Awareness-Month-2021_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/human-behavior-your-biggest-cyber-security-risk/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/09/Behavior_Risk_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/09/Behavior_Risk_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/09/Behavioral-Risk-Assessment-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/be-cyber-smart-this-cyber-security-awareness-month/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/10/Be-Cyber-Smart-this-Cyber-Security-Awareness-Month_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/10/Be-Cyber-Smart-this-Cyber-Security-Awareness-Month_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/prioritizing-cyber-security-in-a-hybrid-workplace/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/10/Prioritizing-Cybersecurity-in-a-Hybrid-Workplace_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/10/Prioritizing-Cybersecurity-in-a-Hybrid-Workplace_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-take-back-control-of-your-data/</loc>
		<lastmod>2023-03-30T17:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/01/How-to-Take-Back-Control-of-Your-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/01/How-to-Take-Back-Control-of-Your-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2022/02/Cisco_Stat_Elasticito-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/security-questionnaire-response-automation-black-kite/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Security-questionnaire-response-automation_The-Black-Kite-solution.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Security-questionnaire-response-automation_The-Black-Kite-solution.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Vendor-Security-Assessment-Process_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Making-the-case-for-cyber-risk-assessment-automation-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Gartner-Vendor-Risk-Management-Lifecycle-opportunities-for-automation-and-efficiency-gains-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Black-Kite-Dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/building-the-case-for-security-validation/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/USA-Today-Colonial-Pipeline-Co-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/USA-Today-Colonial-Pipeline-Co-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/post-pandemic-technology-cyber-security-trends-in-banking-part-1/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Technology-and-Cyber-Security-Trends-in-Banking_Elasticito-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Technology-and-Cyber-Security-Trends-in-Banking_Elasticito-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Elasticito-General-technology-trends-in-Banking-in-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/mitigating-a-ransomware-attack-can-security-awareness-training-assist/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Mitigating-a-Ransomware-Attack_Can-Security-Awareness-Training-Assist_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Mitigating-a-Ransomware-Attack_Can-Security-Awareness-Training-Assist_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/post-pandemic-technology-cyber-security-trends-in-banking-part-2/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Technology-and-Cyber-Security-Trends-in-Banking_Elasticito-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Technology-and-Cyber-Security-Trends-in-Banking_Elasticito-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Elasticito-Top-3-Cyber-Risks-in-Banking-in-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/06/Elasticito-Emerging-Cyber-Security-Technologies-in-Banking-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/sans-announces-further-expansion-with-relationship-with-elasticito/</loc>
		<lastmod>2023-03-30T17:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/07/SANS-Security-Awareness-and-Elasticito-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/the-ransomware-revolution/</loc>
		<lastmod>2023-03-30T17:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Ransomware_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Ransomware_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/security-awareness-training-are-organisations-doing-enough/</loc>
		<lastmod>2023-03-30T17:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Security-Awareness-Training-%E2%80%93-are-organisations-doing-enough_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Security-Awareness-Training-%E2%80%93-are-organisations-doing-enough_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Example-of-Phishing-Email_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Example-of-Phishing-Emai-with-Malwarel_Elasticito.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/ransomware-facts-risks-and-countermeasures/</loc>
		<lastmod>2023-03-30T17:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/Ransomware-2_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/Ransomware-2_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/BlackKite_RSI_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/cats-dogs-and-cyber-security/</loc>
		<lastmod>2023-03-30T17:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Cats-Dogs-and-cyber-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/04/Cats-Dogs-and-cyber-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/10-tips-for-detecting-and-mitigating-phishing-attacks/</loc>
		<lastmod>2023-03-30T17:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/10-Tips-for-Detecting-and-Mitigating-Phishing-Attacks_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/05/10-Tips-for-Detecting-and-Mitigating-Phishing-Attacks_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/4-tips-for-a-successful-cyber-threat-intelligence-program/</loc>
		<lastmod>2023-03-30T17:09:35+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/4-Tips-for-a-successful-cyber-threat-intelligence-program_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/4-Tips-for-a-successful-cyber-threat-intelligence-program_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Figure-1_4-Tips-for-a-successful-cyber-threat-intelligence-program_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Figure-2_4-Tips-for-a-successful-cyber-threat-intelligence-program_Elasticito-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/are-dashboards-the-future-of-cyber-security-reporting-part-1/</loc>
		<lastmod>2023-03-30T17:09:35+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Are-dashboards-are-the-future-of-cyber-security-reporting_Part-1_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Are-dashboards-are-the-future-of-cyber-security-reporting_Part-1_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Risk-Dashboard_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/vendor-risk-assessments-in-60-minutes/</loc>
		<lastmod>2023-03-30T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Vendor-Risk-Assessments-in-60-Minutes_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Vendor-Risk-Assessments-in-60-Minutes_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Black-Kite-cyber-risk-assessment-Elasticito-March-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Black-Kite-Universal-Parsing-engine-extracted-content.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Black-Kite-automatically-extracted-text-from-policy-and-mapped-to-risk-assessment-question-in-questionnaire.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Black-Kite-Compliance-rating-completeness-before.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Black-Kite-Compliance-rating-completeness-after-uploading-one-policy-doc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/cyber-risks-vs-cyber-threats-are-they-the-same-thing/</loc>
		<lastmod>2023-03-30T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Elasticito_Cyber-risk_VS_Cyber-threat.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/Elasticito_Cyber-risk_VS_Cyber-threat.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/03/FAIR-Elasticito-Threat-x-Vulnerability-Risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/risk-assessment-vs-risk-analysis-an-overview/</loc>
		<lastmod>2023-03-30T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/RiskAssessment_RiskAnalysis_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/RiskAssessment_RiskAnalysis_Elasticito.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/SIG-Questionnarie.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Qualitative_Risk_Assessment_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Quantitative_Risk_Assessment_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-reduce-your-cyber-risk-with-the-fair-cyber-risk-quantification-model/</loc>
		<lastmod>2023-03-30T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-FAIR_cyber_risk_quantification_model_to_reduce_cyber_risk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-FAIR_cyber_risk_quantification_model_to_reduce_cyber_risk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/FAIR-Cyber-Risk-Quantification-model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Black-Kite-FAIR-Risk-model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Vendor-comparison-using-the-FAIR-model.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/a-better-way-to-conduct-security-assessments/</loc>
		<lastmod>2023-03-30T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/A-better-way-to-conduct-security-assessments-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/A-better-way-to-conduct-security-assessments-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Current-Cyber-Risk-Assessment-Process.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Making-the-case-for-cyber-risk-assessment-automation-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Elasticito-Gartner-Vendor-Risk-Management-Lifecycle-opportunities-for-automation-and-efficiency-gains-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Black_Kite_Cyber_Risk_Report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/regularly-validating-security-controls-with-breach-and-attack-simulation/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/05/NIST-CSF-LI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/05/NIST-CSF-LI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-protect-your-customers-and-your-brand-from-stolen-credential-misuse/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/06/102719000_LI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-test-your-security-controls-for-resilience-to-australian-cyber-security-centre-acsc-advisory-2020-008-copy-paste-compromises/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/07/ACSC2020-008_LI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/ransomware-do-you-have-a-tried-and-tested-strategy-in-place/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/07/81267021_LI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/ransomware-develop-and-test-your-response-strategy-using-simulation/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/10/Elasticito_Ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/attack-surface-management-how-to-enable-your-companys-cyber-defence/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/01/Attack_Surface_Management_1200x628.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/01/Attack_Surface_Management_1200x628.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/01/Attack_Surface_Management_1200x628.2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/01/Attack-Surface-Illustration_1200x628.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/simplifying-third-party-vendor-risk-management/</loc>
		<lastmod>2023-03-30T17:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Simplifying-Third-Party-Vendor-Risk-Management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Simplifying-Third-Party-Vendor-Risk-Management-scaled.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/SIG-Questionnarie.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2021/02/Black-Kite-3D-Cyber-Risk-Posture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/webinar-automated-breach-attack-simulation-vs-penetration-testing-to-validate-security-controls/</loc>
		<lastmod>2023-03-30T17:09:54+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/03/Webinar-LI-Graphic-BAS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/03/Webinar-LI-Graphic-BAS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/using-the-fair-model-to-quantify-cyber-risk-for-3rd-parties/</loc>
		<lastmod>2023-03-30T17:09:54+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/01/Advise.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/02/Screenshot-2020-02-25-at-17.48.10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/why-use-the-fair-model-to-quantify-cyber-risk-for-3rd-parties/</loc>
		<lastmod>2023-03-30T17:09:54+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/01/Screenshot-2020-01-28-at-12.00.11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/01/Screenshot-2020-01-28-at-12.00.11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/you-should-adopt-a-cyber-security-framework-heres-why/</loc>
		<lastmod>2023-03-30T17:09:54+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/04/NIST-Cyber-Security-Framework-LI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2020/04/NIST-Cyber-Security-Framework-LI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/disaster-recovery-backup-and-your-cyber-security-strategy/</loc>
		<lastmod>2023-05-22T12:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/05/Disaster-Recovery-Backup-and-Your-Cyber-Security-Strategy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/05/Disaster-Recovery-Backup-and-Your-Cyber-Security-Strategy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/5-best-practices-to-succeed-in-attack-surface-management/</loc>
		<lastmod>2023-05-30T08:21:20+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/05/Dont-Overlook-Attack-Surface-Management-1200-%C3%97-628-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/05/Dont-Overlook-Attack-Surface-Management-1200-%C3%97-628-px.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/elasticito-and-phinity-risk-solutions-forge-a-dynamic-strategic-partnership/</loc>
		<lastmod>2023-11-09T15:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/10/Your-paragraph-text-1200-%C3%97-627-px-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2023/10/Your-paragraph-text-1200-%C3%97-627-px-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/8-surefire-shields-against-ransomware/</loc>
		<lastmod>2024-03-22T11:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-The-Infection-Chain-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-Patch-Management-Report-NESSUS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-Passwords-vs.-Passphrases-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-Multi-Factor-Authentication-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/03/8-Surefire-Shields-Against-Ransomware-Incident-Response-Plan-SANS-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/password-power-up-your-guide-to-online-security/</loc>
		<lastmod>2024-05-02T13:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/05/Password-Power-Up-Your-Guide-to-Online-Security-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/05/Password-Power-Up-Your-Guide-to-Online-Security-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/05/Passphrases.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/the-5-step-attack-surface-management-asm-process/</loc>
		<lastmod>2024-06-04T08:52:05+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/06/5-Step-Attack-Surface-Management-Guide-Elasticito-Front-webpage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/06/5-Step-Attack-Surface-Management-Guide-Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-master-open-source-intelligence-tips-and-tricks/</loc>
		<lastmod>2024-07-15T14:48:14+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/07/How-to-Master-Open-Source-Intelligence-Tips-Tricks-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/07/How-to-Master-Open-Source-Intelligence-Tips-and-Tricks-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/07/The-Open-Source-Intelligence-Cycle-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/07/Active-vs.-Passive-OSINT-Techniques-Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-achieve-cyber-resilience-using-the-nist-cybersecurity-framework/</loc>
		<lastmod>2024-08-22T09:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/08/How-to-Achieve-Cyber-Resilience-Using-the-NIST-Cyber-Security-Framework-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/08/How-to-Achieve-Cyber-Resilience-Using-the-NIST-Cyber-Security-Framework-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/08/Large-Language-Modules-LLM-Elasticito-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/08/Implementing-the-Framework-for-Enhanced-Resilience-Elasticito-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/ransomware-how-susceptible-is-your-organisation-part-2/</loc>
		<lastmod>2024-09-23T07:56:25+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Part-2-Ransomware_-How-Susceptible-Is-Your-Organisation_-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Part-2_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Indicators-of-Compromise-IoCs_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Documentation-Requirements_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware-How-Susceptible-Is-Your-Organisation_FAQs_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/ransomware-how-susceptible-is-your-organisation/</loc>
		<lastmod>2024-09-23T07:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Part-1-Ransomware_-How-Susceptible-Is-Your-Organisation_-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Part-1_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Crown-Jewel-Protection_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/09/Ransomware_-How-Susceptible-Is-Your-Organisation__Network-Segmentation_Elasticito.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/how-to-uncover-your-susceptibility-to-a-ransomware-attack/</loc>
		<lastmod>2024-11-08T09:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/How-to-Uncover-Your-Susceptibility-to-a-Ransomware-Attack_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/How-to-Uncover-Your-Susceptibility-to-a-Ransomware-Attack_Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/Preparing-for-Ransomware-Recovery-is-Crucial_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/The-Future-Remains-Uncertain_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/There-Is-a-Way-to-Predict-Potential-Ransomware-Targets_Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/How-to-Uncover-Your-Susceptibility-to-a-Ransomware-Attack_FAQs_Elasticito-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://elasticito.co.uk/digital-operational-resilience-act-financial-institutions/</loc>
		<lastmod>2024-11-22T15:59:34+00:00</lastmod>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/Digital-Operational-Resilience-Act-Financial-Institutions-Elasticito-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/Digital-Operational-Resilience-Act-Financial-Institutions-Elasticito.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://elasticito.co.uk/wp-content/uploads/2024/11/The-Five-Pillars-of-DORA_Digital-Operational-Resilience-Act-Financial-Institutions-Elasticito.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->