<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://www.defensible.tech/</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/why-defensible</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/about-defensible</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/services</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/it-services</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/assessment-services</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/penetration-testing</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/incident-response-and-digital-forensics</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/industries</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/saas-startups</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/private-equity</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/non-profit</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/pricing</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/resources</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/testimonials-and-success-stories</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/partners</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/referral-program</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/careers</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/get-started</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/10-questions-every-general-counsel-should-ask</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/a-day-in-the-life-of-a-cybersecurity-msp</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/asset-security-technology-sevco</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/case-study-firewall-rule-audit-and-cleanup-large-university</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/case-study-the-juilliard-school-0</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/case-study-the-juilliard-school</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/changing-your-msp-how-defensible-technology-makes-it-effortless-for-smbs</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/ciso-as-a-service-pricing-free-chart</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/critical-infrastructure-vciso-value</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/critical-security-controls</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/cybersecurity-planning-and-budgeting-for-2025</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/cybersecurity-trends-to-avoid</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/defensible-ai-adoption-readiness-framework-non-profit</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/defensible-risk-assessment-methodology</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/defensible-technology-named-to-mssp-alerts-2024-list-of-top-250-mssps</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/everything-you-need-to-know-about-the-texas-data-privacy-and-security-act-tdpsa</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/exceeding-reasonable-standards-of-security-with-vulnerability-assessment-frameworks</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/from-pii-to-bii-ai-data-exposure-risk</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/hidden-costs-of-ransomware</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/how-network-access-control-systems-secure-wireless-networks-against-modern-threats</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/how-to-protect-critical-data</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/is-your-cybersecurity-program-defensible</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/kaseya-ransomware-attack-lessons</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/know-your-vulnerability-assessment-frameworks-cis-implementation-groups</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/microsoft-azure-mandatory-mfa</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/microsoft-copilot-readiness-understanding-ai-data-exposure</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/minimum-standards-for-a-defensible-cybersecurity-program</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/msp-titan-of-industry-award-non-profit</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/overcome-pain-points-with-vciso</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/pe-firm-email-migration-best-practices</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/penetration-testing-methodology</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/recent-breaches-and-the-evolving-role-of-grc</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/risk-based-vulnerability-management</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/the-cost-of-cybersecurity-breaches-beyond-financial-losses</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/vciso-value-for-modern-businesses</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/vmware-license-costs-why-migrate-to-the-cloud</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/vulnerability-assessment-solutions-why-you-need-one-and-how-to-choose</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/vulnerability-management-program-metrics</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/what-is-a-vciso</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/why-ztna-is-a-must-for-modern-businesses</loc><lastmod>2026-05-07</lastmod></url>
  <url><loc>https://www.defensible.tech/blog/xdr-and-xdraas-threat-detection</loc><lastmod>2026-05-07</lastmod></url>
</urlset>
