<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//icitech.org/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://icitech.org/hp-watchdox-covenant-announced-as-icit-fellows/</loc>
		<lastmod>2015-02-10T15:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/department-of-energy-cio-acting-shares-defense-in-depth-strategy-at-icit-fellow-meeting/</loc>
		<lastmod>2015-03-15T17:27:38+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/03/2015-02-26-20.50.11-e1425312945377.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/hhs-icit-fellows-collaborate-on-privacy-and-data-in-healthcare/</loc>
		<lastmod>2015-03-31T02:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/03/2015-03-26-19.18.43.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/dhs-icit-collaborate-on-isaos/</loc>
		<lastmod>2015-05-04T13:48:25+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/05/9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-meets-with-representatives-comstock-lofgren-massie-moe-to-speak-at-british-embassy-and-u-s-senate/</loc>
		<lastmod>2015-05-18T20:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellows-talk-on-the-convergence-of-physical-and-cyber-security-at-the-british-embassy/</loc>
		<lastmod>2015-06-08T03:17:08+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-02-10.41.12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-02-10.39.25.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-speaks-at-u-s-senate-health-sectory-fly-in-on-cybersecurity/</loc>
		<lastmod>2015-06-08T12:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-02-13.48.29.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-02-13.50.36.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/institute-for-critical-infrastructure-technology-fellow-dan-waddell-interview-on-federal-news-radio-opm-data-breach/</loc>
		<lastmod>2015-06-12T20:13:04+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/03/ISC2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-issues-revisions-to-industrial-control-systems-security-guide/</loc>
		<lastmod>2015-06-16T15:14:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/securing-federal-data-in-a-post-opm-breach-environment-lunch-learn-summary-content/</loc>
		<lastmod>2015-06-26T12:28:41+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-23-13.02.14.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/06/2015-06-23-13.53.09.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-briefs-congress-on-hr391-telehealth-modernization-act-of-2015/</loc>
		<lastmod>2015-09-08T03:28:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellows-convene-to-discuss-nextgen-cybersecurity-with-nasa-ames-army-cyber-institute/</loc>
		<lastmod>2015-11-05T14:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/11/DSC02796-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-senate-briefing-hacking-hospitals/</loc>
		<lastmod>2015-11-22T21:41:05+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/11/DSC02923.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/11/DSC5951.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellows-brief-congressional-and-senate-members-on-h-r-3639-cybersecurity-and-critical-infrastructure-protection-act-of-2014/</loc>
		<lastmod>2017-01-27T15:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellows-meet-with-congressmen-hall-and-mooney-to-deliver-threat-information-sharing-brief/</loc>
		<lastmod>2017-01-27T15:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/04/Dan-Mooney-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2015/04/2015-04-16-14.57.00-e1429829526641.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2018-dhs-cybersecurity-strategy/</loc>
		<lastmod>2018-07-31T16:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/DHSCyber.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/DHSCyber.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ncsc-odni-2018-foreign-economic-espionage-in-cyberspace/</loc>
		<lastmod>2018-07-31T16:47:24+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/ONDI-Espionage-Paper.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/ONDI-Espionage-Paper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-securing-electronic-health-records-on-mobile-devices/</loc>
		<lastmod>2018-08-01T16:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/NIST18001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/NIST18001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-framework-for-improving-critical-infrastructure-cybersecurity/</loc>
		<lastmod>2018-08-02T15:29:57+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/nist1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/nist1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-cybersecurity-framework/</loc>
		<lastmod>2018-08-02T15:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/CYBERSECURITY-FRAMEWORK-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/CYBERSECURITY-FRAMEWORK-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/us-cert-the-national-strategy-to-secure-cyberspace/</loc>
		<lastmod>2018-08-02T15:31:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/US-CERT-The-National-Strategy-to-Secure-Cyberspace-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/US-CERT-The-National-Strategy-to-Secure-Cyberspace-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/rand-corporation-a-global-security-challenge/</loc>
		<lastmod>2018-08-02T16:10:42+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/a-global-security-challenge.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/a-global-security-challenge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/european-parliament-transatlantic-cyber-insecurity-and-cybercrime/</loc>
		<lastmod>2018-08-02T16:31:37+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Transatlantic-cyber-insecurity-and-cybercrime.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Transatlantic-cyber-insecurity-and-cybercrime.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/european-parliament-digitising-industry-industry-4-0-and-cybersecurity/</loc>
		<lastmod>2018-08-02T16:33:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Digitising-Industry-Industry-4.0-and-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Digitising-Industry-Industry-4.0-and-Cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/us-cert-commercial-facilities-sector-cybersecurity-framework-implementation-guidance/</loc>
		<lastmod>2018-08-02T16:33:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Commercial-Facilities-Sector-Cybersecurity-Framework-Implementation-Guidance-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Commercial-Facilities-Sector-Cybersecurity-Framework-Implementation-Guidance-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/us-cert-chemical-sector-cybersecurity-framework-implementation-guidance/</loc>
		<lastmod>2018-08-02T16:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Chemical-Sector-Cybersecurity-Framework-Implementation-Guidance.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Chemical-Sector-Cybersecurity-Framework-Implementation-Guidance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/fcc-cybersecurity-risk-management-and-best-practices/</loc>
		<lastmod>2018-08-08T14:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_195828_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_195828_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ntia-coalition-for-cybersecurity-policy-law/</loc>
		<lastmod>2018-08-08T15:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_200854_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_200854_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/e-isac-cybersecurity-risks-posed-by-unmanned-aircraft-systems/</loc>
		<lastmod>2018-08-08T15:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_201415_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_201415_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-white-house-federal-cybersecurity-risk-determination-report-and-action-plan/</loc>
		<lastmod>2018-08-08T15:23:54+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_202107_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_202107_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-framework-for-improving-critical-infrastructure-cybersecurity-2/</loc>
		<lastmod>2018-08-08T15:35:56+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_203415_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_203415_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/house-committee-on-oversight-and-government-reform-state-of-play-federal-it-in-2018/</loc>
		<lastmod>2018-08-08T16:33:07+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_213240_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_213240_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/security-squadgoals/</loc>
		<lastmod>2018-08-23T19:25:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Security-Squad-Goals.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Security-Squad-Goals.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/director-of-national-intelligence-the-future-of-ransomware-and-social-engineering/</loc>
		<lastmod>2018-08-25T16:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_025309_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_025309_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/u-s-house-of-representatives-committee-on-homeland-security-assessing-north-koreas-risk-to-the-homeland/</loc>
		<lastmod>2018-08-25T16:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_212524_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_212524_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/foreign-putins-asymmetric-assault-on-democracy-in-russia-and-europe-implications-for-u-s-national-security/</loc>
		<lastmod>2018-08-25T16:37:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/i227cimgpsh_orig45555.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/i227cimgpsh_orig45555.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/homeland-security-securing-cyber-assets/</loc>
		<lastmod>2018-08-25T17:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_182704_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_182704_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cyber-warfare-in-dod/</loc>
		<lastmod>2018-08-25T17:51:54+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/FNR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/FNR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/federal-bureau-of-investigation-statement-before-the-house-small-business-committee/</loc>
		<lastmod>2018-08-25T17:52:21+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_09082018_001212_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_09082018_001212_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/u-s-a-ferc-federal-energy-regulatory-commission/</loc>
		<lastmod>2018-08-25T17:52:35+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_215247_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_215247_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/u-s-department-of-energy-doe-award-selections-for-the-development-of-next-generation-cybersecurity-technologies-and-tools/</loc>
		<lastmod>2018-08-25T17:52:50+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_043001_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_043001_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-pell-center-for-international-relations-and-public-policy-surviving-a-cyber-attack/</loc>
		<lastmod>2018-08-25T17:53:10+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_015913_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_015913_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-heritage-foundation-national-defense-and-the-cyber-domain/</loc>
		<lastmod>2018-08-25T17:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_012910_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_012910_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/henry-m-jackson-school-of-international-studies-university-of-washington-cyberattack-on-critical-infrastructure/</loc>
		<lastmod>2018-08-25T17:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cio-council-report-to-the-president-on-federal-it-modernization/</loc>
		<lastmod>2018-08-25T17:54:11+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_233412_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_233412_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/u-s-securities-and-exchange-commission-statement-on-cybersecurity/</loc>
		<lastmod>2018-08-25T17:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_193934_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_193934_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/us-cert-russian-state-sponsored-cyber-actors-targeting-network-infrastructure-devices/</loc>
		<lastmod>2018-08-25T17:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_192510_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_192510_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/dhs-needs-to-enhance-efforts-to-improve-and-promote-the-security-of-federal-and-private-sector-networks/</loc>
		<lastmod>2018-08-25T17:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_201012_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_201012_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/homeland-security-critical-infrastructure-partnership-advisory-council/</loc>
		<lastmod>2018-08-25T17:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_192604_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_192604_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/us-cert-dams-sector-cybersecurity-framework-implementation-guidance/</loc>
		<lastmod>2018-08-25T17:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Dams-Sector-Cybersecurity-Framework-Implementation-Guidance.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Dams-Sector-Cybersecurity-Framework-Implementation-Guidance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/csrc-cybersecurity-framework-manufacturing-profile/</loc>
		<lastmod>2018-08-25T17:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_195127_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_195127_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/computing-research-association-cybersecurity-for-manufacturers/</loc>
		<lastmod>2018-08-25T17:56:14+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Securing-the-Digitized-and-Connected-Factory.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Securing-the-Digitized-and-Connected-Factory.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/gao-additional-actions-are-essential-for-assessing-cybersecurity-framework-adoption/</loc>
		<lastmod>2018-08-25T17:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Additional-Actions-Are-Essential-for-Assessing-Cybersecurity-Framework-Adoption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Additional-Actions-Are-Essential-for-Assessing-Cybersecurity-Framework-Adoption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/atkins-global-protecting-our-critical-infrastructure/</loc>
		<lastmod>2018-08-25T18:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Protecting-our-critical-infrastructure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Protecting-our-critical-infrastructure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-belfer-center-understanding-federal-cybersecurity/</loc>
		<lastmod>2018-08-25T18:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Understanding-Federal-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Understanding-Federal-Cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/gibson-dunn-crutcher-llp-cybersecurity-critical-infrastructure/</loc>
		<lastmod>2018-08-25T18:11:14+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_204532_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_204532_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/oecd-workshop-on-digital-security-and-resilience-in-critical-infrastructure-and-essential-services/</loc>
		<lastmod>2018-08-25T18:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_210049_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_210049_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-wilson-center-the-approach-to-critical-infrastructure-protection-in-the-u-s-e-u-and-china/</loc>
		<lastmod>2018-08-25T18:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_210541_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_210541_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/csrc-framework-for-improving-critical-infrastructure-cybersecurity-version-1-1/</loc>
		<lastmod>2018-08-25T18:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_211538_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_08082018_211538_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/critical-infrastructure-resilience-institute-protecting-critical-infrastructure/</loc>
		<lastmod>2018-08-25T18:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Protecting-Critical-Infrastructure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/Protecting-Critical-Infrastructure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/federation-of-american-scientists-cybersecurity-selected-issues-for-the-115th-congress/</loc>
		<lastmod>2018-08-25T18:33:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Cybersecurity-Selected-Issues-for-the-115th-Congress.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/Cybersecurity-Selected-Issues-for-the-115th-Congress.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/micro-focus-government-solutions-mgt-act/</loc>
		<lastmod>2018-09-20T13:27:35+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/MFGS-ITMod1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/MFGS-ITMod1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/mitre-deliver-uncompromised/</loc>
		<lastmod>2018-09-20T13:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/MITRE-DU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/MITRE-DU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-cyber-x-factor-of-the-savannah-river-site/</loc>
		<lastmod>2018-10-22T16:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/SRS-XFactor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/SRS-XFactor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/deliver-uncompromised-pentagon-leadership-can-improve-supply-chain-security-across-the-nation/</loc>
		<lastmod>2018-10-22T17:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/DU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/09/DU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-usb-threat-no-one-is-talking-about-research-on-firmware-based-attacks-reveals-the-urgent-need-to-improve-supply-chain-security-for-all-usb-enabled-devices/</loc>
		<lastmod>2018-10-22T17:32:05+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/10/USB-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/10/USB-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/trust-and-the-economics-of-insecurity/</loc>
		<lastmod>2018-12-04T15:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/12/Malcolm-Video.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/where-the-east-meets-the-west-how-western-internet-and-modern-communications-technology-helped-soviet-style-propaganda-in-donbass/</loc>
		<lastmod>2018-12-04T15:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/10/Where-East-Meets-West-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/10/Where-East-Meets-West.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/what-we-learned-from-the-bloomberg-supermicro-debate-industrys-inability-to-definitively-prove-supply-chain-security-highlights-a-need-for-radical-change/</loc>
		<lastmod>2018-12-18T15:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/12/Bloomberg-Supermicro.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/12/Bloomberg-Supermicro.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/national-counterintelligence-and-security-center-know-the-risk-raise-your-shield/</loc>
		<lastmod>2019-01-16T00:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/DNI-Raise-Shield.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/DNI-Raise-Shield.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cio-council-chief-information-security-officer-handbook/</loc>
		<lastmod>2019-01-29T14:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_224935_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/08/IMG_07082018_224935_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-path-to-a-stronger-dod-a-summary-of-recent-defense-audits/</loc>
		<lastmod>2019-01-30T16:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/DoD-Paper.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/DoD-Paper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/private-public-sector-resources-from-the-national-counterintelligence-security-center/</loc>
		<lastmod>2019-02-01T15:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/Initiatives-Template-350x350_-Other.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/DNI-Raise-Shield.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/07/ONDI-Espionage-Paper.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2018/01/evanina.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2019-icit-gala-benefit/</loc>
		<lastmod>2019-02-19T14:57:40+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/2019-Banner-Temp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cyber-personnel-are-essential-staff-federal-recruitment-retention-in-post-shutdown-america/</loc>
		<lastmod>2019-02-25T15:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/DoD-Paper-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/DoD-Paper-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/executive-briefing-series-digital-transformation/</loc>
		<lastmod>2019-02-27T15:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/Digital-Transformation-Executive-Briefing-cover-sponsored-by-GitLab-1-379x485.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/Digital-Transformation-Executive-Briefing-cover-sponsored-by-GitLab-1-379x485.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/did-china-just-legalize-espionage-provisions-to-chinas-national-cybersecurity-law-are-a-big-deal/</loc>
		<lastmod>2019-03-04T15:10:49+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/Did-China-Legalize-Espionage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/Did-China-Legalize-Espionage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-launches-monthly-reports-tracking-cybersecurity-technology-legislation-federal-agency-initiatives/</loc>
		<lastmod>2019-03-24T17:20:06+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/FINAL_CyberLegReport.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/sean-kelley-retired-federal-ses-member-named-chair-of-icits-public-private-sector-engagement/</loc>
		<lastmod>2019-03-24T17:25:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/Pic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/Pic-400x267.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-joins-cyber-readiness-institute-to-support-smb-cybersecurity/</loc>
		<lastmod>2019-03-24T17:27:12+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/CRI_Web_Banner_500x500.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/02/CRI_Web_Banner_500x500-400x400.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/april-10-icit-briefing-harden-your-code-enable-your-business/</loc>
		<lastmod>2019-03-24T20:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/executive-briefing-series-cdm-and-mobile-security/</loc>
		<lastmod>2019-03-24T21:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/FNN-Mobile-Iron.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/03/FNN-Mobile-Iron.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/an-analysis-of-responses-to-senator-warners-health-sector-cybersecurity-inquiries/</loc>
		<lastmod>2019-04-01T16:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/DoD-Paper-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/DoD-Paper-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/public-sector-technology-cybersecurity-education-from-dlt/</loc>
		<lastmod>2019-04-07T00:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/DLT-Thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/CloudComputing_thumbnail-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/NIST-Thumbnail_Final.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/sign-up-for-alerts-on-new-research-and-publications/</loc>
		<lastmod>2019-04-14T16:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/Yellow-and-Black-Lines-Personal-Trainer-Flyer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/01/Yellow-and-Black-Lines-Personal-Trainer-Flyer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cybersecurity-in-building-automation-systems-bas/</loc>
		<lastmod>2019-04-14T23:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Forescout-BAS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Forescout-BAS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/China-Espionage-Banner-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/software-security-is-national-security/</loc>
		<lastmod>2019-04-20T17:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Software-Security-National-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Software-Security-National-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Software-Security-National-Security-Exec-Summary.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/Paper-Sponsor-Thank-You.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ioactive-partners-with-the-institute-for-critical-infrastructure-technology-icit-to-drive-public-and-private-sector-collaboration/</loc>
		<lastmod>2019-04-23T13:25:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/IOActive-Logo-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/04/IOActive-Logo-002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2016/03/ICIT-New-Logo-for-website4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellow-dave-summitt-moffitt-cancer-center-testifies-to-congress-on-the-impact-of-robocalling-on-critical-infrastructure-security/</loc>
		<lastmod>2019-05-01T22:39:38+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Dave-Hearing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Dave-Hearing-400x220.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/analysis-of-h-r-1560-title-i-protecting-cyber-networks-act-and-title-ii-national-cybersecurity-protection-advancement-act/</loc>
		<lastmod>2019-05-08T02:58:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/800160/</loc>
		<lastmod>2019-05-08T03:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://icitech.org/hacking-our-nations-airports/</loc>
		<lastmod>2019-05-17T19:23:30+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Hacking-Airports.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Hacking-Airports.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-accepted-into-google-ad-grants-program/</loc>
		<lastmod>2019-05-22T21:16:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Google-Ads.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/05/Google-Ads.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/last-call-for-satcom-security/</loc>
		<lastmod>2019-06-12T14:35:36+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/Last-Call-for-SATCOM-Security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/Last-Call-for-SATCOM-Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-future-of-cybercrime/</loc>
		<lastmod>2019-06-16T20:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/MFGS-Future-of-Cybercrime-Paper.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/MFGS-Future-of-Cybercrime-Paper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cyber-threat-hunting/</loc>
		<lastmod>2019-06-28T19:58:20+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/Cyber-Threat-Hunting-FNN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/06/Cyber-Threat-Hunting-FNN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-bright-minds-diversity-in-cyber-with-devon-bryan-ciso-federal-reserve/</loc>
		<lastmod>2019-08-14T20:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Devon-Bryan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Devon-Bryan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/gao-cybersecurity-workforce-agencies-need-to-accurately-categorize-positions-to-effectively-identify-critical-staffing-needs/</loc>
		<lastmod>2019-08-29T19:58:03+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Workforce-GAO-231x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/innovation-through-inclusion-the-multicultural-cybersecurity-workforce/</loc>
		<lastmod>2019-08-29T20:07:29+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Workforce-ISC2-260x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/nist-draft-special-publication-800-171b-protecting-controlled-unclassified-information-in-nonfederal-systems-and-organizations/</loc>
		<lastmod>2019-08-29T20:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Public-NIST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Public-NIST-229x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2019-himss-cybersecurity-survey/</loc>
		<lastmod>2019-08-29T20:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Health-HIMSS-230x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/mitre-medical-device-cybersecurity-regional-incident-preparedness-and-response-playbook/</loc>
		<lastmod>2019-08-29T20:17:12+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Health-MITRE-231x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/d-c-takes-on-energy-sector-threats-a-summary-of-recent-agency-and-congressional-efforts/</loc>
		<lastmod>2019-09-05T12:05:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/D.C.-Takes-on-Energy-Sector-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/D.C.-Takes-on-Energy-Sector-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-rise-of-disruptionware-a-cyber-physical-threat-to-operational-technology-environments/</loc>
		<lastmod>2019-09-23T10:58:48+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/The-Rise-of-Disruptionware-cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/The-Rise-of-Disruptionware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Disruptionware-Exec-Summary.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/thank-you-forescout-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/executive-briefing-series-biometrics-and-government-transformation/</loc>
		<lastmod>2019-10-10T17:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Executive-Briefing-Biometrics-and-Government-Transformation-sponsored-by-NEC-cover-370x485.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Executive-Briefing-Biometrics-and-Government-Transformation-sponsored-by-NEC-cover-370x485-229x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/executive-briefing-series-managing-it-complexities-in-a-multi-cloud-world/</loc>
		<lastmod>2019-10-10T17:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Federal-News-Network-Executive-Briefing-Series.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Federal-News-Network-Executive-Briefing-Series-239x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/an-insight-into-the-current-security-posture-of-healthcare-it-a-national-security-concern/</loc>
		<lastmod>2019-10-10T17:50:05+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Heinz-Spring-2019-Capstone-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Heinz-Spring-2019-Capstone-Cover-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/modernization-requires-leadership-leading-the-way-to-cloud-security-zero-trust-and-threat-intelligence/</loc>
		<lastmod>2019-10-14T16:29:38+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Modernization-Requires-Leadership-Cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Modernization-Requires-Leadership-Cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Paper-Sponsor-Thank-You-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/executive-briefing-series-space-command-2-0/</loc>
		<lastmod>2019-10-31T13:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Space-Command-2.0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/10/Space-Command-2.0-231x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/tedx-talk-are-you-our-best-hope-for-cybersecurity-by-parham-eftekhari/</loc>
		<lastmod>2019-10-31T13:51:38+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/09/Parham-TEDx.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-bright-minds-the-role-of-smbs-on-dib-cybersecurity-with-ernie-magnotti-ciso-leonardo-drs/</loc>
		<lastmod>2019-11-25T21:15:35+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/ErnieMagnotti-BrightMinds.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/ErnieMagnotti-BrightMinds-233x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ensuring-human-machine-resilience-in-cyberwork/</loc>
		<lastmod>2019-11-25T21:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/Image-Advancing-Human-Machine-Collaboration-in-Cyberwork-231x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-signs-on-to-support-the-cyber-shield-act/</loc>
		<lastmod>2019-11-25T21:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/Cyber-Shield-Act.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/Cyber-Shield-Act-300x199.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-oct-17-fall-briefing-the-intersection-of-leadership-transformation-and-security/</loc>
		<lastmod>2019-11-25T21:24:02+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Banner-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/08/Banner-1-800x297.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-bright-minds-smart-city-insecurity-with-cesar-cerrudo-icit-fellow-and-cto-ioactive/</loc>
		<lastmod>2019-12-05T22:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/Bright-Minds-Cesar.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/Bright-Minds-Cesar-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-road-to-mobility-the-2020-guide-to-trends-and-technology-for-smart-cities-and-transportation/</loc>
		<lastmod>2020-01-19T15:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/The-Road-to-Mobility-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/The-Road-to-Mobility-Cover-208x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-honors-dr-ron-ross-nist-and-suzette-kent-omb-at-2019-icit-gala-benefit/</loc>
		<lastmod>2020-01-19T15:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/49084328253_4629e025a4_o1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/49084328253_4629e025a4_o1-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/dod-readiness-asset-management/</loc>
		<lastmod>2020-01-19T15:49:32+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/Executive-Briefing-DoD-Readiness-and-Asset-Management-sponsored-by-Infor-cover-374x485-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/Executive-Briefing-DoD-Readiness-and-Asset-Management-sponsored-by-Infor-cover-374x485-1-231x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-business-value-of-a-diverse-infosec-team-a-discussion-on-how-gender-racial-cognitive-and-lgbtq-diversity-improves-cybersecurity-outcomes/</loc>
		<lastmod>2020-01-20T13:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/Diversity-Cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/Diversity-Cover-1-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-rise-of-the-cyber-industrial-complex-and-expense-in-depth/</loc>
		<lastmod>2020-01-20T14:04:02+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/07/Cyber-Industrial-Complex.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/07/malcolm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/07/Cyber-Industrial-Complex.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/accelerating-legacy-system-modernization-in-government/</loc>
		<lastmod>2020-01-30T00:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/MFGS-Legacy-Modernization-Paper-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/MFGS-Legacy-Modernization-Paper-1-230x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-iran-cyber-panic-how-apathy-got-us-here-and-what-to-do-now/</loc>
		<lastmod>2020-01-30T14:20:48+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/The-Iran-Cybe-Panic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/01/The-Iran-Cybe-Panic-230x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2020-us-cyberspace-solarium-commission-report/</loc>
		<lastmod>2020-03-18T16:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/CSC-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/ICIT-Certified.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/CSC-Cover-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ncsc-the-national-counterintelligence-strategy-of-the-u-s-2020-2022/</loc>
		<lastmod>2020-03-18T16:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/02/ncsc-cover-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/02/ncsc-cover-3-250x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-bright-minds-deconstructing-vendor-ai-exaggerations-with-pete-slade-icit-fellow-and-threatwarrior-founder-and-cto/</loc>
		<lastmod>2020-03-30T12:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/Deconstructing-Vendor-Exaggerations-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/Deconstructing-Vendor-Exaggerations-Cover-234x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-solution-insights-the-covid-19-checklist-detailed-steps-to-better-protect-your-organization/</loc>
		<lastmod>2020-04-07T16:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/COVID-Checklist-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/ICIT-Solution-Insights-Logo-e1586206050542-300x103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/COVID-Checklist-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/MFGS-Solution-Insight-Thank-You-300x298.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/Covid-19-Checklist-Webinar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellow-perspective-security-transcends-compliance/</loc>
		<lastmod>2020-04-13T16:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/02/Laura-Whitt-Winyard-Essay-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/02/Laura-Whitt-Winyard-Essay-Cover-232x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/02/Laura-Whitt-Winyard-300x200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellow-perspective-moving-target-defense-staying-ahead-of-the-enemy/</loc>
		<lastmod>2020-04-13T17:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/Don-Fellow-Essay-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/Don-Fellow-Essay-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellow-perspective-privacy-law-for-security-professionals/</loc>
		<lastmod>2020-04-27T12:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/ICIT-Fellow-Perspective-Kirk-Nahra-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/ICIT-Fellow-Perspective-Kirk-Nahra-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-ondemand-enterpriserpa/</loc>
		<lastmod>2020-04-30T20:10:26+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/Enterprise-RPA-Publication-Page-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-ondemand-managing-cyber-risk-with-cyber-modernization/</loc>
		<lastmod>2020-04-30T20:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/11/Cyber-Modernization-Webcast-Button.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-healthcare-research-security-pandemic-threats-to-patient-care-national-security-and-the-economy/</loc>
		<lastmod>2020-05-04T15:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/Health-Research-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/Health-Research-Cover-230x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cybersecurity-in-the-age-of-connected-things/</loc>
		<lastmod>2020-05-14T12:49:25+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/Pete-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/Pete-Cover-228x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/protecting-americas-defense-industrial-advantages-in-cyberspace/</loc>
		<lastmod>2020-06-05T18:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/Travis-Howard-Cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/Travis-Howard-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/secure-intelligent-automation/</loc>
		<lastmod>2020-06-26T17:03:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/Copy-of-Copy-of-Skybox-for-Website.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/ICIT-Solution-Insights-Logo-e1586206050542-300x103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/blueprism-ibm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/a-case-for-transformational-change-secure-intelligent-automation-for-mission-readiness-accelerating-insight-and-enabling-future-readiness-for-warfighters/</loc>
		<lastmod>2020-06-26T21:38:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/IBM-Screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/03/ICIT-Certified.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/06/IBM-Screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-on-demand-the-covid-19-checklist-detailed-steps-to-better-protect-your-organization/</loc>
		<lastmod>2020-07-17T14:43:09+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/04/On-Demand-COVID-19-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-fellow-perspective-a-holistic-approach-to-application-development-and-digital-security-for-the-enterprise/</loc>
		<lastmod>2020-07-21T13:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/07/Fellow-Essay-Cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/07/Fellow-Essay-Cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/how-to-maintain-election-integrity-in-a-pandemic/</loc>
		<lastmod>2020-10-21T14:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/Blair-Cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/Blair-Cover-1-231x300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/blair-photo-300x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/election-integrity-a-non-partisan-whole-of-nation-effort/</loc>
		<lastmod>2020-11-02T16:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/08/Fellow-Essay-Cover3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/08/Fellow-Essay-Cover3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-on-demand-interactive-security-testing-devsecops-and-nist-sp-800-53-rev-5/</loc>
		<lastmod>2020-11-02T16:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/08/AWS-CheckMarx.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/exclusive-interview-icit-executive-director-joyce-hunter-on-todays-cybersecurity-challenges/</loc>
		<lastmod>2020-11-25T16:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/Website-Home-Page1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/5-282x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/congratulations-to-icit-contr-venice-goodwine-usda-for-winning-cybersecurity-executive-of-the-year/</loc>
		<lastmod>2020-11-25T16:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/6-282x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-and-cybrary-form-strategic-partnership-for-technical-cybersecurity-skills-training/</loc>
		<lastmod>2020-11-25T16:44:35+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/Website-Home-Page2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2019/12/cybrary-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/congratulations-to-our-executive-director-joyce-hunter-who-was-named-to-the-most-influential-people-in-security-2020-in-the-cybersecurity-category/</loc>
		<lastmod>2020-11-26T17:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/7-282x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-on-demand-april-2020-cyber-legislation-federal-initiatives-webcast/</loc>
		<lastmod>2020-11-30T15:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/April-Leg-Webcast-Digital-Library.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-perfect-weapon/</loc>
		<lastmod>2020-11-30T15:16:56+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/ICIT-HEALTH-SECTOR-PUBLICATION-4.27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/powerful-leaders-empower-others/</loc>
		<lastmod>2021-02-17T14:14:23+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Powerful-Leaders-Empower-Others.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Powerful-Leaders-Empower-Others-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/leading-through-crises/</loc>
		<lastmod>2021-02-17T14:17:48+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Leading-Thru-Crisis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Leading-Thru-Crisis-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/weapons-of-mass-disruption-an-assessment-of-the-threat-disruptionware-poses-to-energy-sector-continuity/</loc>
		<lastmod>2021-02-22T19:27:21+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/07/Weapons-of-Mass-Disruption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/07/Weapons-of-Mass-Disruption-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/election-resiliency/</loc>
		<lastmod>2021-02-22T19:29:42+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/11/Digital-Library-Sized-Image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/08/ICIT-Website-Banner-Image-Home-Page1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/devsecops-ato/</loc>
		<lastmod>2021-02-22T19:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/DevSecOps-digital-library.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/Ron-Ross.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/Checkmarx-cropped.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/10/Cloudbees-cropped-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/holistic-cyberscurity-culture/</loc>
		<lastmod>2021-02-24T21:29:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Building-a-Holistic-Cybersecurity-Culture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Building-a-Holistic-Cybersecurity-Culture-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/devsec-ops-february-webinar/</loc>
		<lastmod>2021-03-09T14:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/03/DevSecOps3-LinkedIn3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-art-of-cyberwarfare/</loc>
		<lastmod>2021-03-09T14:20:25+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/ICIT-HEALTH-SECTOR-PUBLICATION-4.27.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/ICIT-HEALTH-SECTOR-PUBLICATION-4.27-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/10418-2/</loc>
		<lastmod>2021-03-09T14:20:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/BlockchainAdoption-2-1-e1612304786416.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/BlockchainAdoption-2-1-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/afcea-introduces-the-cyber-edge-writing-contest-the-future-of-cyber-warfighting/</loc>
		<lastmod>2021-03-09T14:21:27+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/12/Website-Home-Page3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/12/Website-Home-Page3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/managing-through-crisis/</loc>
		<lastmod>2021-04-02T22:30:59+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Managing-Thru-Crisis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Managing-Thru-Crisis-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/operating-in-a-compromised-environment-solarwinds/</loc>
		<lastmod>2021-04-02T22:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Fellow-Essay-Cover3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/02/Fellow-Essay-Cover3-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-improving-contractor-cybersecurity-act/</loc>
		<lastmod>2021-04-06T16:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/04/Cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/04/Cover-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/zero-trust-whos-in-your-network/</loc>
		<lastmod>2021-04-23T16:43:46+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/04/Copy-of-ZERO-TRUST-DIGITAL-LIBRARY.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/integrating-cybersecurity-into-the-application-development-lifecycle/</loc>
		<lastmod>2021-05-05T22:25:58+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/03/Fellow-Essay-Cover2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/03/Fellow-Essay-Cover2-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ready-rock-institute/</loc>
		<lastmod>2021-05-18T17:53:12+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/05/Donor-Template-Fellow-Fellow-Circle-300-x-3006.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/05/rrlg-245x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/improving-the-nations-cybersecurity/</loc>
		<lastmod>2021-06-07T21:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/06/Biden-EO-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/06/Biden-Cyber-EO-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/student-publication-placeholder/</loc>
		<lastmod>2021-06-09T15:39:41+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/06/Biden-Cyber-EO-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/academic-initiative-placeholder/</loc>
		<lastmod>2021-06-09T15:40:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/06/Biden-Cyber-EO-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/partnership-placeholder/</loc>
		<lastmod>2021-06-09T15:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/06/Biden-Cyber-EO-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-on-demand-the-newest-attack-vectors-infrastructure-as-code-api-security/</loc>
		<lastmod>2021-07-09T12:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/05/The-Newest-Attack-Vector-800x8002-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/announcement-crc-press-to-publish-icit-securing-the-nation/</loc>
		<lastmod>2021-07-21T21:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/07/Gray-Desk-Graphic-Design-Book-Cover1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/07/Gray-Desk-Graphic-Design-Book-Cover1-642x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/07/Copy-of-Untitled7-1024x444.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-virtual-briefing-secure-automation-for-mission-readiness/</loc>
		<lastmod>2021-09-21T17:59:41+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2016/10/Mission-Readiness-LinkedIn1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/modern-security-battlefield-vulnerability-lifecycle-management/</loc>
		<lastmod>2021-09-23T14:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/ICIT-HEALTH-SECTOR-PUBLICATION-4.2711.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/Primer-Modern-Security-Battlefield-1-pdf-232x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/Lessons-from-the-Modern-Security-Battlefield-pdf-232x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/download-300x57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/covid-19-vaccine/</loc>
		<lastmod>2021-09-29T19:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/ICIT-HEALTH-SECTOR-PUBLICATION-4.27.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/Safeguarding-the-COVID-19-Vaccine-5-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/rushing-to-automation/</loc>
		<lastmod>2021-10-18T17:12:08+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/10/bright-minds-q-a-series-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/10/ICIT-Bright-Minds-Rushing-to-Automation-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/secure-automation-for-mission-readiness/</loc>
		<lastmod>2021-10-18T17:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/Mission-Readiness-800x800-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/getting-started-on-the-path-to-zero-trust/</loc>
		<lastmod>2021-10-18T17:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/09/Social-800x8001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-certified-content-2021-threat-hunting-report/</loc>
		<lastmod>2021-10-27T16:19:18+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/10/Capture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/10/Capture-211x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/adversarial-simulation/</loc>
		<lastmod>2021-12-06T23:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/bright-minds-q-a-series-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/ICIT-Bright-Minds-Adversarial-Simulation-is-Proactive-in-a-Reactive-World-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/application-of-zero-trust-to-legacy-and-ot/</loc>
		<lastmod>2021-12-07T14:20:38+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/11/bright-minds-q-a-series.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/11/bright-minds-q-a-series-1-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-virtual-briefing-optimizing-soc-operations/</loc>
		<lastmod>2021-12-16T20:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/10/500x500.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/DEVO-SOC-REPORT-COVER-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-certified-content-2021-devo-soc-report/</loc>
		<lastmod>2021-12-16T20:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/DEVO-SOC-REPORT-COVER.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/DEVO-SOC-REPORT-COVER.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cybersecurity-potential-for-blockchain-technology/</loc>
		<lastmod>2022-02-01T00:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/01/ICIT-Fellow-Perspective-An-Overview-for-the-Potential-for-Blockchain-Technology-to-Improve-Cybersecurity.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/01/Stan-Mierzwa_Fellow-Essay-Cover-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ransomware-weaponized/</loc>
		<lastmod>2022-02-19T16:39:55+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/Publication-Covers-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/Publication-Covers-2-791x1024.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/ethical-artificial-intelligence/</loc>
		<lastmod>2022-02-24T01:39:23+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/02/bright-minds-q-a-series-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/02/bright-minds-q-a-series-3-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/digital-cold-war/</loc>
		<lastmod>2022-03-03T21:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/03/Publication-Covers-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/03/Publication-Covers-10-791x1024.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/melting-pot-diversity/</loc>
		<lastmod>2022-03-15T20:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/02/Publication-Covers-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/02/ICIT-Research-Shielded-by-the-Melting-Pot-Draft__JJ-1-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-growing-obsolescence-of-passwords/</loc>
		<lastmod>2022-03-18T21:18:11+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/05/Jim-Routh-Cover-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/05/Jim-Routh-Cover-1-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/agriculture-security-critical-infrastructure-cyber-security-risk-management/</loc>
		<lastmod>2022-04-18T19:22:40+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2020/05/Grey-Circle-Leaves-Floral-Logo-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2020/05/Grey-Circle-Leaves-Floral-Logo-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/software-bill-of-materials/</loc>
		<lastmod>2022-05-04T21:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/Routh-Certified-SBOM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/Routh-Certified-SBOM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/artitecting-cyber-risk-decisions/</loc>
		<lastmod>2022-05-04T21:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/EPIPHANY-certified-content.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/EPIPHANY-certified-content.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/using-strategy-to-create-your-cybersecurity-battleplan/</loc>
		<lastmod>2022-05-17T21:21:42+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/03/ICIT-Research-Playing-to-Win-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/leaders-as-educators/</loc>
		<lastmod>2022-05-17T21:22:07+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators-pdf-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/insights-geopolitical-conflict/</loc>
		<lastmod>2022-05-25T17:06:56+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/May-2022-Fellow-Insight.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2022-legislation-prospective/</loc>
		<lastmod>2022-05-25T17:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/02/ICIT-Cyber-Legislation-and-Agency-Initiatives-2021-Retrospective-and-2022-Prospective-Roundtable-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/the-ethics-of-healthcare-ai/</loc>
		<lastmod>2022-06-01T18:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/06/Publication-Covers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/06/Publication-Covers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/cybersecurity-education/</loc>
		<lastmod>2022-06-22T15:53:20+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/CMU-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/CMU-ICIT-Cyber-Risk-in-Education_Whitepaper-pdf.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/vulnerability-management-terminology/</loc>
		<lastmod>2022-06-22T15:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/05/13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://icitech.org/wp-content/uploads/2022/05/13-232x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-certified-content-government-agencies-deserve-a-better-way-to-pentest/</loc>
		<lastmod>2022-06-28T17:07:17+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/06/synack-US-Govt-better-way-to-pentest-wp-final-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/06/synack-US-Govt-better-way-to-pentest-wp-final-1-232x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/12207-2/</loc>
		<lastmod>2022-08-03T17:05:08+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Nichols.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Nichols.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/progressing-beyond-the-motions-of-cybersecurity/</loc>
		<lastmod>2022-08-05T15:11:18+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Fellow-Essay-Cover-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Malcolm-Harkins-pdf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-certified-content-research-assessment-of-factors-contributing-to-cybersecurity-employee-turnover-and-retention/</loc>
		<lastmod>2022-09-06T16:29:46+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Publication-Covers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/08/Closing-the-Revolving-Door-pdf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/icit-certified-content-2021-ciso-ddos-handbook/</loc>
		<lastmod>2022-09-06T16:31:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/MazeBolt-the_ciso_ddos_handbook-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2021/12/MazeBolt-the_ciso_ddos_handbook-cover-212x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/june-2022-cyber-legislation-and-agency/</loc>
		<lastmod>2022-09-20T19:29:57+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/07/featured-image-june-2022.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/august-2022-cyber-legislation/</loc>
		<lastmod>2022-09-20T19:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/09/Aug-2022-Leg-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/biden-harris-president-management-agenda/</loc>
		<lastmod>2022-09-27T14:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/09/Publication-Covers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/09/EXEC-FUNCTION-pdf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/government-digital-transformation/</loc>
		<lastmod>2022-12-19T17:21:03+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/12/Publication-Covers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/12/Changing-the-Perception-pdf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/bright-minds-qa-series-crucial-consideration-for-federal-government-cybersecurity-strategies/</loc>
		<lastmod>2022-12-21T01:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/12/Brightminds-Kapinos-1.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/12/Brightminds-Kapinos-pdf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/announcement-crc-press-publishes-securing-the-nations-critical-infrastructures/</loc>
		<lastmod>2023-01-11T18:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/10/Copy-of-Minimalist-Author-Media-Kit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/10/Copy-of-Minimalist-Author-Media-Kit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2022/11/Untitled-1200-%C3%97-520-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://icitech.org/2022-legislation-in-review/</loc>
		<lastmod>2023-01-13T17:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2023/01/ICIT-Monthy-FedLeg-Reports-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://icitech.org/wp-content/uploads/2023/01/2022-Legislative-Review-pdf.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->