<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.bedelsecurity.com/blog/why-credit-unions-should-start-selling-cyber-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-you-can-do-about-the-okta-compromise</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/What-You-Can-do-About-the-Okta-Compromise.jpg</image:loc><image:caption>WhatYouCandoAbouttheOktaCompromise</image:caption><image:title>WhatYouCandoAbouttheOktaCompromise</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bank-director-are-directors-tone-deaf-on-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/services/coaching-training/</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Bedel_Security_April2018/Images/HelpingHand.jpg</image:loc><image:caption>HelpingHand</image:caption><image:title>HelpingHand</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/CISOMentor_Hero.jpg</image:loc><image:caption>CISOMentorpartnershipsealedwithprofessionalhandshake</image:caption><image:title>CISOMentorHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/CISOMentor_PagePhoto.jpg</image:loc><image:caption>InformationSecurityconsultantscollaboratingongovernanceandriskassessmentreports</image:caption><image:title>CISOMentorPagePhoto</image:title></image:image><lastmod>2026-02-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-aaron</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ADarnall_Round_2026.png</image:loc><image:caption>ADarnallRound2026</image:caption><image:title>ADarnallRound2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_Grace_Ryan.jpg</image:loc><image:caption>atechbackgroundwiththetitleWelcometotheBedelSecurityTeamGraceandRyan</image:caption><image:title>NewHireBlogAnnouncementGraceRyan</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/healthsouth-round-rock-laptop-stolen-1359-victims</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cloud-security-challenges</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-06-30</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-most-underrated-control-in-information-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/In-a-World-of-Emerging-Technology-One-Truth-Remains.jpg</image:loc><image:caption>InaWorldofEmergingTechnologyOneTruthRemains</image:caption><image:title>InaWorldofEmergingTechnologyOneTruthRemains</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Superpower-of-Consistency-in-Cybersecurity.jpg</image:loc><image:caption>TheSuperpowerofConsistencyinCybersecurity</image:caption><image:title>TheSuperpowerofConsistencyinCybersecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-does-a-vciso-do-and-what-does-a-vciso-not-do</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA3.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions and Answers 03: What does a vCISO do and what does a vCISO not do?</video:title><video:description>What does a vCISO do and what does a vCISO not do?</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA3.mp4</video:content_loc><video:duration>166</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>ISO</video:tag><video:tag>vCISO</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2003.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail03</image:caption><image:title>vCISOQuestionsAnsweredThumbnail03</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-shane</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ShaneMiller_Feb2026_Headshot.png</image:loc><image:caption>ShaneMillerFeb2026Headshot</image:caption><image:title>ShaneMillerFeb2026Headshot</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_Grace_Ryan.jpg</image:loc><image:caption>atechbackgroundwiththetitleWelcometotheBedelSecurityTeamGraceandRyan</image:caption><image:title>NewHireBlogAnnouncementGraceRyan</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-cybersecurity-with-limited-resources</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/From-Compliance-to-Confidence.jpg</image:loc><image:caption>FromCompliancetoConfidence</image:caption><image:title>FromCompliancetoConfidence</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Adding-Perspective-to-Tabletop-Exercises.jpg</image:loc><image:caption>AddingPerspectivetoTabletopExercises</image:caption><image:title>AddingPerspectivetoTabletopExercises</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/tools-to-check-out-in-the-cybersecurity-resource-guide</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Tools-to-Check-Out-in-the-Cybersecurity-Resource-Guide.jpg</image:loc><image:caption>ToolstoCheckOutintheCybersecurityResourceGuide</image:caption><image:title>ToolstoCheckOutintheCybersecurityResourceGuide</image:title></image:image><lastmod>2022-10-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-reflections-from-my-discussions-with-a-former-fbi-agent</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Reflections-From-My-Discussions-With-a-Former-FBI-Agent.jpg</image:loc><image:caption>5ReflectionsFromMyDiscussionsWithaFormerFBIAgent</image:caption><image:title>5ReflectionsFromMyDiscussionsWithaFormerFBIAgent</image:title></image:image><lastmod>2024-09-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-facial-biometric-authentication-just-around-the-corner-for-community-banks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-cyber-attacks-youre-likely-face</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Phishing.jpg</image:loc><image:caption>Phishing</image:caption><image:title>Phishing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/thankful-2025</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/SGoetz_Round_2025.png</image:loc><image:caption>SGoetzRound2025</image:caption><image:title>SGoetzRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CWilliams_Round_2025.png</image:loc><image:caption>CWilliamsRound2025</image:caption><image:title>CWilliamsRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JRosiak_Round_2025.png</image:loc><image:caption>JRosiakRound2025</image:caption><image:title>JRosiakRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/10-Years-of-Bedel-Security-Gratitude%2c-Growth%2c-and-Going-Forward.jpg</image:loc><image:caption>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:caption><image:title>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Thankful_2025.jpg</image:loc><image:caption>Thankful2025</image:caption><image:title>Thankful2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/COldham_Round_2025.png</image:loc><image:caption>COldhamRound2025</image:caption><image:title>COldhamRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/LZeck_Round_2025.png</image:loc><image:caption>LZeckRound2025</image:caption><image:title>LZeckRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/EPadgett_Round_2025.png</image:loc><image:caption>EPadgettRound2025</image:caption><image:title>EPadgettRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ASweetmant_Round_2025.png</image:loc><image:caption>ASweetmantRound2025</image:caption><image:title>ASweetmantRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Screenshot%202025-12-26%20at%207.26.08%20AM.png</image:loc><image:caption>Screenshot20251226at72608AM</image:caption><image:title>Screenshot20251226at72608AM</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JBailey_Round_2025.png</image:loc><image:caption>JBaileyRound2025</image:caption><image:title>JBaileyRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/KSmith_Round_2025.png</image:loc><image:caption>KSmithRound2025</image:caption><image:title>KSmithRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/TJohnson_Round_2025.png</image:loc><image:caption>TJohnsonRound2025</image:caption><image:title>TJohnsonRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CMcGinnis_Round_2025.png</image:loc><image:caption>CMcGinnisRound2025</image:caption><image:title>CMcGinnisRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JFreerksen_Round_2025.png</image:loc><image:caption>JFreerksenRound2025</image:caption><image:title>JFreerksenRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/HThompson_Round_2025.png</image:loc><image:caption>HThompsonRound2025</image:caption><image:title>HThompsonRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/BPetzold_Round_2025.png</image:loc><image:caption>BPetzoldRound2025</image:caption><image:title>BPetzoldRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CPoupore_Round_2025.png</image:loc><image:caption>CPouporeRound2025</image:caption><image:title>CPouporeRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/TDurkin_Round_2025.png</image:loc><image:caption>TDurkinRound2025</image:caption><image:title>TDurkinRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CBedel_Round_2025.png</image:loc><image:caption>CBedelRound2025</image:caption><image:title>CBedelRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/MLesters_Round_2025.png</image:loc><image:caption>MLestersRound2025</image:caption><image:title>MLestersRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><lastmod>2025-11-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hipaa-lessons-learned-from-an-ocr-investigator</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Lessons-Learned_OCR.png</image:loc><image:caption>LessonsLearnedOCR</image:caption><image:title>LessonsLearnedOCR</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/changing-regulatory-landscape</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-Financial-Institutions-Can-Get-Ahead.jpg</image:loc><image:caption>HowFinancialInstitutionsCanGetAhead</image:caption><image:title>HowFinancialInstitutionsCanGetAhead</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Vendor-Data-Sharing.jpg</image:loc><image:caption>AsmallgroupofbusinesspeopleinanintenseconversationwiththetitledisplayingVendorDataSharingWhyNeedtoKnowisaMustforFinancialInstitutions</image:caption><image:title>VendorDataSharing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/FNTN_Case-Study.jpg</image:loc><image:caption>FNTNCaseStudy</image:caption><image:title>FNTNCaseStudy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Changing-Regulatory-Landscape.jpg</image:loc><image:caption>ExecutivesdiscussingITandcybersecuritycomplianceinchangingregulatoryenvironment</image:caption><image:title>ChangingRegulatoryLandscape</image:title></image:image><lastmod>2026-02-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/need-ideas-for-incident-response-testing-look-no-further-than-the-fdic-cyber-challenges</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/vciso-questions-and-answers-02</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA2.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions &amp; Answers 02: Why doesn't everyone have a CISO? What is a Virtual CISO?</video:title><video:description>Why doesn't everyone have a CISO? What is a Virtual CISO? Stay tuned to find out the answers to these questions and more in our virtual CISO Questions and Answers video series!</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA2.mp4</video:content_loc><video:duration>153</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>CU</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Credit Unions</video:tag><video:tag>Banks</video:tag><video:tag>Chief Information Security Officer</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/custom-video-thumbnails/vCISO%20Questions%20Answered%20Thumbnail%2002.png</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail02</image:caption><image:title>vCISOQuestionsAnsweredThumbnail02</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cisos-face-challenges-talking-to-boards-about-cyber-risks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/reviewing-the-new-interagency-third-party-risk-management-guidance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Reviewing-the-New-Interagency-Third-Party.jpg</image:loc><image:caption>ReviewingtheNewInteragencyThirdParty</image:caption><image:title>ReviewingtheNewInteragencyThirdParty</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-06-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/security-isnt-special-flower-another-piece-business-like-finance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/sometimes-the-security-of-a-community-bank-isnt-about-cyber</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Sometimes-the-Security-of-a-Community-Bank-Isnt-About-Cyber.jpg</image:loc><image:caption>SometimestheSecurityofaCommunityBankIsntAboutCyber</image:caption><image:title>SometimestheSecurityofaCommunityBankIsntAboutCyber</image:title></image:image><lastmod>2022-04-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/preparing-for-the-unexpected</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-07-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/fbi-ic3-report-top-methods-fraud-focus-customer-awareness</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CloserLook_CaseStudy3.jpg</image:loc><image:caption>CloserLookCaseStudy3</image:caption><image:title>CloserLookCaseStudy3</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ruminations-on-the-new-dodd-frank-section-1033-rule</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Reviewing-the-New-Interagency-Third-Party.jpg</image:loc><image:caption>ReviewingtheNewInteragencyThirdParty</image:caption><image:title>ReviewingtheNewInteragencyThirdParty</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Ruminations-on-the-New-DoddFrank-Section-1033-Rule.jpg</image:loc><image:caption>RuminationsontheNewDoddFrankSection1033Rule</image:caption><image:title>RuminationsontheNewDoddFrankSection1033Rule</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/building-a-successful-team</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Extending-Security-Controls-Beyond-the-Office.jpg</image:loc><image:caption>ExtendingSecurityControlsBeyondtheOffice</image:caption><image:title>ExtendingSecurityControlsBeyondtheOffice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Building-a-Successful-Team.jpg</image:loc><image:caption>BuildingaSuccessfulTeam</image:caption><image:title>BuildingaSuccessfulTeam</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Regulatory-Compliance-vs-True-Security.jpg</image:loc><image:caption>RegulatoryCompliancevsTrueSecurity</image:caption><image:title>RegulatoryCompliancevsTrueSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Thankful_2025.jpg</image:loc><image:caption>Thankful2025</image:caption><image:title>Thankful2025</image:title></image:image><lastmod>2024-03-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/6-questions-to-answer-before-hiring-a-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/6ThingstoConsiderBeforeHiringCISO.jpg</image:loc><image:caption>6ThingstoConsiderBeforeHiringCISO</image:caption><image:title>6ThingstoConsiderBeforeHiringCISO</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/about-me</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/AboutMe.jpg</image:loc><image:caption>AboutMe</image:caption><image:title>AboutMe</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/FullSizeRender-300x300.jpg</image:loc><image:caption>FullSizeRender300x300</image:caption><image:title>FullSizeRender300x300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-05-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cat-2-0-changes</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-important-role-that-cyber-insurance-plays-in-incident-response</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberRiskAppetite.jpg</image:loc><image:caption>CyberRiskAppetite</image:caption><image:title>CyberRiskAppetite</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/UpdateOnCovid19.jpg</image:loc><image:caption>UpdateOnCovid19</image:caption><image:title>UpdateOnCovid19</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CheckingTheBox.jpg</image:loc><image:caption>CheckingTheBox</image:caption><image:title>CheckingTheBox</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/vodka-pairings-and-fintech</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/VodkaPairingsAndFinTech.jpg</image:loc><image:caption>VodkaPairingsAndFinTech</image:caption><image:title>VodkaPairingsAndFinTech</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-02-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-mark-and-travis</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/MarkTravis_BlogAnnouncement.jpg</image:loc><image:caption>MarkTravisBlogAnnouncement</image:caption><image:title>MarkTravisBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Travis%20Johnson%20Headshot-2.jpg</image:loc><image:caption>TravisJohnsonHeadshot2</image:caption><image:title>TravisJohnsonHeadshot2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/MarkLester_Thumbnail300.jpg</image:loc><image:caption>MarkLesterThumbnail300</image:caption><image:title>MarkLesterThumbnail300</image:title></image:image><lastmod>2023-10-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/checklist-saves-stressing</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/A-Checklist-that-keeps-you-from-stressing.jpg</image:loc><image:caption>AChecklistthatkeepsyoufromstressing</image:caption><image:title>AChecklistthatkeepsyoufromstressing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-cory-poupore-cissp-vciso-senior-advisor</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Cory_Headshot_Thumbnail300.jpg</image:loc><image:caption>CoryHeadshotThumbnail300</image:caption><image:title>CoryHeadshotThumbnail300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BlogAnnouncement_CorySenior.jpg</image:loc><image:caption>BlogAnnouncementCorySenior</image:caption><image:title>BlogAnnouncementCorySenior</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_AndrewHernandez.jpg</image:loc><image:caption>NewHireAndrewHernandez</image:caption><image:title>NewHireAndrewHernandez</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ErricaPromotion_BlogAnnouncement.jpg</image:loc><image:caption>ErricaPromotionBlogAnnouncement</image:caption><image:title>ErricaPromotionBlogAnnouncement</image:title></image:image><lastmod>2025-10-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bank-technology-opposing-views</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/OpposingViews.jpg</image:loc><image:caption>OpposingViews</image:caption><image:title>OpposingViews</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/adding-perspective-to-tabletop-exercises</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Adding-Perspective-to-Tabletop-Exercises.jpg</image:loc><image:caption>AddingPerspectivetoTabletopExercises</image:caption><image:title>AddingPerspectivetoTabletopExercises</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-12-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/getting-called-out-on-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/use-an-isp-checklist-to-keep-your-cybersecurity-program-on-track</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/ISO-Checklist.jpg</image:loc><image:caption>ISOChecklist</image:caption><image:title>ISOChecklist</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-08-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ffiec-updates-cybersecurity-expectations-for-boards</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1RT672p.jpeg</image:loc><image:caption>1RT672p</image:caption><image:title>1RT672p</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/vendor-data-sharing-why-need-to-know-is-a-must-for-financial-institutions</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/five-tips-for-tough-days-as-a-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5TipsForRoughDaysAsACISO.jpg</image:loc><image:caption>5TipsForRoughDaysAsACISO</image:caption><image:title>5TipsForRoughDaysAsACISO</image:title></image:image><lastmod>2021-04-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/lack-of-security-awareness-playing-a-key-role-in-ransomware-attacks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/strong-cybersecurity-is-a-moving-target</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Strong-Cybersecurity-is-a-Moving-Target.jpg</image:loc><image:caption>StrongCybersecurityisaMovingTarget</image:caption><image:title>StrongCybersecurityisaMovingTarget</image:title></image:image><lastmod>2022-07-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/resource-for-your-customers-1-page-cybersecurity-checklist-for-small-businesses</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/OnePageCyberSecChecklist_SB.jpg</image:loc><image:caption>OnePageCyberSecChecklistSB</image:caption><image:title>OnePageCyberSecChecklistSB</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/OnePageCyberSecChecklist_SB2.jpg</image:loc><image:caption>OnePageCyberSecChecklistSB2</image:caption><image:title>OnePageCyberSecChecklistSB2</image:title></image:image><lastmod>2021-10-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/merry-christmas-2025</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/F5_Holiday%20Video%20Edition_Full.mp4/medium.jpg</video:thumbnail_loc><video:title>Bedel Security Holiday Video 2026</video:title><video:description>Sit down with the vCISOs of the Bedel Security team and learn a little more about what makes them so magical this holiday season.</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/F5_Holiday%20Video%20Edition_Full.mp4</video:content_loc><video:duration>604</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>BedelSecurity</video:tag><video:tag>Holiday</video:tag><video:tag>vCISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Screenshot%202025-12-26%20at%207.26.08%20AM.png</image:loc><image:caption>Screenshot20251226at72608AM</image:caption><image:title>Screenshot20251226at72608AM</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Thankful_2025.jpg</image:loc><image:caption>Thankful2025</image:caption><image:title>Thankful2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/10-Years-of-Bedel-Security-Gratitude%2c-Growth%2c-and-Going-Forward.jpg</image:loc><image:caption>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:caption><image:title>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-12-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/pandemic-planning</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-04-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/does-simulated-phishing-training-actually-work</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-Awareness-Month.jpg</image:loc><image:caption>CybersecurityAwarenessMonth</image:caption><image:title>CybersecurityAwarenessMonth</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Humans-vs.-Artificial-Intelligence--Who-is-the-better-phishe.jpg</image:loc><image:caption>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:caption><image:title>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AI-Driven-Phishing-Scams.jpg</image:loc><image:caption>AIDrivenPhishingScams</image:caption><image:title>AIDrivenPhishingScams</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Does-Simulated-Phishing-Training-Actually-Work--.jpg</image:loc><image:caption>DoesSimulatedPhishingTrainingActuallyWork</image:caption><image:title>DoesSimulatedPhishingTrainingActuallyWork</image:title></image:image><lastmod>2025-06-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-quick-look-at-the-recent-ftc-glba-amendment-proposals</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/PrescriptiveRegulators.jpg</image:loc><image:caption>PrescriptiveRegulators</image:caption><image:title>PrescriptiveRegulators</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/ThePolicyLabrynth.jpg</image:loc><image:caption>ThePolicyLabrynth</image:caption><image:title>ThePolicyLabrynth</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/dont-forget-the-bank-service-company-act</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Dont-Forget-the-BSCA1.jpg</image:loc><image:caption>DontForgettheBSCA1</image:caption><image:title>DontForgettheBSCA1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-06-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/best-cyber-insurance-policy</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-Regular-Security-Audits-and-Penetration-Testing-1.jpg</image:loc><image:caption>WhyRegularSecurityAuditsandPenetrationTesting1</image:caption><image:title>WhyRegularSecurityAuditsandPenetrationTesting1</image:title></image:image><lastmod>2023-11-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-do-examiners-say</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4/medium.jpg</video:thumbnail_loc><video:title>What do examiners say? What kind of due diligence should we do on a vCISO?</video:title><video:description>vCISO_QA14</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4</video:content_loc><video:duration>228</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Examiners</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>CISO services</video:tag><video:tag>Due Diligence</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2014.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail14</image:caption><image:title>vCISOQuestionsAnsweredThumbnail14</image:title></image:image><lastmod>2021-09-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/preparing-for-a-security-incident</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Preparing-for-a-Security-Incident.jpg</image:loc><image:caption>PreparingforaSecurityIncident</image:caption><image:title>PreparingforaSecurityIncident</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-09-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/case-study-supplemental-ciso-1-2-billion-in-assets</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CaseStudy2_CloserLook.jpg</image:loc><image:caption>CaseStudy2CloserLook</image:caption><image:title>CaseStudy2CloserLook</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-war-on-residential-proxy-networks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Changing-Regulatory-Landscape.jpg</image:loc><image:caption>ExecutivesdiscussingITandcybersecuritycomplianceinchangingregulatoryenvironment</image:caption><image:title>ChangingRegulatoryLandscape</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-War-on-Residential-Proxy-Networks.jpg</image:loc><image:caption>Residentialneighborhoodusedtoillustratecybersecuritythreatsfromresidentialproxynetworks</image:caption><image:title>TheWaronResidentialProxyNetworks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/A-Strong-Defense-Wins-Championships.jpg</image:loc><image:caption>AStrongDefenseWinsChampionships</image:caption><image:title>AStrongDefenseWinsChampionships</image:title></image:image><lastmod>2026-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/solarwinds-5-points-to-communicate-to-your-board</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/SolrWinds_5PointsToComm.jpg</image:loc><image:caption>SolrWinds5PointsToComm</image:caption><image:title>SolrWinds5PointsToComm</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-01-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/defending-the-end-zone</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Defending-the-End-Zone.jpg</image:loc><image:caption>DefendingtheEndZone</image:caption><image:title>DefendingtheEndZone</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-02-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/crowdstrike-and-supply-chain-risk-management</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CrowdStrike-and-Supply-Chain-Risk-Management_what-can-we-learn.jpg</image:loc><image:caption>CrowdStrikeandSupplyChainRiskManagementwhatcanwelearn</image:caption><image:title>CrowdStrikeandSupplyChainRiskManagementwhatcanwelearn</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://www.bedelsecurity.com/why-vciso-services</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Icons/TeamApproach_Small.png</image:loc><image:caption>TeamApproachSmall</image:caption><image:title>TeamApproachSmall</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Artboard%2010.png</image:loc><image:caption>24Artboard10</image:caption><image:title>24Artboard10</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Efficient%20by%20design.png</image:loc><image:caption>24Efficientbydesign</image:caption><image:title>24Efficientbydesign</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/WhyvCISO_WorkingOnComputer_PagePhoto.jpg</image:loc><image:caption>VirtualCISOconsultantanalyzingreportsforfinancialinstitutionclient</image:caption><image:title>WhyvCISOWorkingOnComputerPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Straightforward%20Pricing.png</image:loc><image:caption>24StraightforwardPricing</image:caption><image:title>24StraightforwardPricing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Team%20Approach.png</image:loc><image:caption>24TeamApproach</image:caption><image:title>24TeamApproach</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Modular%20Design.png</image:loc><image:caption>24ModularDesign</image:caption><image:title>24ModularDesign</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Icons/24Laser%20Focus.png</image:loc><image:caption>24LaserFocus</image:caption><image:title>24LaserFocus</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/RolesOfInfoSecProg_InfoGraphic-03.png</image:loc><image:caption>RolesOfInfoSecProgInfoGraphic03</image:caption><image:title>RolesOfInfoSecProgInfoGraphic03</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/WhyBedel_FrustratedMeeting_PagePhoto.jpg</image:loc><image:caption>Executiveleadershipteamdiscussinginformationsecurityandcompliancechallengesduringhighpressuremeeting</image:caption><image:title>WhyBedelFrustratedMeetingPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/WhyBedelvCISO_GroupMeeting_PagePhoto.jpg</image:loc><image:caption>Leadershipteamdiscussingcybersecuritystrategyandriskmanagement</image:caption><image:title>WhyBedelvCISOGroupMeetingPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24Grouped%20by%20Asset%20.png</image:loc><image:caption>24GroupedbyAsset</image:caption><image:title>24GroupedbyAsset</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/24High%20Touch%20.png</image:loc><image:caption>24HighTouch</image:caption><image:title>24HighTouch</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Icons/24Proven%20Process.png</image:loc><image:caption>24ProvenProcess</image:caption><image:title>24ProvenProcess</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/WhyBedelvCISO_Hero.jpg</image:loc><image:caption>VirtualCISOleadingcybersecuritycommitteemeetingviavideocall</image:caption><image:title>WhyBedelvCISOHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/CySPOT%C2%AE.png</image:loc><image:caption>CySPOT</image:caption><image:title>CySPOT</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bedel-security-mission</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/addressing-the-moveit-vulnerability-actions-for-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Addressing-the-MOVEit-Vulnerability.jpg</image:loc><image:caption>AddressingtheMOVEitVulnerability</image:caption><image:title>AddressingtheMOVEitVulnerability</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-06-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-facebook-accounts-for-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Facebook-Accounts-for-Financial-Institutions.jpg</image:loc><image:caption>ManagingFacebookAccountsforFinancialInstitutions</image:caption><image:title>ManagingFacebookAccountsforFinancialInstitutions</image:title></image:image><lastmod>2024-10-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/want-stronger-passwords-understand-4-common-password-security-myths</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/PasswordCartoon.png</image:loc><image:caption>PasswordCartoon</image:caption><image:title>PasswordCartoon</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/4-PasswordSecurityMyths-1.jpg</image:loc><image:caption>4PasswordSecurityMyths1</image:caption><image:title>4PasswordSecurityMyths1</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/creating-a-simple-threat-information-sharing-policy-to-achieve-baseline-compliance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-risk-appetite-like-driving</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberRiskAppetite.jpg</image:loc><image:caption>CyberRiskAppetite</image:caption><image:title>CyberRiskAppetite</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-fiduciary-role-of-the-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Fiduciary-Role-of-the-CISO.jpg</image:loc><image:caption>TheFiduciaryRoleoftheCISO</image:caption><image:title>TheFiduciaryRoleoftheCISO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-02-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-fdic-intrex-gets-audited</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/FDICInTrexAudited.jpg</image:loc><image:caption>FDICInTrexAudited</image:caption><image:title>FDICInTrexAudited</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/solarwinds-what-do-we-know-so-far</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/SolrWinds_WhatDoWeKnow.jpg</image:loc><image:caption>SolrWindsWhatDoWeKnow</image:caption><image:title>SolrWindsWhatDoWeKnow</image:title></image:image><lastmod>2021-01-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/community-bank-ciso-new-it-booklet-calls-for-more-strategic-role</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/mitigating-supply-chain-attacks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RussianCyberthreats.jpg</image:loc><image:caption>RussianCyberthreats</image:caption><image:title>RussianCyberthreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Russian-Destructive-Malware.jpg</image:loc><image:caption>RussianDestructiveMalware</image:caption><image:title>RussianDestructiveMalware</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/MFA-Enrollment-Mistakes.jpg</image:loc><image:caption>MFAEnrollmentMistakes</image:caption><image:title>MFAEnrollmentMistakes</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-the-ffiec-cat-isnt-your-risk-assessment-and-what-to-do-instead</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/your-information-security-program-needs-focus</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BankDirectorcom-Survey-2.jpeg</image:loc><image:caption>BankDirectorcomSurvey2</image:caption><image:title>BankDirectorcomSurvey2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent-Collaboration-Pt2.jpg</image:loc><image:caption>IndependentCollaborationPt2</image:caption><image:title>IndependentCollaborationPt2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/remote-work-flexibility-is-here-to-stay</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RemoteWorkFlexibilityisHereToStay.jpg</image:loc><image:caption>RemoteWorkFlexibilityisHereToStay</image:caption><image:title>RemoteWorkFlexibilityisHereToStay</image:title></image:image><lastmod>2022-05-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-risk-based-audit</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-11-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/securing-your-future-with-a-virtual-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/guidance-from-the-fbi-their-efforts-and-your-role</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/who-should-consider-a-vciso</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA6_.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions and Answers 06: Who should consider a vCISO? Is it a new concept? What happens when an F.I. with a vCISO wants to hire an in-house CISO?</video:title><video:description>In today's video, we answer: Who should consider a vCISO? Is it a new concept? What happens when an F.I. with a vCISO wants to hire an in-house CISO?</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA6_.mp4</video:content_loc><video:duration>274</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>FI</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>ISP</video:tag><video:tag>Cybersecurity</video:tag><video:tag>virtual CISO</video:tag><video:tag>in-house CISO</video:tag><video:tag>Information Security Program</video:tag><video:tag>CU</video:tag><video:tag>succession planning</video:tag><video:tag>Banks</video:tag><video:tag>CISO services</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2006.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail06</image:caption><image:title>vCISOQuestionsAnsweredThumbnail06</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/privacy-and-security-training-games</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-sh</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/KSmith_Announcement.jpg</image:loc><image:caption>KSmithAnnouncement</image:caption><image:title>KSmithAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NewHire_BlogAnnouncement_SH.jpg</image:loc><image:caption>NewHireBlogAnnouncementSH</image:caption><image:title>NewHireBlogAnnouncementSH</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_JordanR.jpg</image:loc><image:caption>NewHireBlogAnnouncementJordanR</image:caption><image:title>NewHireBlogAnnouncementJordanR</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TonyAnnouncement.jpg</image:loc><image:caption>TonyAnnouncement</image:caption><image:title>TonyAnnouncement</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/understanding-the-second-amendment-to-dfs-part-500</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/In-a-World-of-Emerging-Technology-One-Truth-Remains.jpg</image:loc><image:caption>InaWorldofEmergingTechnologyOneTruthRemains</image:caption><image:title>InaWorldofEmergingTechnologyOneTruthRemains</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Control-Assessments-Vs-Risk-Assessments.jpg</image:loc><image:caption>ControlAssessmentsVsRiskAssessments</image:caption><image:title>ControlAssessmentsVsRiskAssessments</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-the-Second-Amendment-to-DFS-Part-500.jpg</image:loc><image:caption>UnderstandingtheSecondAmendmenttoDFSPart500</image:caption><image:title>UnderstandingtheSecondAmendmenttoDFSPart500</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><lastmod>2025-03-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/regulatory-compliance-vs-true-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Regulatory-Compliance-vs-True-Security.jpg</image:loc><image:caption>RegulatoryCompliancevsTrueSecurity</image:caption><image:title>RegulatoryCompliancevsTrueSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-05-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cracking-codes-and-crushing-rocks-what-geology-can-teach-us-about-cryptography</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5ReasonsISIsATeamSport.jpg</image:loc><image:caption>5ReasonsISIsATeamSport</image:caption><image:title>5ReasonsISIsATeamSport</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-Resilience-Against-Nation-State-Actors.jpg</image:loc><image:caption>BuildingResilienceAgainstNationStateActors</image:caption><image:title>BuildingResilienceAgainstNationStateActors</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Cracking-Codes-and-Crushing-Rocks.jpg</image:loc><image:caption>CrackingCodesandCrushingRocks</image:caption><image:title>CrackingCodesandCrushingRocks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-09-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/share-common-sense-security-framework-business-customers</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/patch-microsoft-systems-now-protect-wannacry-ransomware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/click-not-click-5-laws-links</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/To-Click-or-Not-to-Click-The-5-Laws-of-Links.jpg</image:loc><image:caption>ToClickorNottoClickThe5LawsofLinks</image:caption><image:title>ToClickorNottoClickThe5LawsofLinks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-03-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-cyber-crystal-ball-whats-in-store-for-community-financial-institutions-in-2025</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Cyber-Crystal-Ball-Whats-in-Store-for-Community-Financial-Institutions-in-2025.jpg</image:loc><image:caption>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:caption><image:title>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:title></image:image><lastmod>2024-11-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/surviving-the-post-pandemic-landscape-part-3</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BackupsVRetention.jpg</image:loc><image:caption>BackupsVRetention</image:caption><image:title>BackupsVRetention</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/biggest-mistake-new-ciso-can-make</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-to-Manage-a-CISO-to-Avoid-Burnout.jpg</image:loc><image:caption>HowtoManageaCISOtoAvoidBurnout</image:caption><image:title>HowtoManageaCISOtoAvoidBurnout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/CrackingTheGLBACode.jpg</image:loc><image:caption>CrackingTheGLBACode</image:caption><image:title>CrackingTheGLBACode</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Prioritize.jpg</image:loc><image:caption>Prioritize</image:caption><image:title>Prioritize</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/mfa-enrollment-mistakes</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/MFA-Enrollment-Mistakes.jpg</image:loc><image:caption>MFAEnrollmentMistakes</image:caption><image:title>MFAEnrollmentMistakes</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/youve-completed-the-ffiecs-cat-now-what-6-tips-on-an-effective-remediation-plan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Maternity%20Leave/BlurredOffice.jpg</image:loc><image:caption>BlurredOffice</image:caption><image:title>BlurredOffice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CompletedFFIEC.jpg</image:loc><image:caption>CompletedFFIEC</image:caption><image:title>CompletedFFIEC</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-02-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/beyond-the-cat-building-on-a-foundation-that-lasts</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Moving-from-the-CAT-to-CSF--A-More-Strategic-Path-for-Community-Financial-Institutions.jpg</image:loc><image:caption>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:caption><image:title>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-are-the-pros-and-cons-of-a-virtual-ciso</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA5.mp4/medium.jpg</video:thumbnail_loc><video:title>Virtual CISO Questions and Answers 05: What are the Pros and Cons of a Virtual CISO?</video:title><video:description>What are the Pros and Cons of a Virtual CISO? Join us in our vCISO questions and answers series to find out!</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA5.mp4</video:content_loc><video:duration>257</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>FI</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>Cybersecurity</video:tag><video:tag>Financial Institution</video:tag><video:tag>CU</video:tag><video:tag>Virtual CISO</video:tag><video:tag>Banks</video:tag><video:tag>CISO Services</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answered%20Thumbnail%2005.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail05</image:caption><image:title>vCISOQuestionsAnsweredThumbnail05</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/lahey-hospital-fined-850000-in-hipaa-case</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1YDfuaz.jpeg</image:loc><image:caption>1YDfuaz</image:caption><image:title>1YDfuaz</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-reasons-information-security-is-a-team-sport</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5ReasonsISIsATeamSport.jpg</image:loc><image:caption>5ReasonsISIsATeamSport</image:caption><image:title>5ReasonsISIsATeamSport</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/consider-cybersecurity-in-succession-planning-for-the-board</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/threat-intelligence-lessons-from-paris-attacks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1Sg9tgc.jpeg</image:loc><image:caption>1Sg9tgc</image:caption><image:title>1Sg9tgc</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/five-findings-from-2023-ibm-security-report</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Five-Findings-from-the-2023-IBM-Security.jpg</image:loc><image:caption>FiveFindingsfromthe2023IBMSecurity</image:caption><image:title>FiveFindingsfromthe2023IBMSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-10-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/more-about-the-virtual-ciso-vciso-role</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/blue-logo-on-gradient-white.png</image:loc><image:caption>bluelogoongradientwhite</image:caption><image:title>bluelogoongradientwhite</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/four-and-four-questions-to-simplify-vendor-management</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/4-tips-for-your-small-office-network</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/4-tips-on-security.png</image:loc><image:caption>4tipsonsecurity</image:caption><image:title>4tipsonsecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2015-06-15-at-12_30_10-PM-300x219.png</image:loc><image:caption>ScreenShot20150615at123010PM300x219</image:caption><image:title>ScreenShot20150615at123010PM300x219</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2015-06-15-at-12_31_21-PM-300x54.png</image:loc><image:caption>ScreenShot20150615at123121PM300x54</image:caption><image:title>ScreenShot20150615at123121PM300x54</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/evaluating-incident-risk-severity-levels-in-your-incident-response-plan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Incident-Response-Theater.jpg</image:loc><image:caption>IncidentResponseTheater</image:caption><image:title>IncidentResponseTheater</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Preparing-for-a-Security-Incident.jpg</image:loc><image:caption>PreparingforaSecurityIncident</image:caption><image:title>PreparingforaSecurityIncident</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Evaluating-Incident-Risk-Severity-Levels-in-Your-Incident-Response-Plan2.jpg</image:loc><image:caption>EvaluatingIncidentRiskSeverityLevelsinYourIncidentResponsePlan2</image:caption><image:title>EvaluatingIncidentRiskSeverityLevelsinYourIncidentResponsePlan2</image:title></image:image><lastmod>2025-08-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-tips-for-management-to-successfully-communicate-with-technical-staff</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Tips-for-Management-to-Successfully-Communicate-with-Technical-Staff.jpg</image:loc><image:caption>5TipsforManagementtoSuccessfullyCommunicatewithTechnicalStaff</image:caption><image:title>5TipsforManagementtoSuccessfullyCommunicatewithTechnicalStaff</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-ways-your-ciso-can-drive-innovation</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/ciso_solutions.jpg</image:loc><image:caption>cisosolutions</image:caption><image:title>cisosolutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/blocking-outbound-communications</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Blocking-Outbound-Communications.jpg</image:loc><image:caption>BlockingOutboundCommunications</image:caption><image:title>BlockingOutboundCommunications</image:title></image:image><lastmod>2023-05-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hackers-are-leveraging-previous-breach-data-to-attack-banks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-physical-security-is-so-important-to-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ai-driven-phishing-scams</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AI-Driven-Phishing-Scams.jpg</image:loc><image:caption>AIDrivenPhishingScams</image:caption><image:title>AIDrivenPhishingScams</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/StrengtheningTheFort.jpg</image:loc><image:caption>StrengtheningTheFort</image:caption><image:title>StrengtheningTheFort</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Humans-vs.-Artificial-Intelligence--Who-is-the-better-phishe.jpg</image:loc><image:caption>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:caption><image:title>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Does-Simulated-Phishing-Training-Actually-Work--.jpg</image:loc><image:caption>DoesSimulatedPhishingTrainingActuallyWork</image:caption><image:title>DoesSimulatedPhishingTrainingActuallyWork</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/meet-the-newest-member-of-the-bedel-security-team-1</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA7.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 07: What are the different forms of a virtual CISO and how much does a virtual CISO cost?</video:title><video:description>vCISO_QA7</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA7.mp4</video:content_loc><video:duration>249</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>CISO as a service</video:tag><video:tag>Virtual CISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-to-Manage-a-CISO-to-Avoid-Burnout.jpg</image:loc><image:caption>HowtoManageaCISOtoAvoidBurnout</image:caption><image:title>HowtoManageaCISOtoAvoidBurnout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ErricaPromotion_BlogAnnouncement.jpg</image:loc><image:caption>ErricaPromotionBlogAnnouncement</image:caption><image:title>ErricaPromotionBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TrishaNewHireAnnouncement.jpg</image:loc><image:caption>TrishaNewHireAnnouncement</image:caption><image:title>TrishaNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2007.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail07</image:caption><image:title>vCISOQuestionsAnsweredThumbnail07</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2021-05-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-insurance-review-release-date-announced</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberInsurance_Announcement.jpg</image:loc><image:caption>CyberInsuranceAnnouncement</image:caption><image:title>CyberInsuranceAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/tricky-phish-testing</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Tricky-Phish-Testing.jpg</image:loc><image:caption>TrickyPhishTesting</image:caption><image:title>TrickyPhishTesting</image:title></image:image><lastmod>2021-10-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/6-steps-secure-remote-access</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/vcio-vciso-whats-the-big-deal</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/VCIO_VCISO.jpg</image:loc><image:caption>VCIOVCISO</image:caption><image:title>VCIOVCISO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/five-essential-cybersecurity-tasks-to-complete-before-year-end</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Five-Essential-Cybersecurity-Tasks-to-Complete-Before-Year-End.jpg</image:loc><image:caption>FiveEssentialCybersecurityTaskstoCompleteBeforeYearEnd</image:caption><image:title>FiveEssentialCybersecurityTaskstoCompleteBeforeYearEnd</image:title></image:image><lastmod>2024-11-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-do-vciso-services-work</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA4.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions &amp; Answers 04</video:title><video:description>How do vCISO services work? And how involved does the F.I. staff need to be?</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA4.mp4</video:content_loc><video:duration>219</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>vCISO services</video:tag><video:tag>outsourced CISO</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answers%20Thumbnail%2004.jpg</image:loc><image:caption>vCISOQuestionsAnswersThumbnail04</image:caption><image:title>vCISOQuestionsAnswersThumbnail04</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/multi-factor-authentication-threats-heat-up</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/MFA_ThreatsHeatUp.jpg</image:loc><image:caption>MFAThreatsHeatUp</image:caption><image:title>MFAThreatsHeatUp</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-10-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-your-m365-conditional-access-unconditional</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Is-Your-M365-Conditional-Access-Unconditional.jpg</image:loc><image:caption>IsYourM365ConditionalAccessUnconditional</image:caption><image:title>IsYourM365ConditionalAccessUnconditional</image:title></image:image><lastmod>2023-09-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/analysis-ffiecs-update-cyber-assessment-tool-makes-baseline-maturity-easier</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-resilience-new-focus-in-occ-operating-plan-for-2016</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Cyber-Resilience.png</image:loc><image:caption>CyberResilience</image:caption><image:title>CyberResilience</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/password-reuse</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Password-Reuse.jpg</image:loc><image:caption>PasswordReuse</image:caption><image:title>PasswordReuse</image:title></image:image><lastmod>2023-06-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-strong-defense-wins-championships-and-protects-your-data</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Rising-Threat-of-Deepfake-Technology-in-Cybersecurity1.jpg</image:loc><image:caption>TheRisingThreatofDeepfakeTechnologyinCybersecurity1</image:caption><image:title>TheRisingThreatofDeepfakeTechnologyinCybersecurity1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/A-Strong-Defense-Wins-Championships.jpg</image:loc><image:caption>AStrongDefenseWinsChampionships</image:caption><image:title>AStrongDefenseWinsChampionships</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-09-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/lessons-from-the-first-american-financial-corporation-breach</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NIST-Releases-Cybersecurity-Framework-2.0.jpg</image:loc><image:caption>NISTReleasesCybersecurityFramework20</image:caption><image:title>NISTReleasesCybersecurityFramework20</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-the-Second-Amendment-to-DFS-Part-500.jpg</image:loc><image:caption>UnderstandingtheSecondAmendmenttoDFSPart500</image:caption><image:title>UnderstandingtheSecondAmendmenttoDFSPart500</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/7-things-know-wpa2-krack-vulnerability</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/7things_WPA2KRACK.jpg</image:loc><image:caption>7thingsWPA2KRACK</image:caption><image:title>7thingsWPA2KRACK</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/nists-new-password-rules-need-know</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/backups-vs-retention</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BackupsVRetention.jpg</image:loc><image:caption>BackupsVRetention</image:caption><image:title>BackupsVRetention</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-11-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/log4shell-response-for-community-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-12-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cisas-cybersecurity-performance-goals-a-new-opportunity-for-community-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CISAs-Cybersecurity-Performance-Goals.jpg</image:loc><image:caption>CISAsCybersecurityPerformanceGoals</image:caption><image:title>CISAsCybersecurityPerformanceGoals</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-Governance-Matters-What-CISA-Updated-CPGs-Means-for-FIs.jpg</image:loc><image:caption>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:caption><image:title>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/network-segmentation-how-much-is-enough</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheAIArmsRace.jpg</image:loc><image:caption>TheAIArmsRace</image:caption><image:title>TheAIArmsRace</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Kingdom-Building-in-Information-Security-The-Risks-of-Tool-Overload.jpg</image:loc><image:caption>KingdomBuildinginInformationSecurityTheRisksofToolOverload</image:caption><image:title>KingdomBuildinginInformationSecurityTheRisksofToolOverload</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Network-Segmentation-How-Much-Is-Enough.jpg</image:loc><image:caption>NetworkSegmentationHowMuchIsEnough</image:caption><image:title>NetworkSegmentationHowMuchIsEnough</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-policy-labyrinth</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/ThePolicyLabrynth.jpg</image:loc><image:caption>ThePolicyLabrynth</image:caption><image:title>ThePolicyLabrynth</image:title></image:image><lastmod>2021-04-30</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/rapid-change-not-fast-enough-in-mobile-banking</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/AB111915RATING.jpg</image:loc><image:caption>AB111915RATING</image:caption><image:title>AB111915RATING</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-to-approach-third-party-reviews</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Reviewing-the-New-Interagency-Third-Party.jpg</image:loc><image:caption>ReviewingtheNewInteragencyThirdParty</image:caption><image:title>ReviewingtheNewInteragencyThirdParty</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Vendor-Data-Sharing.jpg</image:loc><image:caption>AsmallgroupofbusinesspeopleinanintenseconversationwiththetitledisplayingVendorDataSharingWhyNeedtoKnowisaMustforFinancialInstitutions</image:caption><image:title>VendorDataSharing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/PrescriptiveRegulators.jpg</image:loc><image:caption>PrescriptiveRegulators</image:caption><image:title>PrescriptiveRegulators</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-to-Approach-Third-Party-Reviews.jpg.jpg</image:loc><image:caption>AmansittingathislaptoptakingnoteswithapenandthetitledisplayingHowtoApproachThirdPartyReviews</image:caption><image:title>HowtoApproachThirdPartyReviewsjpg</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-11-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Identity-is-the-New-Perimeter.jpg</image:loc><image:caption>IdentityistheNewPerimeter</image:caption><image:title>IdentityistheNewPerimeter</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-War-on-Residential-Proxy-Networks.jpg</image:loc><image:caption>Residentialneighborhoodusedtoillustratecybersecuritythreatsfromresidentialproxynetworks</image:caption><image:title>TheWaronResidentialProxyNetworks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Changing-Regulatory-Landscape.jpg</image:loc><image:caption>ExecutivesdiscussingITandcybersecuritycomplianceinchangingregulatoryenvironment</image:caption><image:title>ChangingRegulatoryLandscape</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_Logo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>BedelLogoRegHorizWtLG</image:caption><image:title>BedelLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Trust-But-Verify.jpg</image:loc><image:caption>Businesshandshakeillustratingtrustandverificationinmanagedsecurityservices</image:caption><image:title>TrustButVerify</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cyber-Hygiene-Isnt-Optional.jpg</image:loc><image:caption>AudienceattendingacybersecuritypresentationillustratingwhycyberhygieneandCSBSCyberHygieneFundamentalsmatterforfinancialinstitutions</image:caption><image:title>CyberHygieneIsntOptional</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-AI-Bias.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconunderstandingAIbias</image:caption><image:title>UnderstandingAIBias</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-a-Stronger-Phishing-Resilience-Culture.jpg</image:loc><image:caption>BuildingaStrongerPhishingResilienceCulture</image:caption><image:title>BuildingaStrongerPhishingResilienceCulture</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hired-guns-the-rise-of-the-virtual-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/regulators-becoming-more-prescriptive</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/PrescriptiveRegulators.jpg</image:loc><image:caption>PrescriptiveRegulators</image:caption><image:title>PrescriptiveRegulators</image:title></image:image><lastmod>2022-12-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/business-email-compromise-attacks-immune-to-multi-factor-authentication</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BEC-Image1.png</image:loc><image:caption>BECImage1</image:caption><image:title>BECImage1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BEC-Attacks-Immune-to-MFA.jpg</image:loc><image:caption>BECAttacksImmunetoMFA</image:caption><image:title>BECAttacksImmunetoMFA</image:title></image:image><lastmod>2023-07-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-switching-to-passwordless-authentication-possible-with-tools-we-already-have</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-Wild-Untamed-and-Exciting-World-of-Passkeys.jpg</image:loc><image:caption>TheWildUntamedandExcitingWorldofPasskeys</image:caption><image:title>TheWildUntamedandExcitingWorldofPasskeys</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/StrengtheningTheFort.jpg</image:loc><image:caption>StrengtheningTheFort</image:caption><image:title>StrengtheningTheFort</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-switching-to-passwordless-authentication-possible.jpg</image:loc><image:caption>Isswitchingtopasswordlessauthenticationpossible</image:caption><image:title>Isswitchingtopasswordlessauthenticationpossible</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-It-time-to-go-passwordless-1.jpg</image:loc><image:caption>IsIttimetogopasswordless1</image:caption><image:title>IsIttimetogopasswordless1</image:title></image:image><lastmod>2025-08-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/understanding-rto-rpo-and-mtd</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent-Collaboration-Pt2.jpg</image:loc><image:caption>IndependentCollaborationPt2</image:caption><image:title>IndependentCollaborationPt2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-36-Hour-Rule-Real-World-Examples-You-Might-Not-Know-About.jpg</image:loc><image:caption>Beyondthe36HourRuleRealWorldExamplesYouMightNotKnowAbout</image:caption><image:title>Beyondthe36HourRuleRealWorldExamplesYouMightNotKnowAbout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BackupsVRetention.jpg</image:loc><image:caption>BackupsVRetention</image:caption><image:title>BackupsVRetention</image:title></image:image><lastmod>2025-03-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/coming-to-your-state-new-york-releases-first-of-its-kind-cybersecurity-regulation-for-banks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/4-steps-to-strengthen-your-cybersecurity-program-in-2024</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/4-steps-to-stremghten.jpg</image:loc><image:caption>4stepstostremghten</image:caption><image:title>4stepstostremghten</image:title></image:image><lastmod>2023-12-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/rising-insider-threats-causes-and-countermeasures</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Self-Assessing-Authentication-&amp;-Access-Risk.jpg</image:loc><image:caption>SelfAssessingAuthenticationAccessRisk</image:caption><image:title>SelfAssessingAuthenticationAccessRisk</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Addressing-the-MOVEit-Vulnerability.jpg</image:loc><image:caption>AddressingtheMOVEitVulnerability</image:caption><image:title>AddressingtheMOVEitVulnerability</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Internal-vs.-External-Cyber-Threats.jpg</image:loc><image:caption>Teamofprofessionalsworkingatcomputersinamodernofficerepresentinginternalcybersecurityriskandgovernanceforcommunitybanks</image:caption><image:title>InternalvsExternalCyberThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Rising-Insider-Threats--Causes-and-Countermeasures.jpg</image:loc><image:caption>RisingInsiderThreatsCausesandCountermeasures</image:caption><image:title>RisingInsiderThreatsCausesandCountermeasures</image:title></image:image><lastmod>2025-07-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/spartan-super</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/SpartanSuper.png</image:loc><image:caption>SpartanSuper</image:caption><image:title>SpartanSuper</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Chris-Spartan-After_jpg-212x300.jpg</image:loc><image:caption>ChrisSpartanAfterjpg212x300</image:caption><image:title>ChrisSpartanAfterjpg212x300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/BEDELtechnology-logo-300x184.png</image:loc><image:caption>BEDELtechnologylogo300x184</image:caption><image:title>BEDELtechnologylogo300x184</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/lessons-learned-from-2025</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Cyber-Crystal-Ball-Whats-in-Store-for-Community-Financial-Institutions-in-2025.jpg</image:loc><image:caption>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:caption><image:title>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-Trends-Examiners-May-Focus-on-in-2026.jpg</image:loc><image:caption>blockswithiconsstackedshowinganupwardarrowtrendingandthetitleCybersecurityTrendsExaminersMayFocusonin2026</image:caption><image:title>CybersecurityTrendsExaminersMayFocusonin2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-01-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cryptowall-ransomware-gang-extorts-330000</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hospital-pays-17000-ransom-to-get-access-back-to-its-encrypted-files</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/mfa-prompt-bombing</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BreakingTheSMSHabit.jpg</image:loc><image:caption>BreakingTheSMSHabit</image:caption><image:title>BreakingTheSMSHabit</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/MFA-Enrollment-Mistakes.jpg</image:loc><image:caption>MFAEnrollmentMistakes</image:caption><image:title>MFAEnrollmentMistakes</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/MFA-Prompt-Bombing.jpg</image:loc><image:caption>MFAPromptBombing</image:caption><image:title>MFAPromptBombing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-It-time-to-go-passwordless-1.jpg</image:loc><image:caption>IsIttimetogopasswordless1</image:caption><image:title>IsIttimetogopasswordless1</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-platform-wont-change-your-culture</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/APlatformWontChange.jpg</image:loc><image:caption>APlatformWontChange</image:caption><image:title>APlatformWontChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-07-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-new-generation-of-the-zeus-banking-trojan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ANewGenerationOfTheZeus.jpg</image:loc><image:caption>ANewGenerationOfTheZeus</image:caption><image:title>ANewGenerationOfTheZeus</image:title></image:image><lastmod>2020-04-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/keep-an-eye-on-api-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Keep-an-eye-on-API-Security.jpg</image:loc><image:caption>KeepaneyeonAPISecurity</image:caption><image:title>KeepaneyeonAPISecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-11-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-cybersecurity-get-away-from-no</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybrsecurity-Get-Away-From-No.jpg</image:loc><image:caption>ManagingCybrsecurityGetAwayFromNo</image:caption><image:title>ManagingCybrsecurityGetAwayFromNo</image:title></image:image><lastmod>2021-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/announcing-the-launch-of-bedelsecurity-com</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/BedelSecurity_com_.png</image:loc><image:caption>BedelSecuritycom</image:caption><image:title>BedelSecuritycom</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-new-years-resolution-start-with-a-gut-check</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Cyber-New-Year-Resolution-Start-with-a-Gut-Check.jpg</image:loc><image:caption>CyberNewYearResolutionStartwithaGutCheck</image:caption><image:title>CyberNewYearResolutionStartwithaGutCheck</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-cade-w</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/CadeWilliams_Thumbnail_BW300.jpg</image:loc><image:caption>CadeWilliamsThumbnailBW300</image:caption><image:title>CadeWilliamsThumbnailBW300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_Cade.jpg</image:loc><image:caption>NewHireBlogAnnouncementCade</image:caption><image:title>NewHireBlogAnnouncementCade</image:title></image:image><lastmod>2024-01-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-what-why-and-how-of-complementary-user-entity-controls</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TheWhatWhyandHowofComplementary-User-Entity-Controls.jpg</image:loc><image:caption>TheWhatWhyandHowofComplementaryUserEntityControls</image:caption><image:title>TheWhatWhyandHowofComplementaryUserEntityControls</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-01-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/five-cybersecurity-questions-financial-institutions-should-ask-before-year-end</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Five-Cybersecurity-Questions-Financial-Institutions-Should-Ask-Before-Year-End.jpg</image:loc><image:caption>FiveCybersecurityQuestionsFinancialInstitutionsShouldAskBeforeYearEnd</image:caption><image:title>FiveCybersecurityQuestionsFinancialInstitutionsShouldAskBeforeYearEnd</image:title></image:image><lastmod>2024-12-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/understanding-ai-bias</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/AI-Model-Risk-Management-in-Financial-Institutions.jpg</image:loc><image:caption>AIModelRiskManagementinFinancialInstitutions</image:caption><image:title>AIModelRiskManagementinFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-AI-Bias.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconunderstandingAIbias</image:caption><image:title>UnderstandingAIBias</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Navigating-the-Intersection-of-AI-and-Cybersecurity.jpg</image:loc><image:caption>NavigatingtheIntersectionofAIandCybersecurity</image:caption><image:title>NavigatingtheIntersectionofAIandCybersecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Using-RACI-Charts-to-Strengthen-Risk-Management-and-InfoSec-Programs.jpg</image:loc><image:caption>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:caption><image:title>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-was-it-so-quiet-in-the-fourth-quarter</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/FourthQuarter.jpg</image:loc><image:caption>FourthQuarter</image:caption><image:title>FourthQuarter</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-cisas-updated-cpgs-mean-for-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-Governance-Matters-What-CISA-Updated-CPGs-Means-for-FIs.jpg</image:loc><image:caption>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:caption><image:title>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CISAs-Cybersecurity-Performance-Goals.jpg</image:loc><image:caption>CISAsCybersecurityPerformanceGoals</image:caption><image:title>CISAsCybersecurityPerformanceGoals</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Cyber-Crystal-Ball-Whats-in-Store-for-Community-Financial-Institutions-in-2025.jpg</image:loc><image:caption>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:caption><image:title>TheCyberCrystalBallWhatsinStoreforCommunityFinancialInstitutionsin2025</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-secrets-to-security-success</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1RQQBnM.jpeg</image:loc><image:caption>1RQQBnM</image:caption><image:title>1RQQBnM</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/relying-much-user-awareness-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/RelyingTooMuch.jpg</image:loc><image:caption>RelyingTooMuch</image:caption><image:title>RelyingTooMuch</image:title></image:image><lastmod>2019-03-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/banks-have-the-capital-to-buy-fintech-startups-will-they</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-cinda-mcginnis</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/KSmith_BlogAnnouncement.jpg</image:loc><image:caption>KSmithBlogAnnouncement</image:caption><image:title>KSmithBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BlogAnnouncement_CindaCAO.jpg</image:loc><image:caption>BlogAnnouncementCindaCAO</image:caption><image:title>BlogAnnouncementCindaCAO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NewHire_Announcement_Cinda.jpg</image:loc><image:caption>NewHireAnnouncementCinda</image:caption><image:title>NewHireAnnouncementCinda</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BlogAnnouncement_CorySenior.jpg</image:loc><image:caption>BlogAnnouncementCorySenior</image:caption><image:title>BlogAnnouncementCorySenior</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2025-06-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-kenyatta-smith</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/KSmith_BlogAnnouncement.jpg</image:loc><image:caption>KSmithBlogAnnouncement</image:caption><image:title>KSmithBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BlogAnnouncement_CorySenior.jpg</image:loc><image:caption>BlogAnnouncementCorySenior</image:caption><image:title>BlogAnnouncementCorySenior</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-04-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/phishing-attacks-dos-donts-protect-company</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-reasons-every-bank-and-credit-union-should-consider-a-virtual-information-security-officer</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-03-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ai-model-risk-management-in-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/AI-Model-Risk-Management-in-Financial-Institutions.jpg</image:loc><image:caption>AIModelRiskManagementinFinancialInstitutions</image:caption><image:title>AIModelRiskManagementinFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Vendor-Data-Sharing.jpg</image:loc><image:caption>AsmallgroupofbusinesspeopleinanintenseconversationwiththetitledisplayingVendorDataSharingWhyNeedtoKnowisaMustforFinancialInstitutions</image:caption><image:title>VendorDataSharing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-AI-will-impact-Information-Security.jpg</image:loc><image:caption>HowAIwillimpactInformationSecurity</image:caption><image:title>HowAIwillimpactInformationSecurity</image:title></image:image><lastmod>2025-03-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/biometric-authentication-hsbc-telephone-banking-duped-bbc-reporter</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/incident-response-tabletop-exercises-for-beginners</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-it-time-for-your-it-team-to-sharpen-their-saw</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-It-Time-for-Your-IT-Team-to-Sharpen-Their-Saw.jpg</image:loc><image:caption>IsItTimeforYourITTeamtoSharpenTheirSaw</image:caption><image:title>IsItTimeforYourITTeamtoSharpenTheirSaw</image:title></image:image><lastmod>2023-10-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/do-you-need-a-separate-penetration-test-for-remote-access</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/SepratePenTest_RemoteAccess.jpg</image:loc><image:caption>SepratePenTestRemoteAccess</image:caption><image:title>SepratePenTestRemoteAccess</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-04-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-wild-untamed-and-exciting-world-of-passkeys</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/StrengtheningTheFort.jpg</image:loc><image:caption>StrengtheningTheFort</image:caption><image:title>StrengtheningTheFort</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-Wild-Untamed-and-Exciting-World-of-Passkeys.jpg</image:loc><image:caption>TheWildUntamedandExcitingWorldofPasskeys</image:caption><image:title>TheWildUntamedandExcitingWorldofPasskeys</image:title></image:image><lastmod>2025-05-30</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/got-ransomware-an-ounce-of-prevention-is-worth-a-pound-of-cure-5-things-you-can-do</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/dive-into-secure-cloud-configuration-with-scuba</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Dive-into-Secure-Cloud-Configuration-with-SCuBA.jpg</image:loc><image:caption>DiveintoSecureCloudConfigurationwithSCuBA</image:caption><image:title>DiveintoSecureCloudConfigurationwithSCuBA</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Picture2.png</image:loc><image:caption>Picture2</image:caption><image:title>Picture2</image:title></image:image><lastmod>2024-09-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/time-rethink-email-policy</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/RethinkEmailPolicy.jpg</image:loc><image:caption>RethinkEmailPolicy</image:caption><image:title>RethinkEmailPolicy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/turning-the-tide</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Turning-the-Tide.jpg</image:loc><image:caption>TurningtheTide</image:caption><image:title>TurningtheTide</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-03-29</lastmod></url><url><loc>https://www.bedelsecurity.com/contact-us</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/ContactUs_PagePhoto.jpg</image:loc><image:caption>CommunitybankercontactingBedelSecuritytolearnaboutvCISOServices</image:caption><image:title>ContactUsPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/HeaderPhotos/Depositphotos_30574793_original.jpg</image:loc><image:caption>Depositphotos30574793original</image:caption><image:title>Depositphotos30574793original</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/projects-ive-worked-on</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/my-projects-3.png</image:loc><image:caption>myprojects3</image:caption><image:title>myprojects3</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/BEDELtechnology-logo-300x184.png</image:loc><image:caption>BEDELtechnologylogo300x184</image:caption><image:title>BEDELtechnologylogo300x184</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/check-fraud-in-2025-how-real-time-payments-are-changing-the-game</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Check-Fraud-in-2025.jpg</image:loc><image:caption>CheckFraudin2025</image:caption><image:title>CheckFraudin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/HolidayScams.jpg</image:loc><image:caption>HolidayScams</image:caption><image:title>HolidayScams</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Changing-Regulatory-Landscape.jpg</image:loc><image:caption>ExecutivesdiscussingITandcybersecuritycomplianceinchangingregulatoryenvironment</image:caption><image:title>ChangingRegulatoryLandscape</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-War-on-Residential-Proxy-Networks.jpg</image:loc><image:caption>Residentialneighborhoodusedtoillustratecybersecuritythreatsfromresidentialproxynetworks</image:caption><image:title>TheWaronResidentialProxyNetworks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/pidgin2.jpg</image:loc><image:caption>pidgin2</image:caption><image:title>pidgin2</image:title></image:image><lastmod>2025-06-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-does-it-mean-to-be-independent-and-qualified</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Sales%20Videos/The%20Importance%20of%20Being%20Independent%20AND%20Qualified.mp4/medium.jpg</video:thumbnail_loc><video:title>The Importance of Being Independent AND Qualified</video:title><video:description>The Importance of Being Independent AND Qualified</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Sales%20Videos/The%20Importance%20of%20Being%20Independent%20AND%20Qualified.mp4</video:content_loc><video:duration>278</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Independent</video:tag><video:tag>Bank</video:tag><video:tag>ISO</video:tag><video:tag>Financial Institution</video:tag><video:tag>Qualified</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Video_Opening_The-Importance-of-Being-Independent-AND-Qualified.jpg</image:loc><image:caption>VideoOpeningTheImportanceofBeingIndependentANDQualified</image:caption><image:title>VideoOpeningTheImportanceofBeingIndependentANDQualified</image:title></image:image><lastmod>2023-05-16</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-gist-of-governance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-AI-will-impact-Information-Security.jpg</image:loc><image:caption>HowAIwillimpactInformationSecurity</image:caption><image:title>HowAIwillimpactInformationSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-Governance-Matters-What-CISA-Updated-CPGs-Means-for-FIs.jpg</image:loc><image:caption>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:caption><image:title>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cyber-Hygiene-Isnt-Optional.jpg</image:loc><image:caption>AudienceattendingacybersecuritypresentationillustratingwhycyberhygieneandCSBSCyberHygieneFundamentalsmatterforfinancialinstitutions</image:caption><image:title>CyberHygieneIsntOptional</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/third-party-risk-management-properly-rating-inherent-risk</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/AI-Model-Risk-Management-in-Financial-Institutions.jpg</image:loc><image:caption>AIModelRiskManagementinFinancialInstitutions</image:caption><image:title>AIModelRiskManagementinFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Third-Party-Risk-Management--Properly-Rating-Inherent-Risk-.jpg</image:loc><image:caption>ThirdPartyRiskManagementProperlyRatingInherentRisk</image:caption><image:title>ThirdPartyRiskManagementProperlyRatingInherentRisk</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Using-RACI-Charts-to-Strengthen-Risk-Management-and-InfoSec-Programs.jpg</image:loc><image:caption>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:caption><image:title>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-enterprise-risk-management</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/IndySkyline_Small.jpg</image:loc><image:caption>IndySkylineSmall</image:caption><image:title>IndySkylineSmall</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-i-became-a-vciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-I-Became-a-vCISO.jpg</image:loc><image:caption>HowIBecameavCISO</image:caption><image:title>HowIBecameavCISO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-10-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-do-you-measure-success-when-it-comes-to-stopping-phishing-attacks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/key-risk-indicators</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Key-Risk-Indicators--Your-Early-Warning.jpg</image:loc><image:caption>KeyRiskIndicatorsYourEarlyWarning</image:caption><image:title>KeyRiskIndicatorsYourEarlyWarning</image:title></image:image><lastmod>2024-10-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/finding-balance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Finding-Balance.jpg</image:loc><image:caption>FindingBalance</image:caption><image:title>FindingBalance</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/best-practices-to-ace-your-penetration-test</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Best-Practices-to-Ace-Your-Penetration-Test.jpg</image:loc><image:caption>BestPracticestoAceYourPenetrationTest</image:caption><image:title>BestPracticestoAceYourPenetrationTest</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-03-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cracking-the-glba-code</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/CrackingTheGLBACode.jpg</image:loc><image:caption>CrackingTheGLBACode</image:caption><image:title>CrackingTheGLBACode</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-08-16</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/incident-response-theater-are-we-just-playing-the-role-of-preparedness</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Incident-Response-Theater.jpg</image:loc><image:caption>IncidentResponseTheater</image:caption><image:title>IncidentResponseTheater</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Adding-Perspective-to-Tabletop-Exercises.jpg</image:loc><image:caption>AddingPerspectivetoTabletopExercises</image:caption><image:title>AddingPerspectivetoTabletopExercises</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2025-08-01</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/typ0squatting</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BreakingTheSMSHabit.jpg</image:loc><image:caption>BreakingTheSMSHabit</image:caption><image:title>BreakingTheSMSHabit</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BoardCyberAwareness.jpg</image:loc><image:caption>BoardCyberAwareness</image:caption><image:title>BoardCyberAwareness</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/indiana-university-health-arnett-hospital-loses-usb-drive-with-29k-records</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/i-ran-the-ohio-spartan-beast</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/20150604120917-300x225.jpg</image:loc><image:caption>20150604120917300x225</image:caption><image:title>20150604120917300x225</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/SpartanBeast.jpg</image:loc><image:caption>SpartanBeast</image:caption><image:title>SpartanBeast</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-awareness-tips-share-holidays</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberAwarenessTips.jpg</image:loc><image:caption>CyberAwarenessTips</image:caption><image:title>CyberAwarenessTips</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/fdic-implements-new-it-examination-intrex-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-parallels-of-little-league-coaching-and-managing-cybersecurity-risk-in-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Superpower-of-Consistency-in-Cybersecurity.jpg</image:loc><image:caption>TheSuperpowerofConsistencyinCybersecurity</image:caption><image:title>TheSuperpowerofConsistencyinCybersecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/From-Compliance-to-Confidence.jpg</image:loc><image:caption>FromCompliancetoConfidence</image:caption><image:title>FromCompliancetoConfidence</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-Parallels-of-Little-League-Coaching-and-Managing-Cybersecurity.jpg</image:loc><image:caption>TheParallelsofLittleLeagueCoachingandManagingCybersecurity</image:caption><image:title>TheParallelsofLittleLeagueCoachingandManagingCybersecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2024-06-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-internet-of-things-in-retail-banking-2</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/protecting-against-ai-driven-cyber-threats</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Protecting-Against-AI-Driven-Cyber-Threats.jpg</image:loc><image:caption>ProtectingAgainstAIDrivenCyberThreats</image:caption><image:title>ProtectingAgainstAIDrivenCyberThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-10-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-the-relationship-between-information-technology-and-information-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-the-Relationship.jpg</image:loc><image:caption>ManagingtheRelationship</image:caption><image:title>ManagingtheRelationship</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-03-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/russian-destructive-malware-dont-hit-the-panic-button</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Russian-Destructive-Malware.jpg</image:loc><image:caption>RussianDestructiveMalware</image:caption><image:title>RussianDestructiveMalware</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-insurance-is-broken.-how-do-we-fix-it</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CyberInsuranceBroken.jpg</image:loc><image:caption>CyberInsuranceBroken</image:caption><image:title>CyberInsuranceBroken</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-12-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-whats-big-deal</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/TheBigDeal.jpg</image:loc><image:caption>TheBigDeal</image:caption><image:title>TheBigDeal</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/key-takeaways-in-access-control-from-the-korn-ferry-case</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/KeyTakeAway.jpg</image:loc><image:caption>KeyTakeAway</image:caption><image:title>KeyTakeAway</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-tips-for-technical-people-to-successfully-communicate-with-management</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Tips-for-Technical-People-to-Successfully-Communicate-with-Management.jpg</image:loc><image:caption>5TipsforTechnicalPeopletoSuccessfullyCommunicatewithManagement</image:caption><image:title>5TipsforTechnicalPeopletoSuccessfullyCommunicatewithManagement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/surviving-the-post-pandemic-landscape-part-2</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-three-lines-of-defense</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-Three-Lines-of-Defense.jpg</image:loc><image:caption>TheThreeLinesofDefense</image:caption><image:title>TheThreeLinesofDefense</image:title></image:image><lastmod>2024-01-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/my-aws-certification</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/AWS_Certification.png</image:loc><image:caption>AWSCertification</image:caption><image:title>AWSCertification</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/evolution-in-the-business-model-changes-the-way-banks-must-approach-cybercrime</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2016-05-18-at-10_20_10-AM.png</image:loc><image:caption>ScreenShot20160518at102010AM</image:caption><image:title>ScreenShot20160518at102010AM</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/EvolutionInTheBusinessModel.jpg</image:loc><image:caption>EvolutionInTheBusinessModel</image:caption><image:title>EvolutionInTheBusinessModel</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/new-company-new-logo</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/NewLogo.png</image:loc><image:caption>NewLogo</image:caption><image:title>NewLogo</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-ways-to-avoid-health-data-breaches</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/focus-on-third-party-risk-management</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-04-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/confessions-of-a-professional-worrier</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Confessions-of-a-Professional-Worrier.jpg</image:loc><image:caption>ConfessionsofaProfessionalWorrier</image:caption><image:title>ConfessionsofaProfessionalWorrier</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-07-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-lessons-i-learned-from-interviewing-a-crypto-expert</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-01-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/sharing-expertise</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-01-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/quick-tip-protect-yourself-from-phishing-emails-by-learning-how-to-spot-bad-urls</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/after-paris-attacks-beware-rush-to-weaken-crypto</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/headerlogo-dbt.png</image:loc><image:caption>headerlogodbt</image:caption><image:title>headerlogodbt</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/video-blog-ciso-intangibles-importance-good-communication</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-08-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/update-to-ftc-glba-safeguards-rule</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Update-to-FTC-GLBA-Safeguards-Rule.jpg</image:loc><image:caption>UpdatetoFTCGLBASafeguardsRule</image:caption><image:title>UpdatetoFTCGLBASafeguardsRule</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-12-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/setting-and-achieving-realistic-information-security-program-goals-for-2016</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-is-best-practice</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/WhatIsBestPractice.jpg</image:loc><image:caption>WhatIsBestPractice</image:caption><image:title>WhatIsBestPractice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-03-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-your-risk-assessment-authentication-access-ready</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/IsYourRiskAssessmentA&amp;AReady.jpg</image:loc><image:caption>IsYourRiskAssessmentAAReady</image:caption><image:title>IsYourRiskAssessmentAAReady</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-01-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-trends-examiners-may-focus-on-in-2026</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-Trends-Examiners-May-Focus-on-in-2026.jpg</image:loc><image:caption>blockswithiconsstackedshowinganupwardarrowtrendingandthetitleCybersecurityTrendsExaminersMayFocusonin2026</image:caption><image:title>CybersecurityTrendsExaminersMayFocusonin2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-01-16</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/isiss-opsec-manual-reveals-how-it-handles-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1kIF2ot.jpeg</image:loc><image:caption>1kIF2ot</image:caption><image:title>1kIF2ot</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/using-raci-charts-to-strengthen-risk-management-and-infosec-programs</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Screenshot%202025-05-27%20at%209.10.39%20AM.png</image:loc><image:caption>Screenshot20250527at91039AM</image:caption><image:title>Screenshot20250527at91039AM</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/In-a-World-of-Emerging-Technology-One-Truth-Remains.jpg</image:loc><image:caption>InaWorldofEmergingTechnologyOneTruthRemains</image:caption><image:title>InaWorldofEmergingTechnologyOneTruthRemains</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Using-RACI-Charts-to-Strengthen-Risk-Management-and-InfoSec-Programs.jpg</image:loc><image:caption>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:caption><image:title>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-ai-arms-race</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheAIArmsRace.jpg</image:loc><image:caption>TheAIArmsRace</image:caption><image:title>TheAIArmsRace</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-08-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/its-a-bad-time-for-a-cyber-breach</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ItsABadTimeFor2.jpg</image:loc><image:caption>ItsABadTimeFor2</image:caption><image:title>ItsABadTimeFor2</image:title></image:image><lastmod>2020-04-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/phishing-but-make-it-ai</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Phishing-but-make-it-AI.jpg</image:loc><image:caption>PhishingbutmakeitAI</image:caption><image:title>PhishingbutmakeitAI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AI-Driven-Phishing-Scams.jpg</image:loc><image:caption>AIDrivenPhishingScams</image:caption><image:title>AIDrivenPhishingScams</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-a-Stronger-Phishing-Resilience-Culture.jpg</image:loc><image:caption>BuildingaStrongerPhishingResilienceCulture</image:caption><image:title>BuildingaStrongerPhishingResilienceCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Humans-vs.-Artificial-Intelligence--Who-is-the-better-phishe.jpg</image:loc><image:caption>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:caption><image:title>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:title></image:image><lastmod>2025-05-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/all-boards-need-a-cybersecurity-expert</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/video-blog-ciso-intangibles-understand-business</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-trisha-durkin</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TD_BlogAnnouncement_VPCOO.jpg</image:loc><image:caption>TDBlogAnnouncementVPCOO</image:caption><image:title>TDBlogAnnouncementVPCOO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-12-07</lastmod></url><url><loc>https://www.bedelsecurity.com/free-resources</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/HeaderPhotos/FreeResources.jpg</image:loc><image:caption>FreeResources</image:caption><image:title>FreeResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/HeaderPhotos/FreeResources2.jpg</image:loc><image:caption>FreeResources2</image:caption><image:title>FreeResources2</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/benefit-business-impact-analysis</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/BIA.jpg</image:loc><image:caption>BIA</image:caption><image:title>BIA</image:title></image:image><lastmod>2019-02-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/get-cat-tool</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CAT_Consult1.jpg</image:loc><image:caption>CATConsult1</image:caption><image:title>CATConsult1</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/where-to-start</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/checking-the-box</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CheckingTheBox.jpg</image:loc><image:caption>CheckingTheBox</image:caption><image:title>CheckingTheBox</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-07-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/tis-the-season-for-tax-scams</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TisTheSeasonForTaxScams2.jpg</image:loc><image:caption>TisTheSeasonForTaxScams2</image:caption><image:title>TisTheSeasonForTaxScams2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-02-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-is-a-strong-password-in-2022</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/WhatIsAStrongPassword2022.jpg</image:loc><image:caption>WhatIsAStrongPassword2022</image:caption><image:title>WhatIsAStrongPassword2022</image:title></image:image><lastmod>2022-09-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/quantum-computing-another-huge-leap-in-technology</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4/medium.jpg</video:thumbnail_loc><video:title>Can vCISO services be done remotely? How often does a vCISO come on-site?</video:title><video:description>vCISO_QA9</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4</video:content_loc><video:duration>278</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>CUs</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Remote</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The%20Quantum%20Threat.jpg</image:loc><image:caption>TheQuantumThreat</image:caption><image:title>TheQuantumThreat</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Video_Opening_The-Importance-of-Being-Independent-AND-Qualified.jpg</image:loc><image:caption>VideoOpeningTheImportanceofBeingIndependentANDQualified</image:caption><image:title>VideoOpeningTheImportanceofBeingIndependentANDQualified</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Quantum-Computing-Another-Huge-Leap-in-Technology.jpg</image:loc><image:caption>QuantumComputingAnotherHugeLeapinTechnology</image:caption><image:title>QuantumComputingAnotherHugeLeapinTechnology</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answered%20Thumbnail%2009.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail09</image:caption><image:title>vCISOQuestionsAnsweredThumbnail09</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/change-conflict-and-culture</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ChangeConflictand-Culture.jpg</image:loc><image:caption>ChangeConflictandCulture</image:caption><image:title>ChangeConflictandCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-07-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/helping-board-members-sleep-at-night</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Helping-Board-Members-Sleep.jpg</image:loc><image:caption>HelpingBoardMembersSleep</image:caption><image:title>HelpingBoardMembersSleep</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-07-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-regulatory-scrutiny-of-banks-will-intensify-in-2016</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-trisha-durkin-vciso-senior</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TrishaSenior.jpg</image:loc><image:caption>TrishaSenior</image:caption><image:title>TrishaSenior</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Trisha_Headshot_Thumbnail_BW.jpg</image:loc><image:caption>TrishaHeadshotThumbnailBW</image:caption><image:title>TrishaHeadshotThumbnailBW</image:title></image:image><lastmod>2022-07-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/closing-the-cybersecurity-skills-gap</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Closing-the-Cybersecurity-Skills-Gap.jpg</image:loc><image:caption>ClosingtheCybersecuritySkillsGap</image:caption><image:title>ClosingtheCybersecuritySkillsGap</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-05-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-jr</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_JordanR.jpg</image:loc><image:caption>NewHireBlogAnnouncementJordanR</image:caption><image:title>NewHireBlogAnnouncementJordanR</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Jordan_Headshot_Thumbnail300.jpg</image:loc><image:caption>JordanHeadshotThumbnail300</image:caption><image:title>JordanHeadshotThumbnail300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-07-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/recent-information-security-projects-key-takeaways-can-use</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/KeyTakeAways.jpg</image:loc><image:caption>KeyTakeAways</image:caption><image:title>KeyTakeAways</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/outsourcing-it</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/OutsourcingIT.jpg</image:loc><image:caption>OutsourcingIT</image:caption><image:title>OutsourcingIT</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-08-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/will-your-cyber-insurance-cover-that</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/navigating-the-intersection-of-ai-and-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Navigating-the-Intersection-of-AI-and-Cybersecurity.jpg</image:loc><image:caption>NavigatingtheIntersectionofAIandCybersecurity</image:caption><image:title>NavigatingtheIntersectionofAIandCybersecurity</image:title></image:image><lastmod>2024-04-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/predictions-for-the-future-of-banking-as-a-service</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Predictions-for-the-Future-of-Banking-as-a-Service.jpg</image:loc><image:caption>5PredictionsfortheFutureofBankingasaService</image:caption><image:title>5PredictionsfortheFutureofBankingasaService</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-08-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/in-a-world-of-emerging-technology-one-truth-remains</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-the-Second-Amendment-to-DFS-Part-500.jpg</image:loc><image:caption>UnderstandingtheSecondAmendmenttoDFSPart500</image:caption><image:title>UnderstandingtheSecondAmendmenttoDFSPart500</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/In-a-World-of-Emerging-Technology-One-Truth-Remains.jpg</image:loc><image:caption>InaWorldofEmergingTechnologyOneTruthRemains</image:caption><image:title>InaWorldofEmergingTechnologyOneTruthRemains</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><lastmod>2025-02-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/remote-work-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ItsABadTimeFor2.jpg</image:loc><image:caption>ItsABadTimeFor2</image:caption><image:title>ItsABadTimeFor2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5ReasonsISIsATeamSport.jpg</image:loc><image:caption>5ReasonsISIsATeamSport</image:caption><image:title>5ReasonsISIsATeamSport</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/for-banks-cybersecurity-assessment-tool-v2-7-is-now-available</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2015-09-14-at-2_52_48-PM-300x206.png</image:loc><image:caption>ScreenShot20150914at25248PM300x206</image:caption><image:title>ScreenShot20150914at25248PM300x206</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2015-09-14-at-10_23_38-AM-300x165.png</image:loc><image:caption>ScreenShot20150914at102338AM300x165</image:caption><image:title>ScreenShot20150914at102338AM300x165</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Get-it-now_.png</image:loc><image:caption>Getitnow</image:caption><image:title>Getitnow</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2015-09-14-at-2_52_21-PM-300x219.png</image:loc><image:caption>ScreenShot20150914at25221PM300x219</image:caption><image:title>ScreenShot20150914at25221PM300x219</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberSecurity-Assessment-Tool.png</image:loc><image:caption>CyberSecurityAssessmentTool</image:caption><image:title>CyberSecurityAssessmentTool</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/carnegie-mellon-denies-fbi-paid-for-tor-breaking-research-wired</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/asset-management-lessons-learned-from-morgan-stanley</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BreakingTheSMSHabit.jpg</image:loc><image:caption>BreakingTheSMSHabit</image:caption><image:title>BreakingTheSMSHabit</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Keep-an-eye-on-API-Security.jpg</image:loc><image:caption>KeepaneyeonAPISecurity</image:caption><image:title>KeepaneyeonAPISecurity</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-steps-to-utilizing-key-controls</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/5-Steps-to-Utilizing-Key-Controls.jpg</image:loc><image:caption>5StepstoUtilizingKeyControls</image:caption><image:title>5StepstoUtilizingKeyControls</image:title></image:image><lastmod>2023-05-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-third-party-risk-you-cant-see</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_Logo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>BedelLogoRegHorizWtLG</image:caption><image:title>BedelLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Third-Party-Risk-You-Cant-See.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconthirdpartyriskandSaaScybersecuritychallenges</image:caption><image:title>TheThirdPartyRiskYouCantSee</image:title></image:image><lastmod>2026-04-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/case-study-a-virtual-iso-in-a-community-bank</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CaseStudy.jpg</image:loc><image:caption>CaseStudy</image:caption><image:title>CaseStudy</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-john-freerksen</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-assessment-tool-and-why-its-important</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberSecurityAssessment.png</image:loc><image:caption>CyberSecurityAssessment</image:caption><image:title>CyberSecurityAssessment</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/experts-why-card-not-present-fraud-is-up-30</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/introducing-errica-padgett-the-newest-member-of-the-bedel-security-team</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Errica_Headshot_Thumbnail.jpg</image:loc><image:caption>ErricaHeadshotThumbnail</image:caption><image:title>ErricaHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/MeetTheNewestMember.jpg</image:loc><image:caption>MeetTheNewestMember</image:caption><image:title>MeetTheNewestMember</image:title></image:image><lastmod>2020-11-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-scare-of-miscellaneous-errors</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/DiscussionsTriggeredFrom.jpg</image:loc><image:caption>DiscussionsTriggeredFrom</image:caption><image:title>DiscussionsTriggeredFrom</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-andrew-hernandez</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BlogAnnouncement_CorySenior.jpg</image:loc><image:caption>BlogAnnouncementCorySenior</image:caption><image:title>BlogAnnouncementCorySenior</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_AndrewHernandez.jpg</image:loc><image:caption>NewHireAndrewHernandez</image:caption><image:title>NewHireAndrewHernandez</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JFreerksen_NewHire_BlogAnnouncement.jpg</image:loc><image:caption>JFreerksenNewHireBlogAnnouncement</image:caption><image:title>JFreerksenNewHireBlogAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/AndrewH_Headshot_Thumbnail.jpg</image:loc><image:caption>AndrewHHeadshotThumbnail</image:caption><image:title>AndrewHHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/mobile-device-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-Resilience-Against-Nation-State-Actors.jpg</image:loc><image:caption>BuildingResilienceAgainstNationStateActors</image:caption><image:title>BuildingResilienceAgainstNationStateActors</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/siem-challenges-security-team-isnt-receiving-valuable-insights</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-you-need-both-an-information-security-risk-assessment-and-a-framework-self-assessment</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Control-Assessments-Vs-Risk-Assessments.jpg</image:loc><image:caption>ControlAssessmentsVsRiskAssessments</image:caption><image:title>ControlAssessmentsVsRiskAssessments</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheRegularRiskAssessmentRevolution.jpg</image:loc><image:caption>TheRegularRiskAssessmentRevolution</image:caption><image:title>TheRegularRiskAssessmentRevolution</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Why-You-Need-Both-an-Information-Security-Risk-Assessment-and-a-Framework-Self-Assessment.jpg</image:loc><image:caption>WhyYouNeedBothanInformationSecurityRiskAssessmentandaFrameworkSelfAssessment</image:caption><image:title>WhyYouNeedBothanInformationSecurityRiskAssessmentandaFrameworkSelfAssessment</image:title></image:image><lastmod>2025-08-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-bank-ceo-manages-the-risks-of-doing-business-with-fintech</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/changing-how-vulnerabilities-are-audited</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-to-Manage-Vulnerabilities.jpg</image:loc><image:caption>HowtoManageVulnerabilities</image:caption><image:title>HowtoManageVulnerabilities</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Addressing-the-MOVEit-Vulnerability.jpg</image:loc><image:caption>AddressingtheMOVEitVulnerability</image:caption><image:title>AddressingtheMOVEitVulnerability</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/incidents-and-pandemics</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO_QA12.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 12: What happens when you have an incident with a vCISO? How does a pandemic affect vCISO services?</video:title><video:description>vCISO_QA12</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO_QA12.mp4</video:content_loc><video:duration>227</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Bank</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>Pandemic</video:tag><video:tag>Cybersecurity</video:tag><video:tag> Virtual CISO</video:tag><video:tag>CISO services</video:tag><video:tag>Incident</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answered%20Thumbnail%2012.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail12</image:caption><image:title>vCISOQuestionsAnsweredThumbnail12</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-to-change-your-virtual-ciso-or-how-to-avoid-it-to-begin-with</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/HowToChangeYourVirtualCISO.jpg</image:loc><image:caption>HowToChangeYourVirtualCISO</image:caption><image:title>HowToChangeYourVirtualCISO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-10-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/10-years-of-bedel-security-gratitude-growth-and-going-forward</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/10-Years-of-Bedel-Security-Gratitude%2c-Growth%2c-and-Going-Forward.jpg</image:loc><image:caption>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:caption><image:title>10YearsofBedelSecurityGratitudeGrowthandGoingForward</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ChangeConflictand-Culture.jpg</image:loc><image:caption>ChangeConflictandCulture</image:caption><image:title>ChangeConflictandCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/APlatformWontChange.jpg</image:loc><image:caption>APlatformWontChange</image:caption><image:title>APlatformWontChange</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-courtney-abbey</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Courtney_Oldham_Headshot_Thumbnail.jpg</image:loc><image:caption>CourtneyOldhamHeadshotThumbnail</image:caption><image:title>CourtneyOldhamHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Abbey_Sweetman_Headshot_Thumbnail.jpg</image:loc><image:caption>AbbeySweetmanHeadshotThumbnail</image:caption><image:title>AbbeySweetmanHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_Grace_Ryan.jpg</image:loc><image:caption>atechbackgroundwiththetitleWelcometotheBedelSecurityTeamGraceandRyan</image:caption><image:title>NewHireBlogAnnouncementGraceRyan</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ssae-16-ssae-18-whats-difference</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/business-continuity-planning</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/BusinessContinuity.png</image:loc><image:caption>BusinessContinuity</image:caption><image:title>BusinessContinuity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-07-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/training-your-board</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-09-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/r-sat-2.0-overview</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RSAT-2.0-Update.jpg</image:loc><image:caption>RSAT20Update</image:caption><image:title>RSAT20Update</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-10-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/report-everyone-should-get-a-security-freeze</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1WYTitX.png</image:loc><image:caption>1WYTitX</image:caption><image:title>1WYTitX</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/culture-counts</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CultureCounts-1.jpg</image:loc><image:caption>CultureCounts1</image:caption><image:title>CultureCounts1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-waning-days-of-the-cat-arrive</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Moving-from-the-CAT-to-CSF--A-More-Strategic-Path-for-Community-Financial-Institutions.jpg</image:loc><image:caption>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:caption><image:title>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/culture-of-security-critical-conversations</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Culture-of-Security-Critical-Conversations.jpg</image:loc><image:caption>CultureofSecurityCriticalConversations</image:caption><image:title>CultureofSecurityCriticalConversations</image:title></image:image><lastmod>2021-09-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/independent-collaboration-part-2-a-framework-for-outsourcing-it-in-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent%20Collaboration%20Table.jpg</image:loc><image:caption>IndependentCollaborationTable</image:caption><image:title>IndependentCollaborationTable</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent-Collaboration-Pt2.jpg</image:loc><image:caption>IndependentCollaborationPt2</image:caption><image:title>IndependentCollaborationPt2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-05-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/can-a-virtual-ciso-adjust-to-the-size-of-the-financial-institution</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA8.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions and Answers 08: Can a virtual CISO adjust to the size of the financial institution?</video:title><video:description>vCISO_QA8</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA8.mp4</video:content_loc><video:duration>283</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>Information Security</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO Services</video:tag><video:tag>Financial Institution</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2008.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail08</image:caption><image:title>vCISOQuestionsAnsweredThumbnail08</image:title></image:image><lastmod>2021-07-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/beware-equifax-based-phishing-schemes</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/PhishingAlert.jpg</image:loc><image:caption>PhishingAlert</image:caption><image:title>PhishingAlert</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/consider-the-importance-of-forensics-in-your-ransomware-response-plan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/control-assessments-vs.-risk-assessments</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Why-You-Need-Both-an-Information-Security-Risk-Assessment-and-a-Framework-Self-Assessment.jpg</image:loc><image:caption>WhyYouNeedBothanInformationSecurityRiskAssessmentandaFrameworkSelfAssessment</image:caption><image:title>WhyYouNeedBothanInformationSecurityRiskAssessmentandaFrameworkSelfAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/IsYourRiskAssessmentA&amp;AReady.jpg</image:loc><image:caption>IsYourRiskAssessmentAAReady</image:caption><image:title>IsYourRiskAssessmentAAReady</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Control-Assessments-Vs-Risk-Assessments.jpg</image:loc><image:caption>ControlAssessmentsVsRiskAssessments</image:caption><image:title>ControlAssessmentsVsRiskAssessments</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheRegularRiskAssessmentRevolution.jpg</image:loc><image:caption>TheRegularRiskAssessmentRevolution</image:caption><image:title>TheRegularRiskAssessmentRevolution</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2024-07-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/two-essential-ingredients-to-improve-your-information-security-program</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA4.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions &amp; Answers 04</video:title><video:description>How do vCISO services work? And how involved does the F.I. staff need to be?</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA4.mp4</video:content_loc><video:duration>219</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>vCISO services</video:tag><video:tag>outsourced CISO</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag></video:video><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA6_.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions and Answers 06: Who should consider a vCISO? Is it a new concept? What happens when an F.I. with a vCISO wants to hire an in-house CISO?</video:title><video:description>In today's video, we answer: Who should consider a vCISO? Is it a new concept? What happens when an F.I. with a vCISO wants to hire an in-house CISO?</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA6_.mp4</video:content_loc><video:duration>274</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>FI</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>ISP</video:tag><video:tag>Cybersecurity</video:tag><video:tag>virtual CISO</video:tag><video:tag>in-house CISO</video:tag><video:tag>Information Security Program</video:tag><video:tag>CU</video:tag><video:tag>succession planning</video:tag><video:tag>Banks</video:tag><video:tag>CISO services</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA8.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Questions and Answers 08: Can a virtual CISO adjust to the size of the financial institution?</video:title><video:description>vCISO_QA8</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA8.mp4</video:content_loc><video:duration>283</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>Information Security</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO Services</video:tag><video:tag>Financial Institution</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answers%20Thumbnail%2004.jpg</image:loc><image:caption>vCISOQuestionsAnswersThumbnail04</image:caption><image:title>vCISOQuestionsAnswersThumbnail04</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2008.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail08</image:caption><image:title>vCISOQuestionsAnsweredThumbnail08</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2006.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail06</image:caption><image:title>vCISOQuestionsAnsweredThumbnail06</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/internal-vs.-external-cyber-threats</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Extending-Security-Controls-Beyond-the-Office.jpg</image:loc><image:caption>ExtendingSecurityControlsBeyondtheOffice</image:caption><image:title>ExtendingSecurityControlsBeyondtheOffice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Internal-vs.-External-Cyber-Threats.jpg</image:loc><image:caption>Teamofprofessionalsworkingatcomputersinamodernofficerepresentinginternalcybersecurityriskandgovernanceforcommunitybanks</image:caption><image:title>InternalvsExternalCyberThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Blocking-Outbound-Communications.jpg</image:loc><image:caption>BlockingOutboundCommunications</image:caption><image:title>BlockingOutboundCommunications</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-01-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/measuring-cybersecurity-that-matters-kris-every-financial-institution-should-track</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/A-Strong-Defense-Wins-Championships.jpg</image:loc><image:caption>AStrongDefenseWinsChampionships</image:caption><image:title>AStrongDefenseWinsChampionships</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Key-Risk-Indicators--Your-Early-Warning.jpg</image:loc><image:caption>KeyRiskIndicatorsYourEarlyWarning</image:caption><image:title>KeyRiskIndicatorsYourEarlyWarning</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><lastmod>2025-10-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/top-5-ways-cybercriminals-are-exploiting-covid-19</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Top5WaysCyberCriminalsExploitCOV19.jpg</image:loc><image:caption>Top5WaysCyberCriminalsExploitCOV19</image:caption><image:title>Top5WaysCyberCriminalsExploitCOV19</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-04-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/decoding-cyber-insurance-how-to-untwist-the-knots-in-your-policy-review</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Decoding-Cyber-Insurance-How-to.jpg</image:loc><image:caption>DecodingCyberInsuranceHowto</image:caption><image:title>DecodingCyberInsuranceHowto</image:title></image:image><lastmod>2024-09-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-what-the-best-banks-do-to-protect-themselves</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/should-banks-expect-new-cybersecurity-guidance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/inside-the-competitive-testing-battlefield-of-endpoint-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-grace-ryan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_Grace_Ryan.jpg</image:loc><image:caption>atechbackgroundwiththetitleWelcometotheBedelSecurityTeamGraceandRyan</image:caption><image:title>NewHireBlogAnnouncementGraceRyan</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ROtto_Round_2025.png</image:loc><image:caption>ROttoRound2025</image:caption><image:title>ROttoRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/GKim_Round_2025.png</image:loc><image:caption>GKimRound2025</image:caption><image:title>GKimRound2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><lastmod>2025-12-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/does-your-change-management-process-need-a-conversion</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Demystifying-Policy-Procedures-and-Standards.jpg</image:loc><image:caption>DemystifyingPolicyProceduresandStandards</image:caption><image:title>DemystifyingPolicyProceduresandStandards</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/ThePolicyLabrynth.jpg</image:loc><image:caption>ThePolicyLabrynth</image:caption><image:title>ThePolicyLabrynth</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/banks-credit-unions-and-ai-oh-my-beyond-cybersecurity-ai-danger</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Banks%2c-Credit-Unions%2c-and-AI%2c-OH-MY_P2.jpg</image:loc><image:caption>BanksCreditUnionsandAIOHMYP2</image:caption><image:title>BanksCreditUnionsandAIOHMYP2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-08-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/independent-collaboration-part-1-a-concept-for-outsourcing-it-in-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/IndependentCollab_P1.jpg</image:loc><image:caption>IndependentCollabP1</image:caption><image:title>IndependentCollabP1</image:title></image:image><lastmod>2021-04-16</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/77-of-banks-surveyed-list-cybersecurity-as-an-area-of-concern-ciso-plays-important-role</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/thank-you-2024</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Thank_you.jpg</image:loc><image:caption>Thankyou</image:caption><image:title>Thankyou</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-11-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/happy-thanksgiving</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Thank_you.jpg</image:loc><image:caption>Thankyou</image:caption><image:title>Thankyou</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/self-assessing-authentication-access-risk</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Self-Assessing-Authentication-&amp;-Access-Risk.jpg</image:loc><image:caption>SelfAssessingAuthenticationAccessRisk</image:caption><image:title>SelfAssessingAuthenticationAccessRisk</image:title></image:image><lastmod>2022-11-04</lastmod></url><url><loc>https://www.bedelsecurity.com/services/the-ciso-assesment</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/CISOAssessment_PagePhoto.jpg</image:loc><image:caption>AcommunitybankCTOreadingaCISOAssessmentReport</image:caption><image:title>CISOAssessmentPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Bedel_Security_April2018/Images/HelpingHand.jpg</image:loc><image:caption>HelpingHand</image:caption><image:title>HelpingHand</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/CISOAssessment_Hero.jpg</image:loc><image:caption>AvCISOhandingoveraCISOAssessmentReport</image:caption><image:title>CISOAssessmentHero</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-soft-skills-every-ciso-should-have</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Soft-Skills-Every-CISO-Should-Have.jpg</image:loc><image:caption>5SoftSkillsEveryCISOShouldHave</image:caption><image:title>5SoftSkillsEveryCISOShouldHave</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-09-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/holiday-scams</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/HolidayScams.jpg</image:loc><image:caption>HolidayScams</image:caption><image:title>HolidayScams</image:title></image:image><lastmod>2023-11-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-ransomware-dying</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Is-Ransomware-Dying.jpg</image:loc><image:caption>IsRansomwareDying</image:caption><image:title>IsRansomwareDying</image:title></image:image><lastmod>2024-05-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/want-growth-focus-on-your-cybersecurity-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-02-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-3-key-roles-in-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/3Roles_Info2.png</image:loc><image:caption>3RolesInfo2</image:caption><image:title>3RolesInfo2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/3Roles_Info1.png</image:loc><image:caption>3RolesInfo1</image:caption><image:title>3RolesInfo1</image:title></image:image><lastmod>2020-01-24</lastmod></url><url><loc>https://www.bedelsecurity.com/faqs/</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/FAQ_Hero.jpg</image:loc><image:caption>Bankersataconferenceraisinghandstoaskquestions</image:caption><image:title>FAQHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Bedel_Security_April2018/Images/HandRaised.jpg</image:loc><image:caption>HandRaised</image:caption><image:title>HandRaised</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/congratulations-ep-senior-advisor</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Errica_Headshot_Thumbnail.jpg</image:loc><image:caption>ErricaHeadshotThumbnail</image:caption><image:title>ErricaHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ErricaPromotion_BlogAnnouncement.jpg</image:loc><image:caption>ErricaPromotionBlogAnnouncement</image:caption><image:title>ErricaPromotionBlogAnnouncement</image:title></image:image><lastmod>2023-09-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/should-financial-institutions-have-a-biso-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ShouldFinancialInstitutionsHaveBISOs.jpg</image:loc><image:caption>ShouldFinancialInstitutionsHaveBISOs</image:caption><image:title>ShouldFinancialInstitutionsHaveBISOs</image:title></image:image><lastmod>2023-02-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/effective-user-access-reviews</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Effective-User-Access-Reviews.jpg</image:loc><image:caption>EffectiveUserAccessReviews</image:caption><image:title>EffectiveUserAccessReviews</image:title></image:image><lastmod>2022-10-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/fdic-article-provides-insights-on-where-to-focus-your-efforts-on-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/guidance-on-obsolete-encryption-protocols</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/GuidanceOnObseleteEncryption.jpg</image:loc><image:caption>GuidanceOnObseleteEncryption</image:caption><image:title>GuidanceOnObseleteEncryption</image:title></image:image><lastmod>2021-01-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/artificial-intelligence-how-will-it-be-regulated</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Artificial-Intelligence--How-will-it-be-regulated.jpg</image:loc><image:caption>ArtificialIntelligenceHowwillitberegulated</image:caption><image:title>ArtificialIntelligenceHowwillitberegulated</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-06-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/are-cybercriminals-targeting-banks-with-ransomware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1Rqr9Hg.jpeg</image:loc><image:caption>1Rqr9Hg</image:caption><image:title>1Rqr9Hg</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-much-does-a-virtual-ciso-cost</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA7.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 07: What are the different forms of a virtual CISO and how much does a virtual CISO cost?</video:title><video:description>vCISO_QA7</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/vCISO_QA7.mp4</video:content_loc><video:duration>249</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>CISO as a service</video:tag><video:tag>Virtual CISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2007.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail07</image:caption><image:title>vCISOQuestionsAnsweredThumbnail07</image:title></image:image><lastmod>2021-07-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/corporate-account-takeovers</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CorporateAccountTakeover.jpg</image:loc><image:caption>CorporateAccountTakeover</image:caption><image:title>CorporateAccountTakeover</image:title></image:image><lastmod>2023-04-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-to-manage-vulnerabilities</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-to-Manage-Vulnerabilities.jpg</image:loc><image:caption>HowtoManageVulnerabilities</image:caption><image:title>HowtoManageVulnerabilities</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-02-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hacker-psychology</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Hacker-Psychology.jpg</image:loc><image:caption>HackerPsychology</image:caption><image:title>HackerPsychology</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-04-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-simple-steps-to-a-proactive-information-security-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ShouldFinancialInstitutionsHaveBISOs.jpg</image:loc><image:caption>ShouldFinancialInstitutionsHaveBISOs</image:caption><image:title>ShouldFinancialInstitutionsHaveBISOs</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Using-RACI-Charts-to-Strengthen-Risk-Management-and-InfoSec-Programs.jpg</image:loc><image:caption>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:caption><image:title>UsingRACIChartstoStrengthenRiskManagementandInfoSecPrograms</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><lastmod>2025-10-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/chargeback-relief-does-it-go-far-enough-is-it-fair-to-issuing-banks-2</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-things-you-need-to-know-about-social-engineering</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1Rqr6LJ.jpeg</image:loc><image:caption>1Rqr6LJ</image:caption><image:title>1Rqr6LJ</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cisas-ransomware-guide-takeaways</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CISAs-Cybersecurity-Performance-Goals.jpg</image:loc><image:caption>CISAsCybersecurityPerformanceGoals</image:caption><image:title>CISAsCybersecurityPerformanceGoals</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/QakbotMalware.jpg</image:loc><image:caption>QakbotMalware</image:caption><image:title>QakbotMalware</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hacker-leaks-customer-data-after-a-united-arab-emirates-bank-fails-to-pay-ransom</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/1PBwblj.jpeg</image:loc><image:caption>1PBwblj</image:caption><image:title>1PBwblj</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-should-you-look-for-in-a-provider</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4/medium.jpg</video:thumbnail_loc><video:title>What should you look for in a provider? What does a typical contract look like?</video:title><video:description>vCISO_QA13_1</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4</video:content_loc><video:duration>254</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2013.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail13</image:caption><image:title>vCISOQuestionsAnsweredThumbnail13</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-powerful-glba-board-report</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/FiveQuestions-YouShouldBeAskingAboutYourCybersecurityProgram.jpg</image:loc><image:caption>FiveQuestionsYouShouldBeAskingAboutYourCybersecurityProgram</image:caption><image:title>FiveQuestionsYouShouldBeAskingAboutYourCybersecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-a-Stronger-Phishing-Resilience-Culture.jpg</image:loc><image:caption>BuildingaStrongerPhishingResilienceCulture</image:caption><image:title>BuildingaStrongerPhishingResilienceCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/CrackingTheGLBACode.jpg</image:loc><image:caption>CrackingTheGLBACode</image:caption><image:title>CrackingTheGLBACode</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-things-i-learned-at-a-bank-it-conference</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/5ThingsILearnedAtABankIT.jpg</image:loc><image:caption>5ThingsILearnedAtABankIT</image:caption><image:title>5ThingsILearnedAtABankIT</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-04-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/much-cybersecurity-technology</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/surviving-the-post-pandemic-landscape-part-1</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/5-Steps-to-Utilizing-Key-Controls.jpg</image:loc><image:caption>5StepstoUtilizingKeyControls</image:caption><image:title>5StepstoUtilizingKeyControls</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/banks-credit-unions-and-ai-oh-my-unveiling-ai-risk-and-embracing-opportunities</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Banks%2c-Credit-Unions%2c-and-AI%2c-OH-MY_P1.jpg</image:loc><image:caption>BanksCreditUnionsandAIOHMYP1</image:caption><image:title>BanksCreditUnionsandAIOHMYP1</image:title></image:image><lastmod>2023-08-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/update-what-were-seeing-from-the-covid-19-pandemic-planning-front</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/UpdateOnCovid19.jpg</image:loc><image:caption>UpdateOnCovid19</image:caption><image:title>UpdateOnCovid19</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-04-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/new-ffiec-it-management-booklet-what-your-board-needs-to-know</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/FFIEC-Management-Handbook-2.png</image:loc><image:caption>FFIECManagementHandbook2</image:caption><image:title>FFIECManagementHandbook2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-things-you-needs-to-know-about-maze-ransomware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-01-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/does-a-virtual-ciso-need-vpn-access</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Q&amp;A%2010.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 10</video:title><video:description>vCISO Q&amp;A 10</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Q&amp;A%2010.mp4</video:content_loc><video:duration>224</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2010.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail10</image:caption><image:title>vCISOQuestionsAnsweredThumbnail10</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-cinda-reardon</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NewHire_Announcement_Cinda.jpg</image:loc><image:caption>NewHireAnnouncementCinda</image:caption><image:title>NewHireAnnouncementCinda</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Cinda_Headshot_Thumbnail300.jpg</image:loc><image:caption>CindaHeadshotThumbnail300</image:caption><image:title>CindaHeadshotThumbnail300</image:title></image:image><lastmod>2023-08-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/qakbot-malware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/QakbotMalware.jpg</image:loc><image:caption>QakbotMalware</image:caption><image:title>QakbotMalware</image:title></image:image><lastmod>2021-02-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/consumers-use-mobile-banking-but-dont-trust-it-with-reason</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/three-critical-challenges-for-bank-audit-committees-1-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bedel-security-hires-laura-zeck</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/LZ_Headshot_-e1493646722178.jpg</image:loc><image:caption>LZHeadshote1493646722178</image:caption><image:title>LZHeadshote1493646722178</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/WelcomeToTheTeam.jpg</image:loc><image:caption>WelcomeToTheTeam</image:caption><image:title>WelcomeToTheTeam</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-05-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-it-time-to-take-the-organization-of-your-information-security-program-to-the-next-level</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/OrganizationOfInfo.jpg</image:loc><image:caption>OrganizationOfInfo</image:caption><image:title>OrganizationOfInfo</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2016-09-02-at-9_24_07-AM.png</image:loc><image:caption>ScreenShot20160902at92407AM</image:caption><image:title>ScreenShot20160902at92407AM</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/why-we-built-the-baas-risk-checklist-and-what-were-hoping-to-learn</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-We-Built-The-BaaS-Risk-Checklist.jpg</image:loc><image:caption>WhyWeBuiltTheBaaSRiskChecklist</image:caption><image:title>WhyWeBuiltTheBaaSRiskChecklist</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NIST_CSF_2.0_Draft_Updates.jpg</image:loc><image:caption>NISTCSF20DraftUpdates</image:caption><image:title>NISTCSF20DraftUpdates</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Predictions-for-the-Future-of-Banking-as-a-Service.jpg</image:loc><image:caption>5PredictionsfortheFutureofBankingasaService</image:caption><image:title>5PredictionsfortheFutureofBankingasaService</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-07-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/independent-ciso-more-than-just-a-regulatory-requirement</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent-CISO_More-Than-Just-a-Regulatory-Requirement.jpg</image:loc><image:caption>IndependentCISOMoreThanJustaRegulatoryRequirement</image:caption><image:title>IndependentCISOMoreThanJustaRegulatoryRequirement</image:title></image:image><lastmod>2024-11-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/strengthening-the-fort</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/StrengtheningTheFort.jpg</image:loc><image:caption>StrengtheningTheFort</image:caption><image:title>StrengtheningTheFort</image:title></image:image><lastmod>2023-12-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ensuring-independence-in-your-virtual-ciso</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/EnsuringIndependence.jpg</image:loc><image:caption>EnsuringIndependence</image:caption><image:title>EnsuringIndependence</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/when-a-returned-wire-isnt-just-a-returned-wire</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/MoneyWire.jpg</image:loc><image:caption>MoneyWire</image:caption><image:title>MoneyWire</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/moving-from-the-cat-to-csf-a-more-strategic-path-for-community-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Moving-from-the-CAT-to-CSF--A-More-Strategic-Path-for-Community-Financial-Institutions.jpg</image:loc><image:caption>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:caption><image:title>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-10-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/you-have-1-year-to-have-a-qualified-ciso-on-staff-what-do-you-do-hint-think-virtual</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/MustHaveCISO_NY.jpg</image:loc><image:caption>MustHaveCISONY</image:caption><image:title>MustHaveCISONY</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2019-04-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-importance-of-social-media-monitoring</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-02-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/video-blog-ciso-intangibles-incremental-improvements</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/CISO%20Intangibles-%20Incremental%20Improvements.mp4/medium.jpg</video:thumbnail_loc><video:title>CISO Intangibles- Incremental Improvements</video:title><video:description>CISO Intangibles- Incremental Improvements</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Videos/CISO%20Intangibles-%20Incremental%20Improvements.mp4</video:content_loc><video:duration>174</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/IncrementalChanges.jpg</image:loc><image:caption>IncrementalChanges</image:caption><image:title>IncrementalChanges</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-06-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-does-it-mean-to-be-a-good-partner</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-04-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-quantum-threat</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Quantum-Computing-Another-Huge-Leap-in-Technology.jpg</image:loc><image:caption>QuantumComputingAnotherHugeLeapinTechnology</image:caption><image:title>QuantumComputingAnotherHugeLeapinTechnology</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Cracking-Codes-and-Crushing-Rocks.jpg</image:loc><image:caption>CrackingCodesandCrushingRocks</image:caption><image:title>CrackingCodesandCrushingRocks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The%20Quantum%20Threat.jpg</image:loc><image:caption>TheQuantumThreat</image:caption><image:title>TheQuantumThreat</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Five-Cybersecurity-Questions-Financial-Institutions-Should-Ask-Before-Year-End.jpg</image:loc><image:caption>FiveCybersecurityQuestionsFinancialInstitutionsShouldAskBeforeYearEnd</image:caption><image:title>FiveCybersecurityQuestionsFinancialInstitutionsShouldAskBeforeYearEnd</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-02-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/understanding-small-business-cyber-insurance-marketplace</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-perfect-meeting-agenda-to-improve-it-cyber-governance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-the-Relationship.jpg</image:loc><image:caption>ManagingtheRelationship</image:caption><image:title>ManagingtheRelationship</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-1-thing-that-is-getting-overlooked-by-banks-on-secure-email</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Icons/IndustryFocus_Small.png</image:loc><image:caption>IndustryFocusSmall</image:caption><image:title>IndustryFocusSmall</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/HomePage_CISOAssessment_PagePhoto.jpg</image:loc><image:caption>vCISOevaluatingclientriskassessmentandkeyriskindicatorreports</image:caption><image:title>HomePageCISOAssessmentPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/IBAT_logo_full_RGB_Tall.png</image:loc><image:caption>IBATlogofullRGBTall</image:caption><image:title>IBATlogofullRGBTall</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/HomePage_CISOMentor_PagePhoto.jpg</image:loc><image:caption>Securityleadersmeetingtoreviewcybersecuritystrategyandriskposture</image:caption><image:title>HomePageCISOMentorPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Banking%20Association%20Logos/CBA-OK-header-logo-small-03.png</image:loc><image:caption>CBAOKheaderlogosmall03</image:caption><image:title>CBAOKheaderlogosmall03</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Banking%20On%20Security-The%20Outsourced%20CISO%20Solution%202023.jpg</image:loc><image:caption>BankingOnSecurityTheOutsourcedCISOSolution2023</image:caption><image:title>BankingOnSecurityTheOutsourcedCISOSolution2023</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/IBA_Logo.png</image:loc><image:caption>IBALogo</image:caption><image:title>IBALogo</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Icons/TeamApproach_Small.png</image:loc><image:caption>TeamApproachSmall</image:caption><image:title>TeamApproachSmall</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/Bankers-Helping-Bankers.jpg</image:loc><image:caption>BankersHelpingBankers</image:caption><image:title>BankersHelpingBankers</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/WBA_logo-2015.png</image:loc><image:caption>WBAlogo2015</image:caption><image:title>WBAlogo2015</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Bedel_Security_April2018/Images/HomePage.jpg</image:loc><image:caption>HomePage</image:caption><image:title>HomePage</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/IndySkyline_BW_Hero.jpg</image:loc><image:caption>DowntownIndianapolisskylineinblackandwhitewithilluminatedcorporatebuildingsatsunset</image:caption><image:title>IndySkylineBWHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Banking%20Association%20Logos/cbi_primary_logo_full_color_rgb.svg</image:loc><image:caption>cbiprimarylogofullcolorrgb</image:caption><image:title>cbiprimarylogofullcolorrgb</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-AI-Bias.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconunderstandingAIbias</image:caption><image:title>UnderstandingAIBias</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-a-Stronger-Phishing-Resilience-Culture.jpg</image:loc><image:caption>BuildingaStrongerPhishingResilienceCulture</image:caption><image:title>BuildingaStrongerPhishingResilienceCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/CySPOT%C2%AE%20copy.png</image:loc><image:caption>CySPOTcopy</image:caption><image:title>CySPOTcopy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/BankIn_Logo%20Main.png</image:loc><image:caption>BankInLogoMain</image:caption><image:title>BankInLogoMain</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/HomePage_vCISOServices_Pagephoto.jpg</image:loc><image:caption>BusinessexecutivesengagedinaremotecybersecuritystrategymeetingwithvirtualCISOs</image:caption><image:title>HomePagevCISOServicesPagephoto</image:title></image:image><lastmod>2026-02-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/amendment-to-the-annual-privacy-notice-requirement-under-the-gramm-leach-bliley-act-regulation-p</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/questions-you-should-be-asking-your-internet-banking-provider</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-04-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-vciso-as-a-business-enabler</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-vCISO-as-a-Business-Enabler.jpg</image:loc><image:caption>ThevCISOasaBusinessEnabler</image:caption><image:title>ThevCISOasaBusinessEnabler</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-08-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/demystifying-policy-procedures-and-standards-understanding-the-differences-matters</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Demystifying-Policy-Procedures-and-Standards.jpg</image:loc><image:caption>DemystifyingPolicyProceduresandStandards</image:caption><image:title>DemystifyingPolicyProceduresandStandards</image:title></image:image><lastmod>2023-08-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-is-a-ciso-and-what-is-the-difference-between-an-iso-and-a-ciso</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA_1WhatIsACISO.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Question and Answers: What is a CISO and what is the difference between an ISO and a CISO?</video:title><video:description>What is a CISO and what is the difference between an ISO and a CISO? Join us in our vCISO questions and answers series to find out!</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA_1WhatIsACISO.mp4</video:content_loc><video:duration>144</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Officer</video:tag><video:tag>Information Security Program</video:tag><video:tag>Financial Institutions</video:tag><video:tag>ISO</video:tag><video:tag>Credit Unions</video:tag><video:tag>CISO services</video:tag><video:tag>Chief Information Security Officer</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag><video:tag>Risk Management</video:tag><video:tag>Community Banks</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail.png</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail</image:caption><image:title>vCISOQuestionsAnsweredThumbnail</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/case-study-gnb-bank</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Ask-the-Right-Question-to-Build-your-Information-Security-Program.jpg</image:loc><image:caption>AsktheRightQuestiontoBuildyourInformationSecurityProgram</image:caption><image:title>AsktheRightQuestiontoBuildyourInformationSecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CaseStudy_BlogVersion.jpg</image:loc><image:caption>CaseStudyBlogVersion</image:caption><image:title>CaseStudyBlogVersion</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/FNTN_Case-Study.jpg</image:loc><image:caption>FNTNCaseStudy</image:caption><image:title>FNTNCaseStudy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><lastmod>2025-07-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-message-to-vendors</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AMessageToVendors.jpg</image:loc><image:caption>AMessageToVendors</image:caption><image:title>AMessageToVendors</image:title></image:image><lastmod>2021-06-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/insider-cybersecurity-threats-what-financial-institutions-need-to-know</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Insider-Cybersecurity-Threats-What-Financial-Institutions.jpg</image:loc><image:caption>InsiderCybersecurityThreatsWhatFinancialInstitutions</image:caption><image:title>InsiderCybersecurityThreatsWhatFinancialInstitutions</image:title></image:image><lastmod>2023-05-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ron-ross-promotes-new-infosec-approach</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/case-study-first-national-bank-of-pulaski</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CaseStudy_BlogVersion.jpg</image:loc><image:caption>CaseStudyBlogVersion</image:caption><image:title>CaseStudyBlogVersion</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Changing-Regulatory-Landscape.jpg</image:loc><image:caption>ExecutivesdiscussingITandcybersecuritycomplianceinchangingregulatoryenvironment</image:caption><image:title>ChangingRegulatoryLandscape</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Self-Assessing-Authentication-&amp;-Access-Risk.jpg</image:loc><image:caption>SelfAssessingAuthenticationAccessRisk</image:caption><image:title>SelfAssessingAuthenticationAccessRisk</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/FNTN_Case-Study.jpg</image:loc><image:caption>FNTNCaseStudy</image:caption><image:title>FNTNCaseStudy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-01-08</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/5-subjects-new-to-the-ffiec-aio-booklet</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AIOManual.jpg</image:loc><image:caption>AIOManual</image:caption><image:title>AIOManual</image:title></image:image><lastmod>2022-09-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/announcing-the-release-of-our-first-white-paper</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4/medium.jpg</video:thumbnail_loc><video:title>Can vCISO services be done remotely? How often does a vCISO come on-site?</video:title><video:description>vCISO_QA9</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4</video:content_loc><video:duration>278</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>CUs</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Remote</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag><video:tag>virtual CISO</video:tag></video:video><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA11.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 11: How does a vCISO interact with other outsourced managed providers?</video:title><video:description>vCISO_QA11</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA11.mp4</video:content_loc><video:duration>291</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Outsourced Core</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Managed IT Provider</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Cybersecurity</video:tag><video:tag>IT</video:tag><video:tag>CISO</video:tag></video:video><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4/medium.jpg</video:thumbnail_loc><video:title>What do examiners say? What kind of due diligence should we do on a vCISO?</video:title><video:description>vCISO_QA14</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4</video:content_loc><video:duration>228</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Examiners</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>CISO services</video:tag><video:tag>Due Diligence</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answered%20Thumbnail%2009.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail09</image:caption><image:title>vCISOQuestionsAnsweredThumbnail09</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2014.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail14</image:caption><image:title>vCISOQuestionsAnsweredThumbnail14</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2011.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail11</image:caption><image:title>vCISOQuestionsAnsweredThumbnail11</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Whitepaper_Cover.jpg</image:loc><image:caption>WhitepaperCover</image:caption><image:title>WhitepaperCover</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/a-letter-to-community-financial-institutions-on-surviving-the-post-pandemic-landscape</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/information-security-strategy-5-tips-for-success</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/ThePolicyLabrynth.jpg</image:loc><image:caption>ThePolicyLabrynth</image:caption><image:title>ThePolicyLabrynth</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/UnderstandingYourInfoSecurityLayers.jpg</image:loc><image:caption>UnderstandingYourInfoSecurityLayers</image:caption><image:title>UnderstandingYourInfoSecurityLayers</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/about/</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BedelSecurity-AboutUs-V1%20(2).mp4/medium.jpg</video:thumbnail_loc><video:title>About Bedel Security®</video:title><video:description>Learn more about how Bedel Security® delivers unmatched virtual CISO services to community banks and credit unions.</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BedelSecurity-AboutUs-V1%20(2).mp4</video:content_loc><video:duration>116</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>AboutBedelSecurity®</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>FinancialInstitutions</video:tag><video:tag>VirtualCISO</video:tag><video:tag>CreditUnions</video:tag><video:tag>Cybersecurity</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ADarnall_2026.jpg</image:loc><image:caption>ADarnall2026</image:caption><image:title>ADarnall2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ROtto_2025.jpg</image:loc><image:caption>ROtto2025</image:caption><image:title>ROtto2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CBedel_2025.jpg</image:loc><image:caption>CBedel2025</image:caption><image:title>CBedel2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CWilliams_2025.jpg</image:loc><image:caption>CWilliams2025</image:caption><image:title>CWilliams2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JBailey_2025.jpg</image:loc><image:caption>JBailey2025</image:caption><image:title>JBailey2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/MLester_2025.jpg</image:loc><image:caption>MLester2025</image:caption><image:title>MLester2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/TDurkin_2025.jpg</image:loc><image:caption>TDurkin2025</image:caption><image:title>TDurkin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/HThompson_2025.jpg</image:loc><image:caption>HThompson2025</image:caption><image:title>HThompson2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JFreerksen_2025.jpg</image:loc><image:caption>JFreerksen2025</image:caption><image:title>JFreerksen2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CMcGinnis_2025.jpg</image:loc><image:caption>CMcGinnis2025</image:caption><image:title>CMcGinnis2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/GKim_2025.jpg</image:loc><image:caption>GKim2025</image:caption><image:title>GKim2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/CPoupore_2025.jpg</image:loc><image:caption>CPoupore2025</image:caption><image:title>CPoupore2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/SMiller_2026.jpg</image:loc><image:caption>SMiller2026</image:caption><image:title>SMiller2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/LZeck_2025.jpg</image:loc><image:caption>LZeck2025</image:caption><image:title>LZeck2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/AHernandez_2025.jpg</image:loc><image:caption>AHernandez2025</image:caption><image:title>AHernandez2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/SGoetz_2025.jpg</image:loc><image:caption>SGoetz2025</image:caption><image:title>SGoetz2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/EPagett_2025.jpg</image:loc><image:caption>EPagett2025</image:caption><image:title>EPagett2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/JRosiak_2025.jpg</image:loc><image:caption>JRosiak2025</image:caption><image:title>JRosiak2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/TJohnson_2025-1.jpg</image:loc><image:caption>TJohnson20251</image:caption><image:title>TJohnson20251</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/BPetzold_2025.jpg</image:loc><image:caption>BPetzold2025</image:caption><image:title>BPetzold2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/KSmith_2025.jpg</image:loc><image:caption>KSmith2025</image:caption><image:title>KSmith2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots%202025/ASweetmant_2025.jpg</image:loc><image:caption>ASweetmant2025</image:caption><image:title>ASweetmant2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Bedel_Security_April2018/Images/TeamworkOffice.jpg</image:loc><image:caption>TeamworkOffice</image:caption><image:title>TeamworkOffice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Website%202024/GroupPhoto_2025_Bedel_0012_BW.jpg</image:loc><image:caption>GroupPhoto2025Bedel0012BW</image:caption><image:title>GroupPhoto2025Bedel0012BW</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-alex-and-cory</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_AlexCory.jpg</image:loc><image:caption>NewHireBlogAnnouncementAlexCory</image:caption><image:title>NewHireBlogAnnouncementAlexCory</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Cory_Headshot_Thumbnail300.jpg</image:loc><image:caption>CoryHeadshotThumbnail300</image:caption><image:title>CoryHeadshotThumbnail300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-11-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ffiec-cyber-tool-needs-urgent-revamp</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/building-a-stronger-phishing-resilience-culture</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Phishing-but-make-it-AI.jpg</image:loc><image:caption>PhishingbutmakeitAI</image:caption><image:title>PhishingbutmakeitAI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-a-Stronger-Phishing-Resilience-Culture.jpg</image:loc><image:caption>BuildingaStrongerPhishingResilienceCulture</image:caption><image:title>BuildingaStrongerPhishingResilienceCulture</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/AI-Driven-Phishing-Scams.jpg</image:loc><image:caption>AIDrivenPhishingScams</image:caption><image:title>AIDrivenPhishingScams</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Does-Simulated-Phishing-Training-Actually-Work--.jpg</image:loc><image:caption>DoesSimulatedPhishingTrainingActuallyWork</image:caption><image:title>DoesSimulatedPhishingTrainingActuallyWork</image:title></image:image><lastmod>2026-03-20</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/thankful</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4/medium.jpg</video:thumbnail_loc><video:title>What should you look for in a provider? What does a typical contract look like?</video:title><video:description>vCISO_QA13_1</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4</video:content_loc><video:duration>254</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag></video:video><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4/medium.jpg</video:thumbnail_loc><video:title>What do examiners say? What kind of due diligence should we do on a vCISO?</video:title><video:description>vCISO_QA14</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA14.mp4</video:content_loc><video:duration>228</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Examiners</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>CISO services</video:tag><video:tag>Due Diligence</video:tag><video:tag>CISO</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2013.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail13</image:caption><image:title>vCISOQuestionsAnsweredThumbnail13</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2014.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail14</image:caption><image:title>vCISOQuestionsAnsweredThumbnail14</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/what-is-a-good-password-length</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Password-Reuse.jpg</image:loc><image:caption>PasswordReuse</image:caption><image:title>PasswordReuse</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-Three-Lines-of-Defense.jpg</image:loc><image:caption>TheThreeLinesofDefense</image:caption><image:title>TheThreeLinesofDefense</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Control-Assessments-Vs-Risk-Assessments.jpg</image:loc><image:caption>ControlAssessmentsVsRiskAssessments</image:caption><image:title>ControlAssessmentsVsRiskAssessments</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/What-is-a-Good-Password-Length.jpg</image:loc><image:caption>WhatisaGoodPasswordLength</image:caption><image:title>WhatisaGoodPasswordLength</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2023-10-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/multifactor-authentication-for-domain-admins-start-preparing-now</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-ai-will-impact-information-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/CrackingTheGLBACode.jpg</image:loc><image:caption>CrackingTheGLBACode</image:caption><image:title>CrackingTheGLBACode</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/How-AI-will-impact-Information-Security.jpg</image:loc><image:caption>HowAIwillimpactInformationSecurity</image:caption><image:title>HowAIwillimpactInformationSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/AI-Model-Risk-Management-in-Financial-Institutions.jpg</image:loc><image:caption>AIModelRiskManagementinFinancialInstitutions</image:caption><image:title>AIModelRiskManagementinFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-04-11</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-to-manage-a-ciso-to-avoid-burnout</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-to-Manage-a-CISO-to-Avoid-Burnout.jpg</image:loc><image:caption>HowtoManageaCISOtoAvoidBurnout</image:caption><image:title>HowtoManageaCISOtoAvoidBurnout</image:title></image:image><lastmod>2023-07-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/equifax-deserves-corporate-death-penalty</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/EquifaxDeathPenalty.jpg</image:loc><image:caption>EquifaxDeathPenalty</image:caption><image:title>EquifaxDeathPenalty</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/krebs-lifting-a-freeze-to-enable-credit-monitoring-is-like-crazy</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/opmoffices.png</image:loc><image:caption>opmoffices</image:caption><image:title>opmoffices</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-1-thing-you-can-do-to-improve-your-cybersecurity-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The1ThingYouCanDo.jpg</image:loc><image:caption>The1ThingYouCanDo</image:caption><image:title>The1ThingYouCanDo</image:title></image:image><lastmod>2023-01-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/building-resilience-against-nation-state-actors</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Self-Assessing-Authentication-&amp;-Access-Risk.jpg</image:loc><image:caption>SelfAssessingAuthenticationAccessRisk</image:caption><image:title>SelfAssessingAuthenticationAccessRisk</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Building-Resilience-Against-Nation-State-Actors.jpg</image:loc><image:caption>BuildingResilienceAgainstNationStateActors</image:caption><image:title>BuildingResilienceAgainstNationStateActors</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-07-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/if-everything-is-important</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/If-everything-is-important.jpg</image:loc><image:caption>Ifeverythingisimportant</image:caption><image:title>Ifeverythingisimportant</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/bedel-careers</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/Careers_Hero.jpg</image:loc><image:caption>ApplicantswaitingtoapplyforBedelSecurityopenposition</image:caption><image:title>CareersHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/HeaderPhotos/Careers2.jpg</image:loc><image:caption>Careers2</image:caption><image:title>Careers2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/think-outside-the-inbox-combating-modern-social-engineering-threats</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Protecting-Against-AI-Driven-Cyber-Threats.jpg</image:loc><image:caption>ProtectingAgainstAIDrivenCyberThreats</image:caption><image:title>ProtectingAgainstAIDrivenCyberThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Think-outside-the-Inbox-Combating-Modern-Social-Engineering-Threats.jpg</image:loc><image:caption>ThinkoutsidetheInboxCombatingModernSocialEngineeringThreats</image:caption><image:title>ThinkoutsidetheInboxCombatingModernSocialEngineeringThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Humans-vs.-Artificial-Intelligence--Who-is-the-better-phishe.jpg</image:loc><image:caption>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:caption><image:title>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Rising-Insider-Threats--Causes-and-Countermeasures.jpg</image:loc><image:caption>RisingInsiderThreatsCausesandCountermeasures</image:caption><image:title>RisingInsiderThreatsCausesandCountermeasures</image:title></image:image><lastmod>2025-10-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-an-internal-penetration-test-now-more-important-than-an-external-pen-test</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/PenetrationTest.jpg</image:loc><image:caption>PenetrationTest</image:caption><image:title>PenetrationTest</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/board-cyber-awareness</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BoardCyberAwareness.jpg</image:loc><image:caption>BoardCyberAwareness</image:caption><image:title>BoardCyberAwareness</image:title></image:image><lastmod>2022-12-30</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-awareness-month-is-around-the-corner-is-your-financial-institution-ready</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-Awareness-Month.jpg</image:loc><image:caption>CybersecurityAwarenessMonth</image:caption><image:title>CybersecurityAwarenessMonth</image:title></image:image><lastmod>2023-09-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/4-of-top-5-it-certifications-are-security-related</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-new-isos-playbook</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/The-New-ISOs-Playbook.jpg</image:loc><image:caption>TheNewISOsPlaybook</image:caption><image:title>TheNewISOsPlaybook</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-01-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/from-compliance-to-confidence</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-the-FFIEC-CAT-Isnt-Your-Risk-Assessment.jpg</image:loc><image:caption>WhytheFFIECCATIsntYourRiskAssessment</image:caption><image:title>WhytheFFIECCATIsntYourRiskAssessment</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/From-Compliance-to-Confidence.jpg</image:loc><image:caption>FromCompliancetoConfidence</image:caption><image:title>FromCompliancetoConfidence</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><lastmod>2025-05-16</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/inherent-and-residual-risk</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/IsYourRiskAssessmentA&amp;AReady.jpg</image:loc><image:caption>IsYourRiskAssessmentAAReady</image:caption><image:title>IsYourRiskAssessmentAAReady</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Control-Assessments-Vs-Risk-Assessments.jpg</image:loc><image:caption>ControlAssessmentsVsRiskAssessments</image:caption><image:title>ControlAssessmentsVsRiskAssessments</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/In-a-World-of-Emerging-Technology-One-Truth-Remains.jpg</image:loc><image:caption>InaWorldofEmergingTechnologyOneTruthRemains</image:caption><image:title>InaWorldofEmergingTechnologyOneTruthRemains</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/learning-not-to-trust</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ZeroTrust.jpg</image:loc><image:caption>ZeroTrust</image:caption><image:title>ZeroTrust</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ask-the-right-question</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Ask-the-Right-Question-to-Build-your-Information-Security-Program.jpg</image:loc><image:caption>AsktheRightQuestiontoBuildyourInformationSecurityProgram</image:caption><image:title>AsktheRightQuestiontoBuildyourInformationSecurityProgram</image:title></image:image><lastmod>2024-03-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/implement-practical-processes-policies-improve-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/SimplifyingPolicy.jpg</image:loc><image:caption>SimplifyingPolicy</image:caption><image:title>SimplifyingPolicy</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-josephine</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NewHire_BlogAnnouncement_Josephine.jpg</image:loc><image:caption>NewHireBlogAnnouncementJosephine</image:caption><image:title>NewHireBlogAnnouncementJosephine</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Headshot_JosephineBailey_2024.png</image:loc><image:caption>HeadshotJosephineBailey2024</image:caption><image:title>HeadshotJosephineBailey2024</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-04-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/controlling-sensitive-files-outside-your-institution</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-to-Manage-a-CISO-to-Avoid-Burnout.jpg</image:loc><image:caption>HowtoManageaCISOtoAvoidBurnout</image:caption><image:title>HowtoManageaCISOtoAvoidBurnout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/herding-cats</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Moving-from-the-CAT-to-CSF--A-More-Strategic-Path-for-Community-Financial-Institutions.jpg</image:loc><image:caption>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:caption><image:title>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-your-outsourced-it-provider</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/IndependentCollab_P1.jpg</image:loc><image:caption>IndependentCollabP1</image:caption><image:title>IndependentCollabP1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Trust-But-Verify.jpg</image:loc><image:caption>Businesshandshakeillustratingtrustandverificationinmanagedsecurityservices</image:caption><image:title>TrustButVerify</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/managing-bank-wide-change-why-cybersecurity-should-lead-the-conversation</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Measuring-Cybersecurity-That-Matters--KRIs-Every-Financial-Institution-Should-Track.jpg</image:loc><image:caption>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:caption><image:title>MeasuringCybersecurityThatMattersKRIsEveryFinancialInstitutionShouldTrack</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-10-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/russian-cyberthreats</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RussianCyberthreats.jpg</image:loc><image:caption>RussianCyberthreats</image:caption><image:title>RussianCyberthreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-02-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/introducing-the-newest-member-of-the-bedel-security-team-kmsith</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Kenyatta_Headshot_BW_Thumbnail2.jpg</image:loc><image:caption>KenyattaHeadshotBWThumbnail2</image:caption><image:title>KenyattaHeadshotBWThumbnail2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/KSmith_Announcement.jpg</image:loc><image:caption>KSmithAnnouncement</image:caption><image:title>KSmithAnnouncement</image:title></image:image><lastmod>2021-10-29</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-bedel-security-team-hunter-thompson</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_BlogAnnouncement_HThompson.jpg</image:loc><image:caption>NewHireBlogAnnouncementHThompson</image:caption><image:title>NewHireBlogAnnouncementHThompson</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Abbey_Courtney_New%20Hire%20Announcement.jpg</image:loc><image:caption>AbbeyCourtneyNewHireAnnouncement</image:caption><image:title>AbbeyCourtneyNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/HThompson.jpeg</image:loc><image:caption>HThompson</image:caption><image:title>HThompson</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/New%20Hire%20Announcement_Shane.jpg</image:loc><image:caption>NewHireAnnouncementShane</image:caption><image:title>NewHireAnnouncementShane</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ADarnall_New%20Hire%20Announcement.jpg</image:loc><image:caption>ADarnallNewHireAnnouncement</image:caption><image:title>ADarnallNewHireAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/thankful-2022</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Stephanie_Headshot_Thumbnail.jpg</image:loc><image:caption>StephanieHeadshotThumbnail</image:caption><image:title>StephanieHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Kenyatta_Headshot_BW_Thumbnail2.jpg</image:loc><image:caption>KenyattaHeadshotBWThumbnail2</image:caption><image:title>KenyattaHeadshotBWThumbnail2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Errica_Headshot_Thumbnail.jpg</image:loc><image:caption>ErricaHeadshotThumbnail</image:caption><image:title>ErricaHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Phishing.jpg</image:loc><image:caption>Phishing</image:caption><image:title>Phishing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Cory_Headshot_Thumbnail300.jpg</image:loc><image:caption>CoryHeadshotThumbnail300</image:caption><image:title>CoryHeadshotThumbnail300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Brian_Headshot_Thumbnail.jpg</image:loc><image:caption>BrianHeadshotThumbnail</image:caption><image:title>BrianHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Thankfukl.jpg</image:loc><image:caption>Thankfukl</image:caption><image:title>Thankfukl</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Jordan_Headshot_Thumbnail300.jpg</image:loc><image:caption>JordanHeadshotThumbnail300</image:caption><image:title>JordanHeadshotThumbnail300</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Chris_Headshot_Thumbnail.jpg</image:loc><image:caption>ChrisHeadshotThumbnail</image:caption><image:title>ChrisHeadshotThumbnail</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Headshots/Trisha_Headshot_Thumbnail_BW.jpg</image:loc><image:caption>TrishaHeadshotThumbnailBW</image:caption><image:title>TrishaHeadshotThumbnailBW</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Thank_you.jpg</image:loc><image:caption>Thankyou</image:caption><image:title>Thankyou</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2022-11-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/where-will-the-smart-money-be-going-in-bank-cybersecurity-in-2025</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Why-Governance-Matters-What-CISA-Updated-CPGs-Means-for-FIs.jpg</image:loc><image:caption>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:caption><image:title>WhyGovernanceMattersWhatCISAUpdatedCPGsMeansforFIs</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Integris-F5--Banking-IT-Spend_v2.jpg</image:loc><image:caption>IntegrisF5BankingITSpendv2</image:caption><image:title>IntegrisF5BankingITSpendv2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Where-Does-Managing-Aggregator-Risk-Belong.jpg</image:loc><image:caption>WhereDoesManagingAggregatorRiskBelong</image:caption><image:title>WhereDoesManagingAggregatorRiskBelong</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/JeremyPogue_Integris.png</image:loc><image:caption>JeremyPogueIntegris</image:caption><image:title>JeremyPogueIntegris</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2025-02-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-resolutions-for-the-new-year</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-01-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/national-insider-threat-awareness-month</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Rising-Insider-Threats--Causes-and-Countermeasures.jpg</image:loc><image:caption>RisingInsiderThreatsCausesandCountermeasures</image:caption><image:title>RisingInsiderThreatsCausesandCountermeasures</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RussianCyberthreats.jpg</image:loc><image:caption>RussianCyberthreats</image:caption><image:title>RussianCyberthreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Insider-Cybersecurity-Threats-What-Financial-Institutions.jpg</image:loc><image:caption>InsiderCybersecurityThreatsWhatFinancialInstitutions</image:caption><image:title>InsiderCybersecurityThreatsWhatFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cyber-hygiene-isnt-optional</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Lessons-Learned-from-2025-.jpg</image:loc><image:caption>LessonsLearnedfrom2025</image:caption><image:title>LessonsLearnedfrom2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cyber-Hygiene-Isnt-Optional.jpg</image:loc><image:caption>AudienceattendingacybersecuritypresentationillustratingwhycyberhygieneandCSBSCyberHygieneFundamentalsmatterforfinancialinstitutions</image:caption><image:title>CyberHygieneIsntOptional</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-01-30</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/announcing-release-latest-version-cat</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bedel-security-announces-cat-replacement-cyspot-csf-built-on-nist-csf-2.0</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Moving-from-the-CAT-to-CSF--A-More-Strategic-Path-for-Community-Financial-Institutions.jpg</image:loc><image:caption>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:caption><image:title>MovingfromtheCATtoCSFAMoreStrategicPathforCommunityFinancialInstitutions</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-CAT--Building-on-a-Foundation-That-Lasts.jpg</image:loc><image:caption>BeyondtheCATBuildingonaFoundationThatLasts</image:caption><image:title>BeyondtheCATBuildingonaFoundationThatLasts</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Press-Release.jpg</image:loc><image:caption>PressRelease</image:caption><image:title>PressRelease</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/need-know-petya-not-petya-malware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hipaa-security-rule-compliance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Privacy-and-Security2.png</image:loc><image:caption>PrivacyandSecurity2</image:caption><image:title>PrivacyandSecurity2</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/meet-the-newest-member-of-the-bedel-security-team</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Phishing.jpg</image:loc><image:caption>Phishing</image:caption><image:title>Phishing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/KSmith_Announcement.jpg</image:loc><image:caption>KSmithAnnouncement</image:caption><image:title>KSmithAnnouncement</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Trisha_Headshot_Thumbnail_BW.jpg</image:loc><image:caption>TrishaHeadshotThumbnailBW</image:caption><image:title>TrishaHeadshotThumbnailBW</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/MeetTheNewestMember.jpg</image:loc><image:caption>MeetTheNewestMember</image:caption><image:title>MeetTheNewestMember</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-to-manage-a-chief-information-security-officer-in-your-financial-institution</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/EnsuringIndependence.jpg</image:loc><image:caption>EnsuringIndependence</image:caption><image:title>EnsuringIndependence</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-to-Manage-a-CISO-to-Avoid-Burnout.jpg</image:loc><image:caption>HowtoManageaCISOtoAvoidBurnout</image:caption><image:title>HowtoManageaCISOtoAvoidBurnout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/healthcare-practitioners-first-do-no-harm</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/First-Do-no-Harm_-2.png</image:loc><image:caption>FirstDonoHarm2</image:caption><image:title>FirstDonoHarm2</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-km</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/KassiaAnnouncement.jpg</image:loc><image:caption>KassiaAnnouncement</image:caption><image:title>KassiaAnnouncement</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hybrid-work-force-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Hybrid-Work-Force-Security.jpg</image:loc><image:caption>HybridWorkForceSecurity</image:caption><image:title>HybridWorkForceSecurity</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/does-it-align-with-our-mission</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/DoesItAlignWithOurMission.jpg</image:loc><image:caption>DoesItAlignWithOurMission</image:caption><image:title>DoesItAlignWithOurMission</image:title></image:image><lastmod>2022-08-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/identity-is-the-new-perimeter</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/What-You-Can-do-About-the-Okta-Compromise.jpg</image:loc><image:caption>WhatYouCandoAbouttheOktaCompromise</image:caption><image:title>WhatYouCandoAbouttheOktaCompromise</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Independent-Collaboration-Pt2.jpg</image:loc><image:caption>IndependentCollaborationPt2</image:caption><image:title>IndependentCollaborationPt2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Waning-Days-of-the-CAT-Arrive.jpg</image:loc><image:caption>TheWaningDaysoftheCATArrive</image:caption><image:title>TheWaningDaysoftheCATArrive</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Identity-is-the-New-Perimeter.jpg</image:loc><image:caption>IdentityistheNewPerimeter</image:caption><image:title>IdentityistheNewPerimeter</image:title></image:image><lastmod>2026-03-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/looking-back-looking-forward</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4/medium.jpg</video:thumbnail_loc><video:title>What should you look for in a provider? What does a typical contract look like?</video:title><video:description>vCISO_QA13_1</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA13_1.mp4</video:content_loc><video:duration>254</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Information Security Program</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Cybersecurity</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Where-Does-Managing-Aggregator-Risk-Belong.jpg</image:loc><image:caption>WhereDoesManagingAggregatorRiskBelong</image:caption><image:title>WhereDoesManagingAggregatorRiskBelong</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Self-Assessing-Authentication-&amp;-Access-Risk.jpg</image:loc><image:caption>SelfAssessingAuthenticationAccessRisk</image:caption><image:title>SelfAssessingAuthenticationAccessRisk</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2013.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail13</image:caption><image:title>vCISOQuestionsAnsweredThumbnail13</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/three-options-to-implement-phish-resistant-multi-factor-authentication</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/3WaysToPhishProof.jpg</image:loc><image:caption>3WaysToPhishProof</image:caption><image:title>3WaysToPhishProof</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Picture1-1.png</image:loc><image:caption>Picture11</image:caption><image:title>Picture11</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-03-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-superpower-of-consistency</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Superpower-of-Consistency-in-Cybersecurity.jpg</image:loc><image:caption>TheSuperpowerofConsistencyinCybersecurity</image:caption><image:title>TheSuperpowerofConsistencyinCybersecurity</image:title></image:image><lastmod>2024-07-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/dont-ditch-sms-but-change-the-way-you-use-it</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/key-to-successful-vendor-management-program-walk-before-you-run</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/SuccessfulVendorManagement.jpg</image:loc><image:caption>SuccessfulVendorManagement</image:caption><image:title>SuccessfulVendorManagement</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-financial-institutions-can-get-ahead-of-2025-cybersecurity-exams</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-the-Second-Amendment-to-DFS-Part-500.jpg</image:loc><image:caption>UnderstandingtheSecondAmendmenttoDFSPart500</image:caption><image:title>UnderstandingtheSecondAmendmenttoDFSPart500</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/How-Financial-Institutions-Can-Get-Ahead.jpg</image:loc><image:caption>HowFinancialInstitutionsCanGetAhead</image:caption><image:title>HowFinancialInstitutionsCanGetAhead</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Managing-Bank-wide-Change.jpg</image:loc><image:caption>ManagingBankwideChange</image:caption><image:title>ManagingBankwideChange</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2025-04-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/considerations-for-securing-online-meeting-software</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ConsiderationsForSecuringOnlineMeeting.jpg</image:loc><image:caption>ConsiderationsForSecuringOnlineMeeting</image:caption><image:title>ConsiderationsForSecuringOnlineMeeting</image:title></image:image><lastmod>2021-03-19</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-it-time-to-reconsider-your-policy-on-webmail</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/ReconsiderPolicy.jpg</image:loc><image:caption>ReconsiderPolicy</image:caption><image:title>ReconsiderPolicy</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/ransomware-trends-in-2025</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Is-Ransomware-Dying.jpg</image:loc><image:caption>IsRansomwareDying</image:caption><image:title>IsRansomwareDying</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Ransomware-Trends-in-2025.jpg</image:loc><image:caption>RansomwareTrendsin2025</image:caption><image:title>RansomwareTrendsin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/RSAT-2.0-Update.jpg</image:loc><image:caption>RSAT20Update</image:caption><image:title>RSAT20Update</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/discussions-triggered-from-the-lastpass-breach</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/DiscussionsTriggeredFrom.jpg</image:loc><image:caption>DiscussionsTriggeredFrom</image:caption><image:title>DiscussionsTriggeredFrom</image:title></image:image><lastmod>2023-01-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/welcome-to-the-team-tb</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/TonyAnnouncement.jpg</image:loc><image:caption>TonyAnnouncement</image:caption><image:title>TonyAnnouncement</image:title></image:image><lastmod>2022-03-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-it-time-to-go-passwordless</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-It-time-to-go-passwordless-1.jpg</image:loc><image:caption>IsIttimetogopasswordless1</image:caption><image:title>IsIttimetogopasswordless1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/DiscussionsTriggeredFrom.jpg</image:loc><image:caption>DiscussionsTriggeredFrom</image:caption><image:title>DiscussionsTriggeredFrom</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/WhatIsAStrongPassword2022.jpg</image:loc><image:caption>WhatIsAStrongPassword2022</image:caption><image:title>WhatIsAStrongPassword2022</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Is-switching-to-passwordless-authentication-possible.jpg</image:loc><image:caption>Isswitchingtopasswordlessauthenticationpossible</image:caption><image:title>Isswitchingtopasswordlessauthenticationpossible</image:title></image:image><lastmod>2025-04-04</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/nist-cybersecurity-framework-2.0</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/NIST-Releases-Cybersecurity-Framework-2.0.jpg</image:loc><image:caption>NISTReleasesCybersecurityFramework20</image:caption><image:title>NISTReleasesCybersecurityFramework20</image:title></image:image><lastmod>2024-03-22</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/hipaa-lessons-learned</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/HIPPA_LessonsLearned.jpg</image:loc><image:caption>HIPPALessonsLearned</image:caption><image:title>HIPPALessonsLearned</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/where-does-managing-aggregator-risk-belong</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Where-Does-Managing-Aggregator-Risk-Belong.jpg</image:loc><image:caption>WhereDoesManagingAggregatorRiskBelong</image:caption><image:title>WhereDoesManagingAggregatorRiskBelong</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-08-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/enhancing-productivity-in-information-security-small-wins-big-gains</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-05-24</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/can-vciso-services-be-done-remotely</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4/medium.jpg</video:thumbnail_loc><video:title>Can vCISO services be done remotely? How often does a vCISO come on-site?</video:title><video:description>vCISO_QA9</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA9.mp4</video:content_loc><video:duration>278</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>CUs</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Banks</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Remote</video:tag><video:tag>CISO</video:tag><video:tag>Credit Union</video:tag><video:tag>virtual CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20Answered%20Thumbnail%2009.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail09</image:caption><image:title>vCISOQuestionsAnsweredThumbnail09</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/sheltered-harbor-new-concept-or-should-you-be-doing-this-stuff-already</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/SH-Model.png</image:loc><image:caption>SHModel</image:caption><image:title>SHModel</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/ShelteredHarbor.jpg</image:loc><image:caption>ShelteredHarbor</image:caption><image:title>ShelteredHarbor</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/no-rest-in-2020</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2020-01-17</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/humans-vs.-artificial-intelligence-who-is-the-better-phisher</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Humans-vs.-Artificial-Intelligence--Who-is-the-better-phishe.jpg</image:loc><image:caption>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:caption><image:title>HumansvsArtificialIntelligenceWhoisthebetterphishe</image:title></image:image><lastmod>2023-12-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/little-preparation-goes-long-way</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Preparation.jpg</image:loc><image:caption>Preparation</image:caption><image:title>Preparation</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/understanding-your-information-security-layers</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/UnderstandingYourInfoSecurityLayers.jpg</image:loc><image:caption>UnderstandingYourInfoSecurityLayers</image:caption><image:title>UnderstandingYourInfoSecurityLayers</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/FDICInTrexAudited.jpg</image:loc><image:caption>FDICInTrexAudited</image:caption><image:title>FDICInTrexAudited</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/5-Simple-Steps-to-a-Proactive-Information-Security-Program.jpg</image:loc><image:caption>5SimpleStepstoaProactiveInformationSecurityProgram</image:caption><image:title>5SimpleStepstoaProactiveInformationSecurityProgram</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/strengthening-cybersecurity-with-a-single-source-of-truth</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Understanding-the-Second-Amendment-to-DFS-Part-500.jpg</image:loc><image:caption>UnderstandingtheSecondAmendmenttoDFSPart500</image:caption><image:title>UnderstandingtheSecondAmendmenttoDFSPart500</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/shutterstock_1993834745.jpg</image:loc><image:caption>shutterstock1993834745</image:caption><image:title>shutterstock1993834745</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-Trends-Examiners-May-Focus-on-in-2026.jpg</image:loc><image:caption>blockswithiconsstackedshowinganupwardarrowtrendingandthetitleCybersecurityTrendsExaminersMayFocusonin2026</image:caption><image:title>CybersecurityTrendsExaminersMayFocusonin2026</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/meaningful-governance</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/MeaningGovernance.jpg</image:loc><image:caption>MeaningGovernance</image:caption><image:title>MeaningGovernance</image:title></image:image><lastmod>2022-01-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-and-the-board</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/is-dridex-the-most-dangerous-banking-trojan</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/beyond-the-36-hour-rule</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Ransomware-Trends-in-2025.jpg</image:loc><image:caption>RansomwareTrendsin2025</image:caption><image:title>RansomwareTrendsin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Preparing-for-a-Security-Incident.jpg</image:loc><image:caption>PreparingforaSecurityIncident</image:caption><image:title>PreparingforaSecurityIncident</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Guidance%20from%20the%20FBI.jpg</image:loc><image:caption>GuidancefromtheFBI</image:caption><image:title>GuidancefromtheFBI</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Beyond-the-36-Hour-Rule-Real-World-Examples-You-Might-Not-Know-About.jpg</image:loc><image:caption>Beyondthe36HourRuleRealWorldExamplesYouMightNotKnowAbout</image:caption><image:title>Beyondthe36HourRuleRealWorldExamplesYouMightNotKnowAbout</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2025-07-18</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/murphys-law-and-business-continuity-plans</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BackupsVRetention.jpg</image:loc><image:caption>BackupsVRetention</image:caption><image:title>BackupsVRetention</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/unlocking-success-in-information-security-risk-for-financial-institutions</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Unlocking-Success-in-Information-Security-Risk-for-Financial-Institutions.jpg</image:loc><image:caption>UnlockingSuccessinInformationSecurityRiskforFinancialInstitutions</image:caption><image:title>UnlockingSuccessinInformationSecurityRiskforFinancialInstitutions</image:title></image:image><lastmod>2024-05-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/charging-dr.-ransomware</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/ChargingDrRansomware.jpg</image:loc><image:caption>ChargingDrRansomware</image:caption><image:title>ChargingDrRansomware</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2022-08-12</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/bedel-security-announces-launch-of-cyspot-customer-access-portal</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BlogAnnouncement_CindaCAO.jpg</image:loc><image:caption>BlogAnnouncementCindaCAO</image:caption><image:title>BlogAnnouncementCindaCAO</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/CySPOT-News.png</image:loc><image:caption>CySPOTNews</image:caption><image:title>CySPOTNews</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Press-Release.jpg</image:loc><image:caption>PressRelease</image:caption><image:title>PressRelease</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NewHire_AndrewHernandez.jpg</image:loc><image:caption>NewHireAndrewHernandez</image:caption><image:title>NewHireAndrewHernandez</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-regular-risk-assessment-revolution</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheRegularRiskAssessmentRevolution.jpg</image:loc><image:caption>TheRegularRiskAssessmentRevolution</image:caption><image:title>TheRegularRiskAssessmentRevolution</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/equifax-breach-freeze-credit</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/WhatToDoAboutEquifax.jpg</image:loc><image:caption>WhatToDoAboutEquifax</image:caption><image:title>WhatToDoAboutEquifax</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/Screen-Shot-2017-09-13-at-8_45_58-AM.png</image:loc><image:caption>ScreenShot20170913at84558AM</image:caption><image:title>ScreenShot20170913at84558AM</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/3-questions-successful-security-leaders-ask</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/handling-change-in-your-organization</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Handling%20Change%20in%20Your%20Organization.jpg</image:loc><image:caption>HandlingChangeinYourOrganization</image:caption><image:title>HandlingChangeinYourOrganization</image:title></image:image><lastmod>2024-06-14</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/trust-but-verify-managing-your-managed-security-service-provider</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Trust-But-Verify.jpg</image:loc><image:caption>Businesshandshakeillustratingtrustandverificationinmanagedsecurityservices</image:caption><image:title>TrustButVerify</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Vendor-Data-Sharing.jpg</image:loc><image:caption>AsmallgroupofbusinesspeopleinanintenseconversationwiththetitledisplayingVendorDataSharingWhyNeedtoKnowisaMustforFinancialInstitutions</image:caption><image:title>VendorDataSharing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Facebook-Accounts-for-Financial-Institutions.jpg</image:loc><image:caption>ManagingFacebookAccountsforFinancialInstitutions</image:caption><image:title>ManagingFacebookAccountsforFinancialInstitutions</image:title></image:image><lastmod>2026-02-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-internet-of-things-in-retail-banking</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/rethinking-means-win-security</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/cybersecurity-is-everyones-responsibility-in-your-bank</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/StrengtheningTheFort.jpg</image:loc><image:caption>StrengtheningTheFort</image:caption><image:title>StrengtheningTheFort</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cybersecurity-is-Everyones-Responsibility-in-Your-Bank.jpg</image:loc><image:caption>CybersecurityisEveryonesResponsibilityinYourBank</image:caption><image:title>CybersecurityisEveryonesResponsibilityinYourBank</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Defending-the-End-Zone.jpg</image:loc><image:caption>DefendingtheEndZone</image:caption><image:title>DefendingtheEndZone</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><lastmod>2025-09-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/kingdom-building-in-information-security-the-risks-of-tool-overload</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Kingdom-Building-in-Information-Security-The-Risks-of-Tool-Overload.jpg</image:loc><image:caption>KingdomBuildinginInformationSecurityTheRisksofToolOverload</image:caption><image:title>KingdomBuildinginInformationSecurityTheRisksofToolOverload</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-War-on-Residential-Proxy-Networks.jpg</image:loc><image:caption>Residentialneighborhoodusedtoillustratecybersecuritythreatsfromresidentialproxynetworks</image:caption><image:title>TheWaronResidentialProxyNetworks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Vendor-Data-Sharing.jpg</image:loc><image:caption>AsmallgroupofbusinesspeopleinanintenseconversationwiththetitledisplayingVendorDataSharingWhyNeedtoKnowisaMustforFinancialInstitutions</image:caption><image:title>VendorDataSharing</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Cyber-Hygiene-Isnt-Optional.jpg</image:loc><image:caption>AudienceattendingacybersecuritypresentationillustratingwhycyberhygieneandCSBSCyberHygieneFundamentalsmatterforfinancialinstitutions</image:caption><image:title>CyberHygieneIsntOptional</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/stephanie-goetz-named-coo</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/CyberRiskAppetite.jpg</image:loc><image:caption>CyberRiskAppetite</image:caption><image:title>CyberRiskAppetite</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Imported_Blog_Media/KeyTakeAways.jpg</image:loc><image:caption>KeyTakeAways</image:caption><image:title>KeyTakeAways</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/breaking-the-sms-habit</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/BreakingTheSMSHabit.jpg</image:loc><image:caption>BreakingTheSMSHabit</image:caption><image:title>BreakingTheSMSHabit</image:title></image:image><lastmod>2021-06-25</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-top-five-ways-ai-powers-hacks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Top-Five-Ways-AI-Powers-Hacks--.jpg</image:loc><image:caption>TechwavebackgroundwiththetitleBedelSecurityFriday5TheTopFiveWaysAIPowerHacks</image:caption><image:title>TheTopFiveWaysAIPowersHacks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/TheAIArmsRace.jpg</image:loc><image:caption>TheAIArmsRace</image:caption><image:title>TheAIArmsRace</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Protecting-Against-AI-Driven-Cyber-Threats.jpg</image:loc><image:caption>ProtectingAgainstAIDrivenCyberThreats</image:caption><image:title>ProtectingAgainstAIDrivenCyberThreats</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Banks%2c-Credit-Unions%2c-and-AI%2c-OH-MY_P2.jpg</image:loc><image:caption>BanksCreditUnionsandAIOHMYP2</image:caption><image:title>BanksCreditUnionsandAIOHMYP2</image:title></image:image><lastmod>2025-12-05</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/banking-on-zero-trust-an-essential-shift-in-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-07-07</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/chargeback-relief-does-it-go-far-enough-is-it-fair-to-issuing-banks</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/how-does-a-vciso-interact-with-other-outsourced-managed-providers</loc><video:video><video:thumbnail_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA11.mp4/medium.jpg</video:thumbnail_loc><video:title>vCISO Q&amp;A 11: How does a vCISO interact with other outsourced managed providers?</video:title><video:description>vCISO_QA11</video:description><video:content_loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO_QA11.mp4</video:content_loc><video:duration>291</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live><video:tag>Outsourced Core</video:tag><video:tag>Virtual CISO</video:tag><video:tag>ISO</video:tag><video:tag>Outsourced CISO</video:tag><video:tag>Managed IT Provider</video:tag><video:tag>Fractional CISO</video:tag><video:tag>vCISO</video:tag><video:tag>Information Security</video:tag><video:tag>CISO services</video:tag><video:tag>Cybersecurity</video:tag><video:tag>IT</video:tag><video:tag>CISO</video:tag></video:video><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/vCISO%20Questions%20and%20Answers%20Videos/vCISO%20Questions%20Answered%20Thumbnail%2011.jpg</image:loc><image:caption>vCISOQuestionsAnsweredThumbnail11</image:caption><image:title>vCISOQuestionsAnsweredThumbnail11</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/the-rising-threat-of-deepfake-technology-in-cybersecurity</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Rising-Threat-of-Deepfake-Technology-in-Cybersecurity1.jpg</image:loc><image:caption>TheRisingThreatofDeepfakeTechnologyinCybersecurity1</image:caption><image:title>TheRisingThreatofDeepfakeTechnologyinCybersecurity1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/The-Top-Five-Ways-AI-Powers-Hacks--.jpg</image:loc><image:caption>TechwavebackgroundwiththetitleBedelSecurityFriday5TheTopFiveWaysAIPowerHacks</image:caption><image:title>TheTopFiveWaysAIPowersHacks</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Ransomware-Trends-in-2025.jpg</image:loc><image:caption>RansomwareTrendsin2025</image:caption><image:title>RansomwareTrendsin2025</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Managing-Cybersecurity-with-Limited-Resources.jpg</image:loc><image:caption>BedelSecurityFriday5graphiconmanagingcybersecuritywithlimitedresources</image:caption><image:title>ManagingCybersecuritywithLimitedResources</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/nist-cybersecurity-framework-2.0-draft-updates</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/NIST_CSF_2.0_Draft_Updates.jpg</image:loc><image:caption>NISTCSF20DraftUpdates</image:caption><image:title>NISTCSF20DraftUpdates</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2023-09-08</lastmod></url><url><loc>https://www.bedelsecurity.com/vciso-services</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/OurVirtualCISOServices_Hero2.jpg</image:loc><image:caption>Suburbanfinancialdistrictrepresentingcommunitycybersecurityservicesforfinancialinstitutions</image:caption><image:title>OurVirtualCISOServicesHero2</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/OurvCISOServices_BedelSecurityGuarantee_Hero.jpg</image:loc><image:caption>vCISOagreementbetweencommunityfinancialinstitutionandBedelSecurityrepresentedthroughprofessionalbusinesshandshake</image:caption><image:title>OurvCISOServicesBedelSecurityGuaranteeHero</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/OurvCISOServices_BestSolution_PagePhoto.jpg</image:loc><image:caption>VirtualCISOguidingexecutiveteamthroughstrategicplanningsession</image:caption><image:title>OurvCISOServicesBestSolutionPagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/2026%20SEO%20Optimized%20Website%20Photos/OurvCISOServices_BestSolution2_PagePhoto.jpg</image:loc><image:caption>vCISOprovidingcybersecurityguidanceandgovernanceduringremoteconsultation</image:caption><image:title>OurvCISOServicesBestSolution2PagePhoto</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/HeaderPhotos/NewHome_Ratio.jpg</image:loc><image:caption>NewHomeRatio</image:caption><image:title>NewHomeRatio</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/choosing-a-cybersecurity-framework</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Choosing-a-Cybersecurity-Framework.jpg</image:loc><image:caption>ChoosingaCybersecurityFramework</image:caption><image:title>ChoosingaCybersecurityFramework</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-08-13</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/fortifying-the-vault</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Fortifying-the-Vault.jpg</image:loc><image:caption>FortifyingtheVault</image:caption><image:title>FortifyingtheVault</image:title></image:image><lastmod>2024-02-02</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/planning-for-reopening-in-covid-19</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/SepratePenTest_RemoteAccess.jpg</image:loc><image:caption>SepratePenTestRemoteAccess</image:caption><image:title>SepratePenTestRemoteAccess</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/BedelSecurity_10yrLogo_Horiz_Wt_LG.png</image:loc><image:caption>BedelSecurity10yrLogoHorizWtLG</image:caption><image:title>BedelSecurity10yrLogoHorizWtLG</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Orig_LG-1.png</image:loc><image:caption>Bedel10yrLogoRegHorizOrigLG1</image:caption><image:title>Bedel10yrLogoRegHorizOrigLG1</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Logos/Bedel_10yrLogo_Reg_Horiz_Wt_LG.png</image:loc><image:caption>Bedel10yrLogoRegHorizWtLG</image:caption><image:title>Bedel10yrLogoRegHorizWtLG</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/extending-security-controls-beyond-the-office</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/Extending-Security-Controls-Beyond-the-Office.jpg</image:loc><image:caption>ExtendingSecurityControlsBeyondtheOffice</image:caption><image:title>ExtendingSecurityControlsBeyondtheOffice</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2021-12-03</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/five-questions-you-should-be-asking-about-your-cybersecurity-program</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/Blog%20Photos/FiveQuestions-YouShouldBeAskingAboutYourCybersecurityProgram.jpg</image:loc><image:caption>FiveQuestionsYouShouldBeAskingAboutYourCybersecurityProgram</image:caption><image:title>FiveQuestionsYouShouldBeAskingAboutYourCybersecurityProgram</image:title></image:image><lastmod>2023-04-27</lastmod></url><url><loc>https://www.bedelsecurity.com/blog/segregate-your-backup-data-to-protect-yourself-from-an-attack</loc><image:image><image:loc>https://2432061.fs1.hubspotusercontent-na1.net/hubfs/2432061/BSLogo_Horiz_SM_Orig.png</image:loc><image:caption>BSLogoHorizSMOrig</image:caption><image:title>BSLogoHorizSMOrig</image:title></image:image><lastmod>2018-03-23</lastmod></url></urlset>