<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//manusecevent.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://manusecevent.com/newsroom/feature/anatomy-of-a-cyber-attack/</loc>
		<lastmod>2019-07-29T15:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/Cyber-attack-1800x1200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/MENA-natomy-of-a-cyber-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/we-literally-cant-afford-to-ignore-the-dark-web-heres-why/</loc>
		<lastmod>2019-07-29T15:10:20+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/07/dark-web.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/Dark-web-gif1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/interview/is-the-it-ot-bridge-the-achilles-heel-of-industrial-cyber-security/</loc>
		<lastmod>2019-08-09T13:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/Computer-screen-code-glitch-animation-gif-background-free-gif.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/4-ingredients-that-make-israel-a-cybersecurity-powerhouse/</loc>
		<lastmod>2019-08-09T13:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2018/11/israel-flag-cyber-1800x1200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://manusecevent.com/wp-content/uploads/2019/08/5-Ingredients-Isreal-Cyber-Power-House-1-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/5-resolutions-for-2019-how-to-actually-keep-them-so-you-dont-get-phished/</loc>
		<lastmod>2019-08-09T13:12:08+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/cyber-lock-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/data-to-be-protected-controlled-or-commercialised/</loc>
		<lastmod>2019-08-09T13:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/global-data-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/interview/hacking-the-popular-imaginary/</loc>
		<lastmod>2019-08-09T13:16:49+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/03/hacking-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/interview/article-one/</loc>
		<lastmod>2019-08-09T13:18:02+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/05/diversity-at-work-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/reviewing-the-norsk-hydro-cyber-attack/</loc>
		<lastmod>2019-08-09T13:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/norsk-hydro-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/self-care-for-security-professionals/</loc>
		<lastmod>2019-08-09T13:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/05/stress-1800x1200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/05/ciso-sleeping-poisitons-meme.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/israeli-palestinian-conflict-setting-precedents-for-hacker-retaliation/</loc>
		<lastmod>2019-08-09T13:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/cyber-war-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/interview-2-minutes-with-chandra-brown-ceo-akin-akinbosoye-director-of-cybersecurity-at-mxd/</loc>
		<lastmod>2020-07-09T07:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2020/07/Manufacturing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2020/07/MxD-Interview-Graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/how-to-use-a-defence-in-depth-strategy-to-minimize-opportunities-for-ransomware-attacks/</loc>
		<lastmod>2020-07-17T14:33:24+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2020/07/ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/opinion/the-role-of-oems-in-cyber-security/</loc>
		<lastmod>2021-04-14T14:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/08/manufacturing-supply-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/it-ot-and-the-human-factor/</loc>
		<lastmod>2021-04-14T14:26:37+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/08/shutterstock_1168856596.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/u-s-government-makes-surprise-move-to-secure-power-grid-from-cyberattacks/</loc>
		<lastmod>2021-04-14T14:26:49+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/08/WC-5-Aug-CS4CA-Europe-newsroom-image-1800x1200.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/integrating-legacy-equipment-with-iot/</loc>
		<lastmod>2021-04-14T14:26:54+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/08/Factory_Automation_Robotics_Palettizing_Bread.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/feature/make-way-for-cobots/</loc>
		<lastmod>2021-04-14T14:27:02+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/08/WC-July-1-Cobots-Photo-Credit-Financial-Times.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://manusecevent.com/wp-content/uploads/2019/08/History-of-the-cobots-image-timeline.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/mission-critical-discussions-return-to-chicago-this-october/</loc>
		<lastmod>2021-04-14T14:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/09/ManuSec-USA-Banner-CPD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/the-tpm-from-cybersecurity-newbie-to-sophisticated-threat-defender/</loc>
		<lastmod>2021-05-04T11:20:43+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2021/05/cybersecurity-week-19.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/tcg-tackles-trustworthiness-for-the-internet-of-things/</loc>
		<lastmod>2021-05-17T13:22:38+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2021/05/security-iot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/machine-learning-and-ai-in-cybersecurity-boon-or-bane/</loc>
		<lastmod>2021-08-26T11:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2021/08/Machine-Learning-and-AI-in-Cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/top3-ot-security-risks-threats-manufacturing-sector/</loc>
		<lastmod>2021-10-12T08:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2021/10/manufacturing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/interview/interview-2-minutes-with-tom-schmitt/</loc>
		<lastmod>2022-03-04T14:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/cybersecurity-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2-minutes-with-Tom-Schmitt-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/qg-media-pleased-to-announce-majority-stake-acquisition-by-ismg/</loc>
		<lastmod>2024-01-17T14:09:56+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/MicrosoftTeams-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/the-changing-cyber-threat-landscape-in-the-german-manufacturing-industry-a-global-look/</loc>
		<lastmod>2024-02-22T08:50:40+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/secu1-7-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Forescout-Article.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/europe/gea-secures-its-networks-with-open-systems-managed-sase/</loc>
		<lastmod>2024-05-07T08:37:05+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/cyber-security-data-protection-information-privacy-internet-technology-concept-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Open-Systems-Publication-Tech-Sponsor-ManuSec-Europe-2024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Open-Systems-Publication-Tech-Sponsor-ManuSec-Europe-2024-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Open-Systems-Publication-Tech-Sponsor-ManuSec-Europe-2024-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/white-paper-managing-globally-distributed-ecosystems/</loc>
		<lastmod>2024-08-30T08:47:58+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/White-Paper-Ping-Identity-Tech-Sponsor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/reports-newsroom/manusec-canada-2024-annual-report/</loc>
		<lastmod>2024-10-07T10:28:39+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/CyberSec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/manusec-usa-2024-annual-report/</loc>
		<lastmod>2024-10-07T10:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Download-the-Report-Newsroom-Page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/usa/kinder-morgan-selects-xage-to-cyber-harden-critical-infrastructure/</loc>
		<lastmod>2025-02-20T09:23:22+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2019/06/hacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/case-study-supercharging-efficiency-and-security-with-remote-access-solutions/</loc>
		<lastmod>2025-10-03T08:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/Tosibox-White-Paper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/data-to-the-rescue-of-habitats-how-ducks-unlimited-canada-is-maximising-conservation-with-hybrid-cloud/</loc>
		<lastmod>2025-12-10T12:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/2021/05/cybersecurity-week-19.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/programming-background-with-person-working-with-codes-computer-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/zwei-sicherheitsrealitaten-und-ein-gemeinsames-risiko-der-webbrowser-als-neue-angriffsflache/</loc>
		<lastmod>2025-12-15T09:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/VirtualBrowser-Article-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/VirtualBrowser-Leitfaden-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://manusecevent.com/newsroom/case-study-powerland-hpe-greenlake-for-networking-winnipeg-school-division/</loc>
		<lastmod>2026-03-12T09:51:43+00:00</lastmod>
		<image:image>
			<image:loc>https://manusecevent.com/wp-content/uploads/cyber-security-experts-working-with-tech-devices-neon-lights-scaled.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->