<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://kennethghartman.com/blog/separation-of-duties-in-scrum-software-development/</loc>
<lastmod>2010-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/a-quality-thought/</loc>
<lastmod>2011-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/plan-do-check-act/</loc>
<lastmod>2011-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/take-steps-to-achieve-greatness/</loc>
<lastmod>2011-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/alligator-fighting/</loc>
<lastmod>2011-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/maxwells-law-of-the-scoreboard/</loc>
<lastmod>2011-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/moments-of-truth-examining-your-organizations-customer-service/</loc>
<lastmod>2011-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/is-server-downtime-an-information-security-incident/</loc>
<lastmod>2011-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/hire-yourself-as-a-consultant/</loc>
<lastmod>2011-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/skype-in-the-enterprise/</loc>
<lastmod>2011-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/management-paradigms/</loc>
<lastmod>2011-07-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/my-security-philosophy/</loc>
<lastmod>2011-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-sources-of-influence-behind-my-leadership-style/</loc>
<lastmod>2012-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/security-customer-trust/</loc>
<lastmod>2012-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/are-we-more-secure-today/</loc>
<lastmod>2012-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/what-does-trust-have-to-do-with-it/</loc>
<lastmod>2012-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/how-hackers-get-passwords/</loc>
<lastmod>2012-07-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/ironic-opsec/</loc>
<lastmod>2012-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/opsec-is-really-not-opsec/</loc>
<lastmod>2012-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/success-has-many-fathers/</loc>
<lastmod>2012-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/be-an-actor-not-a-reactor/</loc>
<lastmod>2012-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/zero-factor-authentication/</loc>
<lastmod>2012-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/lessons-learned-from-the-jfk-jet-skier-incident/</loc>
<lastmod>2012-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/cmm-organizational-process-maturity/</loc>
<lastmod>2012-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/looking-in-pastebin-at-the-hactivism-carnage/</loc>
<lastmod>2012-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/powershell-script-to-log-network-connections/</loc>
<lastmod>2012-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/eight-traits-for-vision/</loc>
<lastmod>2013-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-difference-between-leaders-non-leaders/</loc>
<lastmod>2013-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/goodbye-oz-data-centa/</loc>
<lastmod>2013-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/why-have-security-policy/</loc>
<lastmod>2013-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/securely-delete-files-with-sdelete/</loc>
<lastmod>2013-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/calculate-file-entropy/</loc>
<lastmod>2013-05-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/shannon-entropy-of-various-file-formats/</loc>
<lastmod>2013-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/security-policy-exceptions/</loc>
<lastmod>2013-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/defense-in-depth/</loc>
<lastmod>2013-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/zerobin-as-a-xss-attack-platform/</loc>
<lastmod>2013-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/zerobin-xss-vulnerability-patched-in-0-19/</loc>
<lastmod>2013-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/defense-in-depth-part-2/</loc>
<lastmod>2013-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/a-mission-from-god-blues-brothers-style/</loc>
<lastmod>2014-10-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/define-pci-service-provider/</loc>
<lastmod>2015-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-contracting-life-cycle/</loc>
<lastmod>2015-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/cissp-vs-ceh-vs-security/</loc>
<lastmod>2015-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/change-config-settings-using-a-bash-script/</loc>
<lastmod>2015-09-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/how-to-install-tshark-in-unattended-mode-via-script/</loc>
<lastmod>2015-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/bash-script-tests-for-os-and-run-as-root/</loc>
<lastmod>2015-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/a-python-parser-for-bittorrent-metainfo-files/</loc>
<lastmod>2015-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/questions-to-ask-executive-management-when-considering-a-new-job/</loc>
<lastmod>2015-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/soc-1-vs-soc-2/</loc>
<lastmod>2016-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/are-bittorrent-pieces-250kb-long/</loc>
<lastmod>2016-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/https-is-it-possible-to-forge-a-web-server-certificate/</loc>
<lastmod>2016-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/modify-a-line-in-wtmp-linux-accounting/</loc>
<lastmod>2016-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/netstat-capture/</loc>
<lastmod>2016-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-encryption-magic-bullet/</loc>
<lastmod>2016-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-trust-value-equation/</loc>
<lastmod>2016-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/fips-140-2-in-a-nutshell/</loc>
<lastmod>2016-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/has-sha-1-been-hacked/</loc>
<lastmod>2017-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/information-security-at-startup-companies/</loc>
<lastmod>2017-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/timestamp-bash_history-with-every-command/</loc>
<lastmod>2018-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/check-multiple-aws-s3-buckets-for-missing-default-encryption/</loc>
<lastmod>2019-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/test-early-test-often/</loc>
<lastmod>2019-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/the-equifax-data-breach-and-the-apache-struts-vulnerability/</loc>
<lastmod>2019-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/create-an-ec2-that-runs-chrome-for-sandboxed-websurfing/</loc>
<lastmod>2019-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/interactively-exploring-ntfs-timestamps/</loc>
<lastmod>2020-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/file-organizer/</loc>
<lastmod>2025-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/human-intelligence-vs-ai/</loc>
<lastmod>2025-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/getting-started-with-yara/</loc>
<lastmod>2025-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/sans-timer/</loc>
<lastmod>2025-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/bad_scanner/</loc>
<lastmod>2025-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/zoom-spam/</loc>
<lastmod>2025-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/swimming-upstream/</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/rethinking-identity-is-the-new-perimeter/</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/securing-ssh-keys-in-cloud-environments/</loc>
<lastmod>2026-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/forensic-detection-of-ai-generated-images/</loc>
<lastmod>2026-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/teaching-my-ai-to-manage-monkeys/</loc>
<lastmod>2026-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/teaching-my-ai-to-learn-from-its-mistakes/</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/github-as-exfiltration-channel-teampcp/</loc>
<lastmod>2026-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/why-your-agent-needs-a-credential-broker/</loc>
<lastmod>2026-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/when-your-ai-keeps-making-the-same-mistake/</loc>
<lastmod>2026-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/18-forensic-analysis-ec2/</loc>
<lastmod>2018-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/17-data-protection-public-cloud/</loc>
<lastmod>2019-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/16-cloud-savvy-customers/</loc>
<lastmod>2019-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/15-devops-security-controls/</loc>
<lastmod>2019-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/14-moving-to-the-cloud/</loc>
<lastmod>2020-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/12-best-of-both-worlds/</loc>
<lastmod>2020-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/13-doing-cloud-in-china/</loc>
<lastmod>2020-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/11-data-destruction-cloud/</loc>
<lastmod>2020-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/10-purple-team-aws/</loc>
<lastmod>2020-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/09-terraform-cloud-workstation/</loc>
<lastmod>2021-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/08-embrace-your-inner-hacker/</loc>
<lastmod>2021-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/07-more-secure-in-the-cloud/</loc>
<lastmod>2022-10-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/06-docker-crash-course/</loc>
<lastmod>2023-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/05-differential-file-system-analysis/</loc>
<lastmod>2023-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/04-encryption-jedi-mind-trick/</loc>
<lastmod>2023-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/03-personal-cyber-security/</loc>
<lastmod>2024-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/02-mastering-fabric/</loc>
<lastmod>2025-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/01-dealing-with-digital-discovery/</loc>
<lastmod>2025-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/19-resilient-humanity-thriving-in-the-age-of-superintelligence/</loc>
<lastmod>2025-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/20-stop-playing-security-whack-a-mole/</loc>
<lastmod>2025-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/21-unmasking-the-artificial/</loc>
<lastmod>2026-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/22-torrential-downpour-digital-surveillance/</loc>
<lastmod>2026-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/presentations/23-unmasking-the-artificial-cdam/</loc>
<lastmod>2026-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/blog/</loc>
</url>
<url>
<loc>https://kennethghartman.com/contact-ken/</loc>
</url>
<url>
<loc>https://kennethghartman.com/</loc>
</url>
<url>
<loc>https://kennethghartman.com/</loc>
</url>
<url>
<loc>https://kennethghartman.com/pbw/</loc>
</url>
<url>
<loc>https://kennethghartman.com/presentations/</loc>
</url>
<url>
<loc>https://kennethghartman.com/quotations/</loc>
</url>
<url>
<loc>https://kennethghartman.com/reading-list/</loc>
</url>
<url>
<loc>https://kennethghartman.com/sans-timer</loc>
</url>
<url>
<loc>https://kennethghartman.com/media/A-Closer-Look-at-Data-Destruction-in-the-Cloud.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/A-DevOps-Approach-to-Security-Controls.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/A-Purple-Team-Approach-to-Exploring-AWS-Security-Services-Capabilities.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Are_You_Using_Full_Disk_Encryption_Yet.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Auditing-Essentials-for-Small-Provider-Organizations.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Best-of-Both-Worlds.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Beware-of-the-Encryption-Jedi-Mind-Trick.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/BitTorrent-and-Digital-Contraband-HANDOUT-2016-04-10.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Can_you_really_be_more_secure_in_the_cloud.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/CoachJohnWooden.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Curse_of_the_Handiman.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Data-Protection-Starts-with-Physical-Security1.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Doing-Cloud-in-China.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Embrace-Your-Inner-Hacker.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/ICACs_Watchful_Eye_CSAM_and_Torrential_Downpour-Slides.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Introduction-to-the-Small-Provider-PS-Tooklit.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Is_Skype_Secure.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/John_Wooden_Martial_Arts.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/LTT-Dealing_with_the_Deluge_of_Digital_Discovery.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Love_What_You_Do.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Mastering_Fabric_Workshop.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Personal-Branding-Workbook-A-Guide-for-Infosec-Professionals-2018-06-03.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Personal_Cyber_Security_in_an_AI-Diven_World.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Privacy_of_Electronic_Health_Information.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Resilient_Humanity-Thriving_in_the_Age_of_Superintelligence-SLIDES.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/SEC488-Intro-What-to-do-when-moving-to-the-cloud.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Scripting_Cloud_Security_Capabilities.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Security-and-the-Cloud-1.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Security_Challenges_on_the_Plant_Floor.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Skype-and-Data-Exfiltration_2014-04-18.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Stop_Playing_Whack-A-Mole.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/The-Tyranny-of-the-Urgent-and-the-Transformational-Security-Leader-11-06-2016.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Understanding-the-Role-of-Trust-in-the-Protection-of-Privacy.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Unmasking_the_Artificial-Notes.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/Unmasking_the_Artificial-Slides.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
<url>
<loc>https://kennethghartman.com/media/What-Cloud-Saavy-Customers-Really-Want.pdf</loc>
<lastmod>2026-03-31T20:42:56+00:00</lastmod>
</url>
</urlset>
