<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 03/04/2026 at 6:40 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://staging.isgovern.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>InfoSec Governance</title>
		<link><![CDATA[https://staging.isgovern.com]]></link>
		<description><![CDATA[InfoSec Governance]]></description>
		<lastBuildDate><![CDATA[Wed, 27 Nov 2024 16:16:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://staging.isgovern.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/cyber-essentials/faq/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/cyber-essentials/faq/]]></link>
			<title>Cyber Essentials FAQ</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 16:16:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/book-your-free-cybersecurity-audit/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/book-your-free-cybersecurity-audit/]]></link>
			<title>Book your free Cybersecurity audit</title>
			<pubDate><![CDATA[Wed, 14 May 2025 15:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/contact-us/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 16:17:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/international-cyber-certification/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/international-cyber-certification/]]></link>
			<title>International Cyber Certification</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 16:09:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/managed-security-services/vulnerability-scanning/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/managed-security-services/vulnerability-scanning/]]></link>
			<title>Vulnerability Scanning</title>
			<pubDate><![CDATA[Tue, 28 Jan 2025 17:04:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/iso-27001/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/iso-27001/]]></link>
			<title>ISO 27001</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 15:06:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/careers/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/careers/]]></link>
			<title>Careers</title>
			<pubDate><![CDATA[Thu, 16 Jan 2025 20:04:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 20 Oct 2024 20:39:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-changes-are-coming-what-you-need-to-know/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-changes-are-coming-what-you-need-to-know/]]></link>
			<title>Cyber Essentials: Changes are coming – What you need to know!</title>
			<pubDate><![CDATA[Sun, 20 Apr 2025 09:04:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/managed-security-services/security-awareness-training/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/managed-security-services/security-awareness-training/]]></link>
			<title>Security Awareness Training</title>
			<pubDate><![CDATA[Sat, 22 Mar 2025 16:08:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/]]></link>
			<title>Cyber Security Services</title>
			<pubDate><![CDATA[Mon, 17 Feb 2025 14:45:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/international-cyber-certification/iasme-cyber-baseline/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/international-cyber-certification/iasme-cyber-baseline/]]></link>
			<title>IASME Cyber Baseline</title>
			<pubDate><![CDATA[Fri, 17 Jan 2025 14:24:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-the-five-technical-controls/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-the-five-technical-controls/]]></link>
			<title>Cyber Essentials: The five technical controls</title>
			<pubDate><![CDATA[Wed, 08 Jan 2025 07:33:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-is-third-party-governance/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-is-third-party-governance/]]></link>
			<title>What is third party governance</title>
			<pubDate><![CDATA[Wed, 01 Jan 2025 16:48:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-manually-install-defender-for-endpoint-on-linux/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-manually-install-defender-for-endpoint-on-linux/]]></link>
			<title>How to manually install Defender for Endpoint on Linux</title>
			<pubDate><![CDATA[Thu, 05 Dec 2024 13:47:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/implementing-security-boundaries-within-the-business/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/implementing-security-boundaries-within-the-business/]]></link>
			<title>Implementing Security Boundaries within the business</title>
			<pubDate><![CDATA[Sun, 29 Dec 2024 10:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-is-pestle-analysis/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-is-pestle-analysis/]]></link>
			<title>What is PESTLE Analysis?</title>
			<pubDate><![CDATA[Fri, 03 Jan 2025 14:46:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/cyber-security-services/cyber-essentials/cyber-essentials-plus/cyber-essentials-plus-faq/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/cyber-security-services/cyber-essentials/cyber-essentials-plus/cyber-essentials-plus-faq/]]></link>
			<title>Cyber Essentials Plus FAQ</title>
			<pubDate><![CDATA[Wed, 27 Nov 2024 16:06:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/competition-terms-and-conditions/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/competition-terms-and-conditions/]]></link>
			<title>Competition Terms and Conditions</title>
			<pubDate><![CDATA[Tue, 29 Oct 2024 09:16:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/information-security-governance-all-you-need-to-know/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/information-security-governance-all-you-need-to-know/]]></link>
			<title>Information security governance: All you need to know</title>
			<pubDate><![CDATA[Tue, 07 Jan 2025 19:27:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/information-security-old/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/information-security-old/]]></link>
			<title>Home OLD</title>
			<pubDate><![CDATA[Sun, 20 Oct 2024 20:35:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/eu-cyber-resilience-act/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/eu-cyber-resilience-act/]]></link>
			<title>EU Cyber Resilience Act</title>
			<pubDate><![CDATA[Mon, 21 Oct 2024 06:54:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/documentation-review-why-should-you-do-them/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/documentation-review-why-should-you-do-them/]]></link>
			<title>Documentation review &#8211; Why should you do them?</title>
			<pubDate><![CDATA[Mon, 06 Jan 2025 09:54:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/asset-management-why-you-should-be-doing-it/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/asset-management-why-you-should-be-doing-it/]]></link>
			<title>Asset management – Why you should be doing it</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 15:49:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-is-dora/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-is-dora/]]></link>
			<title>What is DORA</title>
			<pubDate><![CDATA[Tue, 08 Oct 2024 19:16:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/changes-to-cyber-essentials-in-2025/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/changes-to-cyber-essentials-in-2025/]]></link>
			<title>Changes to Cyber Essentials in 2025</title>
			<pubDate><![CDATA[Tue, 24 Sep 2024 09:08:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/thank-you-for-getting-in-touch/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/thank-you-for-getting-in-touch/]]></link>
			<title>Thank You for Getting in Touch</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 15:21:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/multi-factor-in-office-365/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/multi-factor-in-office-365/]]></link>
			<title>Office 365 multi-factor authentication</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:22:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/top-5-mobile-device-attacks-you-need-to-watch-out-for/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/top-5-mobile-device-attacks-you-need-to-watch-out-for/]]></link>
			<title>Top 5 Mobile Device Attacks You Need to Watch Out For</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:22:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-you-need-to-know-about-the-rise-in-supply-chain-cyberattacks/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-you-need-to-know-about-the-rise-in-supply-chain-cyberattacks/]]></link>
			<title>What You Need to Know About Supply Chain Cyberattack</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:21:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/why-should-you-get-cyber-essentials/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/why-should-you-get-cyber-essentials/]]></link>
			<title>Why should you get Cyber Essentials?</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:20:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/making-your-voip-network-bulletproof/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/making-your-voip-network-bulletproof/]]></link>
			<title>Making Your VoIP Network Bulletproof</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:19:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-what-to-look-out-for-when-using-an-msp/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-what-to-look-out-for-when-using-an-msp/]]></link>
			<title>Cyber Essentials: What to look out for when using an MSP</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:16:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-plus-and-sweet32-vulnerability/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-plus-and-sweet32-vulnerability/]]></link>
			<title>Cyber Essentials Plus and Sweet32 vulnerability</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:16:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-mobile-devices/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-mobile-devices/]]></link>
			<title>Cyber Essentials and mobile devices</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:14:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-backups/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-backups/]]></link>
			<title>Cyber Essentials and backups</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:13:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-are-the-five-pillars-of-information-security/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-are-the-five-pillars-of-information-security/]]></link>
			<title>What are the five pillars of information security</title>
			<pubDate><![CDATA[Tue, 10 Sep 2024 06:46:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-configure-a-firewall-on-ubuntu/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-configure-a-firewall-on-ubuntu/]]></link>
			<title>How to configure a firewall on Ubuntu?</title>
			<pubDate><![CDATA[Wed, 31 Jul 2024 07:35:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-create-a-risk-register-in-under-10-minutes/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-create-a-risk-register-in-under-10-minutes/]]></link>
			<title>How to create a risk register in under 10 minutes</title>
			<pubDate><![CDATA[Wed, 26 Jun 2024 19:01:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/terms-and-conditions-cyber-essentials-plus/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/terms-and-conditions-cyber-essentials-plus/]]></link>
			<title>Terms and Conditions &#8211; Cyber Essentials Plus</title>
			<pubDate><![CDATA[Wed, 22 May 2024 06:41:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-basic-vs-cyber-essentials-plus-differences/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-basic-vs-cyber-essentials-plus-differences/]]></link>
			<title>Cyber Essentials Basic vs Cyber Essentials Plus</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:12:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/windows-10-end-of-life/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/windows-10-end-of-life/]]></link>
			<title>Windows 10: End of life</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 06:56:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-renewed-for-another-year/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-renewed-for-another-year/]]></link>
			<title>Cyber Essentials renewed for another year</title>
			<pubDate><![CDATA[Tue, 25 Jun 2024 08:20:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-search-for-a-cyber-essentials-certificate/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-search-for-a-cyber-essentials-certificate/]]></link>
			<title>How to search for a Cyber Essentials certificate</title>
			<pubDate><![CDATA[Sun, 23 Jun 2024 09:50:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-is-the-nis-2-directive/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-is-the-nis-2-directive/]]></link>
			<title>What is the NIS 2 Directive</title>
			<pubDate><![CDATA[Sat, 27 Jul 2024 08:49:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-create-an-asset-management-policy-in-around-10-minutes/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-create-an-asset-management-policy-in-around-10-minutes/]]></link>
			<title>How to create an asset management policy in around 10 minutes</title>
			<pubDate><![CDATA[Sat, 22 Jun 2024 10:35:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/how-to-build-an-asset-register-quickly-and-easily/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/how-to-build-an-asset-register-quickly-and-easily/]]></link>
			<title>How to build an asset register quickly and easily</title>
			<pubDate><![CDATA[Mon, 20 May 2024 12:00:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/what-is-the-cia-triad/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/what-is-the-cia-triad/]]></link>
			<title>What is the CIA Triad</title>
			<pubDate><![CDATA[Mon, 09 Sep 2024 08:45:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-iasme-cyber-assurance-price-increase/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/cyber-essentials-and-iasme-cyber-assurance-price-increase/]]></link>
			<title>Cyber Essentials and IASME Cyber Assurance price increase</title>
			<pubDate><![CDATA[Sat, 30 Mar 2024 19:12:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://staging.isgovern.com/blog/]]></guid>
			<link><![CDATA[https://staging.isgovern.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 30 Sep 2024 12:53:50 +0000]]></pubDate>
		</item>
				</channel>
</rss>
