<?xml version="1.0"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261865.Cyware%2BLabs%2BInc.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261889.Opening%2BChair%2B-%2BCiaran%2BMartin.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261859.Security%2BScorecard.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261525.Super-Identities%2Bat%2BMachine%2BSpeed%253A%2BSecuring%2Bthe%2BRise%2Bof%2BAI.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261890.Keynote%2BSpeaker%2Bto%2Bbe%2Brevealed%2Bsoon....html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261745.From%2BReactive%2Bto%2BPreemptive%253A%2BModernising%2BDefence%2Bwith%2BAI-Driven%2BIntelligence.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261837.How%2BI%2BMet%2BYour...%2BAccess%2BBreach%253A%2BThe%2BUnexpected%2BStory%2Bof%2BZero%2BTrust%252C%2BIdentity%2B%2526%2BDevice%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261815.JFrog.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263760.Metacompliance.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261526.Compliance%2Bat%2Bthe%2BSpeed%2Bof%2Ba%2BCrisis%253A%2BA%2BPractical%2BFramework%2Band%2BApproach%2Bto%2BMeeting%2BGlobal%2BRegulatory%2BRequirements%2Bunder%2BPressure.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261866.Anatomy%2Bof%2Ban%2BAttack%2BChain%253A%2BHow%2BSecurity%2BConsolidation%2BChanges%2Bthe%2BOdds.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262534.CISO%2BChallenge%253A%2BIdentify%252C%2BProtect%252C%2BDetect%2Band%2BRespond%2B-%2BPaid%2BUpgrade.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263733.Cybersecurity%2BPriorities%2B2026%253A%2BWhat%2BSecurity%2BLeaders%2BAre%2BFunding%2BNext%2Band%2Bthe%2BHard%2BEconomics%2Bof%2Btheir%2BChoices.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262528.LLM%2BMayhem%2B-%2BHands%2Bon%2BRed%2BTeaming%2BLLM%2BPowered%2BChatbots%2B-%2BPaid%2BUpgrade.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262555.Nayaka.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261894.Cyber%2BSecurity%2B2026%2B-%2BState%2Bof%2Bthe%2BNation.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261527.Inside%2BOut%253A%2BThe%2BEvolving%2BProfile%2Bof%2BInsider%2BThreats%2Band%2BTheir%2BHidden%2BLinks%2Bto%2Bthe%2BDark%2BWeb.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261816.OneTrust%2BTechnology%2BLimited.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261850.Origina.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261746.The%2BBrowser%2Bas%2Bthe%2BPrimary%2BDatasource%252C%2BDetecting%2BAI%2BAgents%2Band%2BProtecting%2Bthe%2BWeb%2BPre-Network%2BRequest.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261867.Vendor-Neutral%2BEndpoint%2BResilience%2Bin%2Ba%2BHyperscaler-dominated%2BWorld.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261838.Arctic%2BWolf.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262556.Voice%2BFirewall%253A%2BExtending%2BZero%2BTrust%2Bto%2Bthe%2BHuman%2BVoice.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261528.Re-inventing%2BCyber%2BBudgeting%253A%2BFrom%2BLegacy%2BSpend%2Bto%2BQuantified%2BRisk.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261895.Pioneering%2Ba%2BNew%2BEra%2Bof%2BCyber%2BProtection%2Bwith%2Bthe%2BEnterprise%2BBrowser.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261860.Cyware%2BLabs%2BInc.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262604.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261817.Exabeam.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261858.Hunting%2BDDoS%2BAttack%2BVectors%253A%2BInteractive%2BWorkshop%2BAcross%2BL3%252C%2BL4%252C%2Band%2BL7.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261868.Zero%2BHour%252C%2BZero%2BChance%253A%2BStopping%2BPhishing%2BCampaigns%2BBefore%2Bthey%2BSpread.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261529.You%25E2%2580%2599ve%2BBeen%2BPh0wned%253A%2BHow%2BAttackers%2BAre%2BCompromising%2BOrganisations%2BVia%2BTelephone%2BSocial%2BEngineering.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261896.Keynote%2BSpeaker%2Bto%2Bbe%2Brevealed%2Bsoon....html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261839.Beyond%2Bthe%2BSilos%253A%2BUnifying%2BPredictive%2BDefense%2BAgainst%2BMulti-Vector%2BAttacks.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262605.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261869.Identity%2Bis%2Bthe%2BNew%2BPerimeter%253A%2BUsing%2BAI%2Bto%2BOperationalize%2BZero%2BTrust%2BIAM%2Bat%2BScale.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261851.API%2BContext.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261818.ThreatAware%2BLtd.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261530.Broken%2BTrust%253A%2BOAuth%2BAbuse%2BEvolved%2BFrom%2BThird-Party%2BBreaches%2Bto%2BAgentic%2BEra.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261897.Afternoon%2BChair%2B-%2BGraham%2BCluley.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262607.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261907.Underground%2BIntelligence%2B-%2BWhat%2Bthe%2BDark%2BWeb%2Bis%2BShowing%2BUs%2BAbout%2BEvolving%2BRansomware%2BTradecraft.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261870.The%2BParking%2BBlind%2BSpot%253A%2BDriving%2BUsers%2Bto%2BDangerous%2BDestinations.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261531.CISO%2BPanel%253A%2BStrategies%2Bfor%2BExploitation%2BRisk%2BReduction.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261747.Dataminr.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262608.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261840.KPMG.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261819.Modernising%2BPKI%2BBefore%2BIt%2BBreaks%253A%2BReal-World%2BLessons%2Bfor%2Bthe%2BAge%2Bof%2BAI%2Band%2BMachines.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261852.Scope%2Bis%2BNot%2Ba%2BPhase%253A%2BWhy%2BAsset%2BFidelity%2Bis%2Bthe%2BMissing%2BFoundation%2Bof%2BCyber%2BResilience.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261908.The%2BInfosec%2BBig%2BFat%2BCloud%2BSecurity%2BAnnual%2BUpdate.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261871.Cloudflare.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265082.Cybersecurity%2Band%2BGeopolitics%253A%2BWhat%2BCISOs%2Band%2BBoards%2BNeed%2Bto%2BKnow.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262609.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262836.The%2BAge%2Bof%2Bthe%2BUnderstatement%253A%2BThreat%2BHunting%2Bthe%2BAgentic%2BAI%2BAttack%2BSurface%2Bwith%2BAI.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261536.Best%2BPractices%2Bfor%2BSecure%252C%2BIntelligent%2BWorkflows%2Bin%2Ba%2BPost-Hype%2BAI%2BEra.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261820.AI%252C%2BAI%2BEverywhere%2B-%2BWhat%2Bare%2BYour%2BPeople%2BReally%2BDoing%2Bwith%2BAI%2Btools%253F.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261748.Future-Proofing%2BIAM%253A%2BA%2BMaturity%2BModel%2Bfor%2BModern%2BIdentity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261832.Kroll%2BAssociates%2BUK%2BLtd..html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262610.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261910.The%2BAI%2BMilestones%2BThat%2BWill%2BReshape%2BCybersecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261841.The%2BParking%2BTicket%252C%2BThe%2BPaperwork%252C%2Band%2Bthe%2BAI%2Bthat%2BSaid%2B%25E2%2580%259CYes%25E2%2580%259D.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261537.AI%2BCoding%2BAssistants%2Bare%2BFlying%2BBlind%253A%2BWhy%2BReal-Time%2BOpen%2BSource%2BIntelligence%2Bis%2BNow%2BEssential%2Bto%2BSoftware%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261872.From%2BScattered%2BInsights%2Bto%2BActionable%2BIntelligence%253A%2BBreaking%2BTeam%2BSilos%2Band%2BTurning%2BIndicator%2BNoise%2Bto%2BSignal%2BUsing%2BAI.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261749.Concentric%2BAI.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261821.De-mystifying%2BEmail%2BEncryption.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262611.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261853.Reporting%2BActive%2BExploits%2Bin%2B24%2BHours%253A%2BAre%2BYou%2BReady%2Bfor%2Bthe%2BCRA%253F.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261912.Communal%2BDefense%253A%2BTracking%2Band%2BResponding%2Bto%2BCyber%2BThreat%2BTrends%2BAcross%2BIndustries.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261539.Beyond%2BDetection%253A%2BBuilding%2BAuthentication%2BInfrastructure%2Bfor%2Bthe%2BDeepfake%2BEra.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261873.AI%2BVendors%253A%2BWhen%2Bthe%2BBoard%2BSays%2BGo%2Band%2BSecurity%2BSays%2BWait.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262612.Department%2Bfor%2BScience%252C%2BInnovation%2B%2526%2BTechnology.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261822.NetSpi.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261540.Dave%2BDon%2527t%2BDo%2BThat%253A%2BWhen%2BAutomation%2BGoes%2BOff-Script.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261913.Cyber%2BTitan%2BInterview.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262613.Day%2B1%2Bvs.%2BDay%2B90%253A%2BWhat%2BNobody%2BTells%2BYou%2BAbout%2BDeploying%2BAI%2Bin%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261874.Reimagining%2BSIEM%2Busing%2BAI%2BNative%2BSOC.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261541.Calculating%2BRisk%2Bthrough%2BInformed%2BIntelligence.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265463.AI%2BSpera.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265464.Qevlar%2BAI.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265398.Semperis.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262614.The%2BNext%2BInsider%2BIsn%25E2%2580%2599t%2BHuman%253A%2BSecuring%2BData%2Bin%2Bthe%2BAge%2Bof%2BAI%2BAgents.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261915.Keynote%2BSpeaker%2Bto%2Bbe%2Brevealed%2Bsoon....html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261917.If%2BYour%2BAI%2BCould%2BBlackmail%2BYour%2BCompany%252C%2BWould%2BIt%253F.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261542.Threat%2BHunters%2BBecome%2BDeep%2BThinkers%253A%2BHow%2BSemantic%2BLearning%2BChanges%2Bthe%2BGame.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263758.Acronis.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261863.Island%2BTechnologies.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261862.Jurassic%2BQuest%253A%2BA%2BRed%2BTeaming%2BExperience.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261875.Live%2BAttendee%2BVote%253A%2BYou%2BPick%2Bthe%2BMFA%2BWe%2BHack%2B%25E2%2580%2593%2BMicrosoft%252C%2BOkta%2Bor%2BGoogle%2BAuthenticator%2B%2528And%2BHow%2Bto%2BStop%2BIt%2521%2529.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261543.Machine%2Bvs%2BMachine%253A%2BWinning%2Bthe%2BNew%2BSecurity%2BArms%2BRace.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261861.Menlo%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261918.Opening%2BChair%2B-%2BPurvi%2BKay.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261842.The%2BResilient%2BAdvantage%253A%2BLeveraging%2BAI%2Band%2BImmutability%2Bfor%2BGuaranteed%2BData%2BRecovery.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261920.Ukraine%25E2%2580%2599s%2BHybrid%2BWar%2Band%2Bthe%2BNew%2BCyber%2BFrontline.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263057.Building%2BDistinctly%2BHuman%2BTechnology%2Bin%2Bthe%2BAge%2Bof%2BAI.%2BA%2BBrand-led%2BPlaybook%2Bfor%2BStanding%2BOut%2Bin%2Ba%2BSea%2Bof%2BFunctional%2BSameness.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263479.Cato%2BNetworks.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261823.Let%25E2%2580%2599s%2BGet%2BPhysical%2521%2BUnlocking%2BSynergies%2Bby%2BCombining%2BPhysical%2Band%2BDigital%2BAccess%2Bin%2Ba%2BSingle%2BToken.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261854.Securiti.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261545.Realise%2BMulti-AI%2BAmbitions%2Bwith%2Ba%2BData-first%2BSecurity%2BApproach.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261876.AI%2Bvs.%2BAI%253A%2BThe%2BModern%2BCybersecurity%2BArms%2BRace.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262533.Post-Quantum%2BCryptography%253A%2BSecuring%2Bthe%2BFuture%252C%2BToday%2B-%2BPaid%2BUpgrade.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261921.%25E2%2580%259CQuantum%2Bis%2Bstill%2Bfar%2Boff%252C%2Bwe%2Bcan%2Bwait%2B%25E2%2580%2593%2Bcan%25E2%2580%2599t%2Bwe%253F%2522.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.264361.Securing%2BCritical%2BNational%2BInfrastructure%2Bin%2Bthe%2BAge%2Bof%2BAI%2Band%2BQuantum.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262535.SOC%2BLeadership%253A%2BYou%25E2%2580%2599re%2Bthe%2BSOC%2BManager%252C%2Bnow%2Bwhat%253F%2B-%2BPaid%2BUpgrade.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262615.Zeroport.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261546.Vendor-neutral%2BEndpoint%2BResilience%2Bin%2Ba%2BHyperscaler-dominated%2BWorld.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261855.Avertro.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261824.OneTrust%2BTechnology%2BLimited.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262830.Xbow.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261878.The%2BThree%2BHorsemen%2Bof%2Bthe%2BIdentity%2BApocalypse.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261843.Mapping%2Bthe%2BThreat%253A%2BA%2BPractical%2BTaxonomy%2Bof%2BAI%2BAttacks.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262616.Harmonic%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261547.AI%2Band%2BCybersecurity%2BRed%2BTeaming%253A%2BBuilding%2Bthe%2BNext%2BLine%2Bof%2BDefense.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261922.AI%2BAgents%253A%2BAttacks%252C%2BDefences%252C%2Band%2BWhat%2BYou%2BNeed%2Bto%2BKnow.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261879.Build%2BFast%252C%2BDeploy%2BSafely%253A%2BSecuring%2Bthe%2BAI%2BDevelopment%2BLifecycle.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261826.Cloudflare.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261844.Axonius.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261548.Threat-INFORM%2Bto%2BOptimize%2BSecurity%2BOperations.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261881.Harden%2BData%2BSecurity%2Bfor%2BMicrosoft%2B365%2BCopilot%2BRollouts.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261925.The%2BDeepfake%2BInterview%253A%2BBreaking%2BIn%2BFrom%2Bthe%2BInside.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261828.DarkTrace.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261750.Hype%2Bto%2BHard%2BTruths%253A%2BAligning%2BAI%2BAdoption%2Bwith%2BData%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261856.Immersive%2BLabs.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261549.Cyber%2BGovernance%2B-%2BCyber%2BResilience%2Bis%2BNot%2BJust%2Ba%2BTechnology%2BIssue.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262831.How%2BAttackers%2B%2528Still%2529%2BBeat%2BEDR.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263071.Navigating%2BYour%2BCyber%2BSecurity%2BCareer%2BPath.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261845.Your%2BEmail%2BSecurity%2Bis%2BAlready%2BCompromised%253A%2BAI%2Bvs.%2BAI%2Bin%2Bthe%2BBEC%2BEra.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261927.Lessons%2Bfrom%2BDefending%2BCritical%2BNational%2BInfrastructure.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261882.Stop%2Bthe%2BAI%2BSlop%2521%2BFrom%2BNoise%2Bto%2BValidated%2BRisk.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261829.One%2BCompromised%2BSystem%2Band%2BBOOM%252C%2BMeet%2BYour%2BBlast%2BRadius.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261550.Real%2BCode%2Bis%2Bthe%2BBest%2BBenchmark%253A%2BImproving%2BSAST%2BDetection%2Bat%2BScale.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261751.Saviynt.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.264927.The%2BVoice%2Bin%2BYour%2BPocket%253A%2BHow%2BAI%2BVoice%2BCloning%2Bis%2BRewriting%2Bthe%2BRules%2Bof%2BEnterprise%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263734.AI%2Bin%2BCybersecurity%253A%2BWhat%2BCISOs%2BAre%2BReally%2BDeploying%252C%2Band%2BWhat%2BKeeps%2BThem%2BAwake%2Bat%2BNight.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261883.Assume%2BBreach%252C%2BPrepare%2Bfor%2BRecovery%253A%2BWhy%2BData%2BResilience%2Bis%2BMandatory%2Bfor%2BBusiness%2BSurvival.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261928.Crisis%2BCommunications%2B%25E2%2580%2593%2BContingency%2BPlans%2Bto%2BPut%2Bin%2BPlace%2BNow.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261650.Using%2BProtective%2BDNS%2Bto%2BDismantle%2BGlobal%2BScam%2BNetworks.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261846.Demystifying%2Bthe%2BDark%2BWeb.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261857.Admin%2Bby%2BRequest.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261752.Governing%2Bthe%2BAI%2BWorkforce%253A%2BIdentity%252C%2BTrust%252C%2Band%2BControl%2Bin%2Bthe%2BAge%2Bof%2BAutonomous%2BAgents.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261830.TPRM%2BIsn%25E2%2580%2599t%2BEnough%253A%2BReal-World%2BLessons%2Bfrom%2Bthe%2BShift%2Bto%2BActive%2BSupply%2BChain%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261651.Oh%252C%2BBehave%2521%2BPsychology%252C%2BAI%252C%2Band%2Bthe%2BChanging%2BFace%2Bof%2BHuman%2BCyber%2BRisk.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261831.Axonius.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261753.Beyond%2BPrevention%253A%2BCreate%2Ba%2BRecovery%2BStrategy%2BThat%2BRansomware%2BCannot%2BBreak.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261930.Women%2Bin%2BCybersecurity%2BWelcome%253A%2BCelebrating%2B10%2BYears%2Bof%2BWomen%2Bin%2BCyber%2Bat%2BInfosecurity%2BEurope.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261847.Horizon3.ai.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262471.Women%2Bin%2BCybersecurity%253A%2BLessons%2Bin%2BConfidence%252C%2BCourage%2Band%2BHigh%2BPerformance.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261652.The%2BDark%2BSide%2Bof%2BDDoS%2B-%2BHow%2BHackers%2BBring%2BDown%2BEmpires.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261885.Why%2BExposure%2BManagement%2BPrograms%2BFail%252C%2Band%2BHow%2Bto%2BFix%2BThem.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261931.Women%2Bin%2BCybersecurity%253A%2BThe%2BRole%2Bof%2BAllyship%2Bin%2BModern%2BCyber%2BTeams.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261833.What%25E2%2580%2599s%2BNext%2Bfor%2Bthe%2BIntel%2BTeam%253F%2BFrom%2BCTI%2Bto%2BUnified%2BRisk%2BIntelligence.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261653.Human-Guided%2BAI%2BAdversaries%253A%2BBuilding%2Ba%2BCTEM%2BMachine%2BThat%2BActually%2BFights%2BBack.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261886.Semperis.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262617.Spikerz%2Bsecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261933.Women%2Bin%2BCybersecurity%253A%2BRedefining%2BSuccess%2Bfor%2BWomen%2Bin%2BCybersecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261654.Inside%2Bthe%2BTools%2Band%2BInfrastructure%2BDriving%2B%2527Cybercrime%2B2.0%2527.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263759.Acronis.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.262618.Tracebit.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261935.Women%2Bin%2BCybersecurity%253A%2BDrinks%2Band%2BNetworking.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261655.Autonomous%2BIdentity%2BManagement%2B-%2BThe%2BRoadmap%2Bto%2BAI%2BDriven%2BIdentity%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261656.How%2BCan%2BSecurity%2BMove%2BFaster%2BThan%2BVulnerabilities%253F.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261939.Opening%2BChair%2B-%2BLaure%2BLydon.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261887.Three%2BGenerations%2Bof%2BIdentity%2BRisk.%2BOne%2BAttack%2BSurface.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261940.Decision-Making%2BUnder%2BPressure%253A%2BLeading%2BThrough%2BLive%2BCyber%2BIncidents.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261754.AI%2Bvs%2BAI%253A%2BWhen%2BOffensive%2BSecurity%2BBecomes%2BAutonomous.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263480.Cato%2BNetworks.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.264851.Detectify%2BAB.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263806.Cyber%2BRisk%2Bin%2B2026%253A%2BHow%2BSecurity%2BLeaders%2BMeasure%2BExposure%2Band%2BReduce%2BRisk.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261943.Resilience%2B%25E2%2580%2593%2BProtecting%2BYour%2BNo.%2B1%2BAsset%2B%25E2%2580%2593%2BYour%2BWorkforce.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263187.From%2BBlind%2BSpot%2Bto%2BBoard%2BPriority%253A%2BManaging%2BCryptographic%2BRisk%2Bin%2Bthe%2BAge%2Bof%2BAI%252C%2BQuantum%252C%2Band%2BZero%2BTrust.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261834.BotCity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261848.Arctic%2BWolf.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261944.Communities%2Bof%2BSupport%253A%2BScaling%2BPractical%2BCyber%2BHelp%2Bfor%2BSMEs.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261835.DarkTrace.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261888.Workforce%2BSecurity%2BReimagined%253A%2BPasswords%252C%2BPasskeys%252C%2BMFA%2B%2526%2Bthe%2BEnterprise%2BBrowser.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.263173.From%2BReactive%2Bto%2BPredictive%253A%2BHow%2BAI%2BIs%2BTransforming%2BHealthcare%2BCybersecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261849.Ditch%2Bthe%2BHype%2Bon%2BZero%2BTrust%253A%2BTake%2BPractical%2Band%2BActionable%2BSteps%2Bto%2BImprove%2BYour%2BSecurity%2BPosture%2BToday.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.264850.Arctic%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261755.Expel.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.261836.Menlo%2BSecurity.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.264463.Future-Focused%2BForensics%253A%2BHow%2Bto%2BProactively%2BDiscover%2Band%2BMap%2BCriminal%2BInfrastructure.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265077.Adopting%2BAI%2BAcross%2Bthe%2BWorkforce%2Bwith%2BConfidence.html</loc></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4886.265400.Harness.html</loc></url></urlset>