<?xml version="1.0"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.infosecurityeurope.com/en-gb.html</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/about.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/about/advisory-council.html</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/about/partners.html</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/about/history-of-cybersecurity-threats.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit.html</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/prepare-to-visit.html</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/venue-and-travel.html</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/admissions-policy.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/visitor-code-of-conduct.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/sans-institute.html</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/leaders-programme.html</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/priority-visitor-programme.html</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/cyber-startup-programme.html</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/owasp-gen-ai-security-summit.html</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/women-in-cybersecurity.html</loc><lastmod>2026-03-13</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/cpe-credits.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/infosec-meets.html</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/colleqt-for-visitors.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/media-and-press.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/special-events.html</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/special-events/futuresec.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/special-events/women-in-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/special-events/channel-partners.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/special-events/leaders-programme.html</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/speaker-information.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/most-innovative-cyber-competition.html</loc><lastmod>2026-01-10</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/visit/cyber-startup-award.html</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit.html</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/become-an-exhibitor.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/first-time-exhibitor.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/prepare-to-exhibit.html</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/prepare-to-exhibit/upgrade.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/exhibitor-code-of-conduct.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/floorplan.html</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/smart-lead-capture.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/channel-zone.html</loc><lastmod>2026-02-27</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibit/lead-manager.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibitor-directory.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibitor-directory/product-directory.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibitor-directory/product-directory/product-details.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/exhibitor-directory/exhibitor-details.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme.html</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/exhibitor-sessions.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference.html</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/keynote-stage.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/information-security-exchange.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/technology-showcase.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/cyber-innovation-showcase.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/security-workshops.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/conference-programme/conference/talking-tactics.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/help.html</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog.html</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-five-ransomware-trends-you-need-to-know-today.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/hacking-your-brain-top-13-social-engineering-techniques.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/critical-cybersecurity-concerns-finance-sector.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/is-data-leakers-threat-valid.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/are-cryptocurrency-investments-cybersecure.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/preventing-cloud-cyberattacks.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/understanding-threat-actor-naming-conventions.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/operational-technologies-biggest-threats.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/growing-third-party-vulnerabilities-threat.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/cyber-crime-as-a-service.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-to-hack-large-language-models.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/learnings-from-notpetya-cyberattack.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/api-cybersecurity-threats.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/biggest-ransomware-demands.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/what-to-know-moveit-hack.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/cyber-threat-intelligence-tools-open-source.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/generative-ai-dark-web-bots.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-ten-open-source-vulnerabilities.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/biggest-cyber-attacks.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-to-negotiate-with-ransomware-gangs.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/opensource-data-tracking-threat-actors.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/best-ways-to-tackle-insider-threats.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/mitigate-cyber-risk-during-mergers-acquisitions.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/prevent-credential-based-attacks.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/supply-chain-attacks-cyber-threat.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/tackling-rising-quishing-threat.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/responding-attackers-bypass-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/snowflake-data-breaches-lessons-learned.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-attacks-uk-public-sector-2024.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-10-infrastructure-ransomware-raas.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/iot-device-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/addressing-rising-bec-threat.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/guide-infostealer-malware.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/tackle-evolving-email-based-attacks.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/guide-adversary-in-the-middle-aitm.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-nation-state-cyber-attack.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/ransomware-trends-multi-extortion-tactics.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-to-protect-business-from-north-korean-it-workers.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/rethinking-cloud-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/vulnerability-exploitation-top-cyber-attack-vector.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/what-is-clickfix-how-prevent.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/defend-against-it-helpdesk-attacks.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/cybersecurity-must-include-physical-defence.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/top-five-cyber-attacks-2025.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-cisos-can-defend-against-the-rise-of-ai-powered-cybercrime.html</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/ot-security-rising-industrial-cyber-threats.html</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/human-element.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cybersecurity-considerations-for-chatgpt.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/understanding-soc-essentials-for-your-business.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/designing-human-centric-cybersecurity.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/startups-battle-against-cybercrime.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/digital-transformation-requires-cybersecurity-strategy.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cybersecurity-by-design.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/why-psychology-matters-in-cybersecurity.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/how-effective-is-ethical-hacking.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cybersecurity-learnings-from-michael-johnson.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/avoid-boring-cybersecurity-awareness-training.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cybersecurity-ecosystem-start-ups-are-critical.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/academia-importance-to-cybersecurity.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/plan-for-future-cyber-threats.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/ai-algorithms-in-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/what-is-offensive-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/phishing-resistant-mfa-explained.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/dsbd-vulnerability-management-cycle.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/train-staff-cybersecurity-aware.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/non-technical-roles-in-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/boost-cyber-resiliency-learning-incidents.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/how-to-mitigate-spyware-risks.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/top-8-llm-benchmarks-for-cybersecurity-practices.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/address-gen-ai-data-leakage.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cisos-battle-rising-cloud-security-threats.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/deepfakes-ai-generated-content-watermarking.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/new-frameworks-vulnerability-risk-assessment.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/future-ai-ethical-development.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/four-cybersecurity-trends-2025.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/cybersecurity-budgets-expand-infosec-europe-25.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/how-to-integrate-epssv4-vulnerability-system.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/vulnerability-management-lev-nist-patching.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/security-leaders-hire-entry-level.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/how-to-use-euvd-enisa.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/ways-simplify-cybersecurity-tool-stack.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/why-platformization-reshaping-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/address-ai-skills-in-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/ciso-new-mandate-technologist-to-business-enabler.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/future-thinking/why-organisations-must-prepare-now-for-post-quantum-cryptography.html</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/cybersecurity-insurance-what-do-you-need-to-know.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/data-protection-regulators-privacy-violations.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/government-cybersecurity-intervention-challenges.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/breaking-down-cybersecurity-barriers.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/how-countries-protect-critical-infrastructure.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/AI-regulation-on-the-rise.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/developing-incident-response-strategy.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/ciso-john-france-discusses-isc2.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/uk-cyber-essentials-survey-results.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/modernising-cybersecurity-industry.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/nis2-directive-compliance.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/how-to-implement-cyber-governance.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/how-sboms-improve-software-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/law-enforcement-cybersecurity-threat-intelligence-sharing.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-nis2-uk-cyber-resilience-bill-compared.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/quantum-threat-nist-standards.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/cybersecurity-of-data-centres-uk.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/cybersecurity-finance-dora-force.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/top-data-protection-fines-settlements.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-digital-operational-resilience-act-enforced.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/reviewing-uk-ai-regulation.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/cycos-project-cybersecurity-sme.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/will-the-uk-ransomware-payment-ban-work.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/the-different-types-of-information-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-does-information-security-infosec-mean.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/whats-the-difference-infosecurity-and-cyber-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-is-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/benefits-for-exhibitors-at-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/top-reasons-to-visit-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/visitor-benefits-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/why-travel-overseas-to-attend.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/convince-your-boss-to-let-you-attend.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/world-password-day-cybersecurity.html</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/how-to-disclose-software-vulnerability.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/critical-skills-for-modern-ciso.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/raconteur-cybersecurity-digital-threats-report.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/who-is-responsible-for-information-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/principles-of-information-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/top-10-cybsersecurity-certifications.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-is-ethical-hacking-and-how-does-it-work.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-is-healthcare-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/the-importance-of-cybersecurity-in-banking.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/cybersecurity-challenges-and-solutions-in-retail-industry.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-is-the-nist-cybersecurity-framework.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/navigating-cybersecurity-threats-and-risks-in-transport-industry.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/how-to-perform-cybersecurity-risk-assessment.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/what-is-an-information-security-policy.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/cybersecurity-laws-and-regulations-in-the-uk.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/10-everyday-practices-to-enhance-digital-security.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/infosecurity-europe-operational-technology-security-expert.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/patch-management-best-practices-vulnerability.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/four-tips-board-invest-cybersecurity.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/finance-guide-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/government-guide-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/manufacturing-guide-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/retail-guide-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/travel-transport-guide-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/tips-your-information-after-data-breach.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/how-security-researchers-uncover-vulnerabilities.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/how-to-effectively-teach-cybersecurity-staff.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/cybersecurity-structures-101-cert-csirt.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/cybersecurity-structures-101-security-operations-centres.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/cybersecurity-101-cnapp-guide.html</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/a-guide-to-understanding-zero-trust.html</loc><lastmod>2026-03-27</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/latest-articles.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/innovation-spotlight-for-2023.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/michael-johnson-headlines-infosecurity-europe.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/keren-elazari-delivers-cybersecurity-keynote.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/matthew-syed-keynote.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/dsit-cyber-innovation-finalists-2023.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/becky-pinkard-hall-of-fame.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/danni-brooke-women-in-cybersecurity.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/Infosecurity-europe-key-exhibitor-discussions.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/cyber-skills-shortage-keynote-discussions.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/most-innovative-cyber-sme-2023.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/infosecurity-europe-2023-in-review.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/angoka-build-drone-cyber-unit.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/cyber-budgets-set-to-increase.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/stephanie-hare-headline-speaker.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/henry-ajder-gen-ai-keynote-2024.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/high-performance-podcast-at-infosecurity-europe.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/claire-williams-on-leading-change.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/hall-of-fame-stephen-khan-inducted.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/2024-highlights.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/mindgard-wins-cyber-innovation-prize.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/top-cybersecurity-themes-shaping-the-industry.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/brian-cox-quantum-keynote.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/cybersecurity-courses-sans-institute.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/cyber-startup-programme-launch.html</loc><lastmod>2026-02-16</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/blog/show-news/infosecurity-europe-2026-first-keynote-speakers-announced.html</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/sitemap.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/digital-incentive.html</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/offers.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/code-of-conduct.html</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.infosecurityeurope.com/en-gb/tickets.html</loc><lastmod>2026-02-20</lastmod></url></urlset>