<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityboulevard.com/wp-content/plugins/wordpress-seo-premium/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityboulevard.com/webinars/</loc>
		<lastmod>2020-12-04T19:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/get-your-secure-development-initiatives-in-shape-a-30-60-90-day-approach/</loc>
		<lastmod>2019-09-07T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/Secure-Development-Initiatives.jpg</image:loc>
			<image:title><![CDATA[Secure-Development-Initiatives]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/a-practical-approach-to-security-automation/</loc>
		<lastmod>2019-09-07T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Security-Automation.jpg</image:loc>
			<image:title><![CDATA[Security-Automation]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/automating-container-security-with-aws-and-lacework/</loc>
		<lastmod>2019-09-07T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Automating-Container-Security.jpg</image:loc>
			<image:title><![CDATA[Automating-Container-Security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/youre-bleeding-exposing-the-attack-surface-in-your-supply-chain/</loc>
		<lastmod>2019-09-07T05:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/07/Attack-Surface-Supply-Chain.jpg</image:loc>
			<image:title><![CDATA[Attack-Surface-Supply-Chain]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/demystifying-pci-software-security-framework-all-you-need-to-know-for-your-appsec-strategy/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/PCI-Software-Security-Framework.jpg</image:loc>
			<image:title><![CDATA[PCI-Software-Security-Framework]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/top-10-threats-to-cloud-security/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Threats-Cloud-Security.jpg</image:loc>
			<image:title><![CDATA[Threats-Cloud-Security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/pki-for-devops/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/06/PKI-DevOps.jpg</image:loc>
			<image:title><![CDATA[PKI-DevOps]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/deploying-secure-modern-apps-in-evolving-infrastructures/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/05/Secure-Modern-Apps.jpg</image:loc>
			<image:title><![CDATA[Secure-Modern-Apps]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/reduce-the-burden-of-managing-sap-with-enterprise-identity-management/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Managing-SAP.jpg</image:loc>
			<image:title><![CDATA[Managing-SAP]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/devsecops-challenges-in-a-cloud-native-world/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/DevSecOps-Cloud-Native.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Cloud-Native]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/maturing-devsecops-from-easy-to-high-impact/</loc>
		<lastmod>2019-09-07T05:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/04/Webinar-Graphics-12.png</image:loc>
			<image:title><![CDATA[Webinar-Graphics-12]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-to-kickstart-security-and-compliance-for-your-aws-azure-and-gcp-clouds/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/03/AWS-Azure-GCP-Clouds.jpg</image:loc>
			<image:title><![CDATA[AWS-Azure-GCP-Clouds]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/container-security-securing-from-within/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/02/Container-Security-1.jpg</image:loc>
			<image:title><![CDATA[Container-Security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/next-generation-cybersecurity/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/12/Next-Gen-Cybersecurity.jpg</image:loc>
			<image:title><![CDATA[Beyond-S3-Buckets]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/inside-a-docker-cryptojacking-exploit/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/11/Screen-Shot-2018-11-30-at-1.07.46-PM.png</image:loc>
			<image:title><![CDATA[docker]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/cloud-security-what-you-need-to-know/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Cloud-Security.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/2018-black-hat-hacker-survey-report-what-hackers-really-think-about-your-cyber-defenses/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Black-Hat-Hacker-Survey.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/reducing-risk-of-credential-compromise-at-netflix/</loc>
		<lastmod>2019-09-07T05:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/01/Reducing-Risk-Netflix-2.jpg</image:loc>
			<image:title><![CDATA[Beyond-S3-Buckets]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/take-a-bite-out-of-the-remediation-backlog/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Remediation-Backlog.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/operationalizing-data-for-fraud-investigations/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Fraud-Investigations.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/3-steps-to-gain-control-of-cloud-security-2/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Cloud-Security-Control.jpg</image:loc>
			<image:title><![CDATA[Cloud-Security-Control]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/beyond-s3-buckets-effective-countermeasures-for-emerging-cloud-threats/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Beyond-S3-Buckets.jpg</image:loc>
			<image:title><![CDATA[Calendars]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/ciso-security-vendor-relationship-roundtable/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/CISO-Security2.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-the-code-devops-security-and-appsec/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Security-AppSec.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-state-of-open-source-vulnerabilities-management/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/10/Vulnerabilities-Management.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/building-blocks-of-secure-development-how-to-make-open-source-work-for-youbuilding-blocks-of-secure-development-how-to-make-open-source-work-for-you/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Building-Blocks-Secure.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-trick-to-passing-your-next-compliance-audit/</loc>
		<lastmod>2019-09-07T05:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/09/Passing-Audit.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/mastering-machine-learning-for-security-professionals-a-discussion-encore-presentatuion/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Mastering-Machine-Learning.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/draft-and-develop-a-solution-to-the-cyber-security-skills-shortage/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Cyber-Security-Skills.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/3-steps-to-gain-control-of-cloud-security/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Cloud-Security-Control.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/mobile-threats-and-trends-changing-mobile-app-security/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Mobile-App-Security.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/mastering-machine-learning-for-security-professionals-a-discussion/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/06/Mastering-Machine-Learning.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/devops-security-build-time-identification-of-security-issues-a-case-study-with-jenkins-docker-and-aws/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Build-Time.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/inside-an-aws-breach-investigation/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/AWS-Breach-Investigation.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/shifting-leftand-right-to-ensure-full-application-security-coverage/</loc>
		<lastmod>2019-09-07T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/08/Full-Application-Security.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/embrace-devsecops-and-enjoy-a-significant-competitive-advantage/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/07/Embrace-DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Embrace-DevSecOps]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/improving-software-security-in-an-agile-environment-a-case-study/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Improving-Software.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/not-all-flaws-are-created-equal-the-difference-between-a-flaw-a-vulnerability-and-an-exploit/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Flaws.jpg</image:loc>
			<image:title><![CDATA[Calendars]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/security-at-the-speed-of-software-development/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/DevSecOps.jpg</image:loc>
			<image:title><![CDATA[Calendars]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/you-build-it-you-secure-it-higher-velocity-and-better-security-with-devsecops/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/04/DevOpscom_Banner-Graphic_BuildIt-SecureIt_v1.png</image:loc>
			<image:title><![CDATA[DevOpscom_Banner-Graphic_BuildIt-SecureIt_v1]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-4-current-threats-enterprises-cant-ignore/</loc>
		<lastmod>2019-09-07T05:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/05/Current-Threats.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/2018-year-ahead-cybersecurity/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Ahead.jpg</image:loc>
			<image:title><![CDATA[Ahead]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/data-breach-stolen-credentials/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Breach-1.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/seven-deadly-saves-security-integrations/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Deadly-1.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/this-year-at-rsa-dont-miss-the-conversation-on-devsecops/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/03/Conversation.jpg</image:loc>
			<image:title><![CDATA[Calendars]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/rsa-2018-whats-hot-cyber-security-space/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Hot.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/machine-learning-ai-will-improve-cyber-security/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Improve2.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/implementing-secure-devops-challenges-opportunities/</loc>
		<lastmod>2019-09-07T05:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/02/Secure.jpg</image:loc>
			<image:title><![CDATA[Canada]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/security-as-code/</loc>
		<lastmod>2019-09-07T05:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/Sacrificing.jpg</image:loc>
			<image:title><![CDATA[BeyondVision2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/resolution-2018-five-principles-securing-devops/</loc>
		<lastmod>2019-09-07T05:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/Five-1.jpg</image:loc>
			<image:title><![CDATA[Hot2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/demand-viewing-gdpr-getting-ready-give-company-left-hook/</loc>
		<lastmod>2019-09-07T05:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2018/01/LeftHook.jpg</image:loc>
			<image:title><![CDATA[LeftHook]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/better-training-better-security/</loc>
		<lastmod>2019-09-07T05:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2017/09/CILiveChat.jpg</image:loc>
			<image:title><![CDATA[CILiveChat]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-next-generation-of-application-security/</loc>
		<lastmod>2019-09-23T19:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Next-Generation-Security-Applications.jpg</image:loc>
			<image:title><![CDATA[Beyond-S3-Buckets]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/build-fast-secure-well-automate-devsecops-and-secure-your-cloud/</loc>
		<lastmod>2019-09-26T18:08:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/DevSecOps-Secure-Cloud.jpg</image:loc>
			<image:title><![CDATA[DevSecOps-Secure-Cloud]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/taking-open-source-security-to-the-next-level/</loc>
		<lastmod>2019-10-02T16:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/Forrester-and-WhiteSource.png</image:loc>
			<image:title><![CDATA[Forrester and WhiteSource]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/dont-get-stuck-in-the-encryption-stone-age/</loc>
		<lastmod>2019-10-08T18:37:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/Encryption-Stone-Age-1.jpg</image:loc>
			<image:title><![CDATA[Encryption-Stone-Age]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/dont-let-vulnerabilities-create-a-hole-in-your-organization/</loc>
		<lastmod>2019-10-18T13:58:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Vulnerabilities-Organization.jpg</image:loc>
			<image:title><![CDATA[Vulnerabilities-Organization]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/open-source-security-weighing-the-pros-and-cons/</loc>
		<lastmod>2019-10-21T19:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Open-Source-Pros-Cons.jpg</image:loc>
			<image:title><![CDATA[Beyond-S3-Buckets]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/6-essential-steps-to-avoid-container-security-vulnerabilities/</loc>
		<lastmod>2019-10-23T15:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/Container-Security-Vulnerabilities-1.jpg</image:loc>
			<image:title><![CDATA[Container-Security-Vulnerabilities]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/software-defined-segmentation-done-easily-quickly-and-right/</loc>
		<lastmod>2019-10-29T18:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Software-Defined-Segmentation.jpg</image:loc>
			<image:title><![CDATA[Software-Defined-Segmentation]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-impact-of-digital-transformation-on-enterprise-security/</loc>
		<lastmod>2019-10-29T18:50:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Digital-Transformation-Enterprise-Security.jpg</image:loc>
			<image:title><![CDATA[Digital-Transformation-Enterprise-Security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/top-cybersecurity-threats-and-how-to-protect-yourself-against-them/</loc>
		<lastmod>2019-11-14T17:10:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/10/Top-Cybersecurity-Threats-1.jpg</image:loc>
			<image:title><![CDATA[Top-Cybersecurity-Threats]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/trends-in-threat-analysis/</loc>
		<lastmod>2019-11-18T19:50:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Trends-Threats-Analysis.jpg</image:loc>
			<image:title><![CDATA[Beyond-S3-Buckets]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/sap-concurs-cloud-journey/</loc>
		<lastmod>2019-11-19T20:40:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/09/SAP-Concur-Cloud-Journey.jpg</image:loc>
			<image:title><![CDATA[SAP-Concur-Cloud-Journey]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/cloud-security-keeping-serverless-data-safe/</loc>
		<lastmod>2019-12-09T18:10:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/08/Cloud-Security-Serverless-Data.jpg</image:loc>
			<image:caption><![CDATA[multicloud]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-mobile-apps-from-the-inside-out/</loc>
		<lastmod>2019-12-10T21:01:35+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2019/11/Securing-Mobile-Apps.jpg</image:loc>
			<image:title><![CDATA[Securing-Mobile-Apps]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-role-of-security-technologists-in-public-policy/</loc>
		<lastmod>2020-01-11T04:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/SB-The-Role-of-Security.png</image:loc>
			<image:title><![CDATA[SB The Role of Security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/from-dystopia-to-opportunity-stories-from-the-future-of-cybersecurity/</loc>
		<lastmod>2020-01-11T04:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Security-Boulevard-Webinar.png</image:loc>
			<image:title><![CDATA[Security Boulevard Webinar]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/new-paradigms-for-the-next-era-of-security/</loc>
		<lastmod>2020-01-11T05:01:05+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Security-Boulevard-Webinar-1.png</image:loc>
			<image:title><![CDATA[Security Boulevard Webinar]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-guide-to-managing-the-security-of-your-saas-and-cloud-providers/</loc>
		<lastmod>2020-01-22T18:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/The-guide-to.png</image:loc>
			<image:title><![CDATA[The guide to]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/top-cybersecurity-threats-and-how-siem-protects-against-them/</loc>
		<lastmod>2020-02-05T19:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/01/Top-Threats.png</image:loc>
			<image:title><![CDATA[Top Threats]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/shift-application-security-knowledge-left-to-deliver-secure-code-on-time/</loc>
		<lastmod>2020-03-04T17:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Shift-application.png</image:loc>
			<image:title><![CDATA[Shift application]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/best-practices-to-secure-containerized-apps-with-next-gen-waf/</loc>
		<lastmod>2020-03-09T18:33:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/Best-WAF-practices.png</image:loc>
			<image:title><![CDATA[Best WAF practices]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-apis-at-devops-speed/</loc>
		<lastmod>2020-03-19T19:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/DevOps-Speed2.png</image:loc>
			<image:title><![CDATA[DevOps Speed2]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-state-of-open-source-security/</loc>
		<lastmod>2020-03-23T18:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/02/The-State-of-Open-Source.png</image:loc>
			<image:title><![CDATA[The State of Open Source]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/protect-yourself-from-cyber-attacks-through-proper-third-party-risk-management/</loc>
		<lastmod>2020-03-31T17:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Untitled-1.png</image:loc>
			<image:title><![CDATA[Untitled-1]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/integrate-security-early-and-often-for-successful-devsecops/</loc>
		<lastmod>2020-04-09T18:45:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/03/Integrate.png</image:loc>
			<image:title><![CDATA[Integrate]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/outside-looking-in-how-to-stop-the-rapid-rise-of-insider-threats/</loc>
		<lastmod>2020-05-07T17:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/04/How-to-stop.png</image:loc>
			<image:title><![CDATA[How to stop]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/simplifying-security-for-openshift-and-ansible-environments-with-cyberark/</loc>
		<lastmod>2020-05-28T19:20:47+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Simplified-SB.png</image:loc>
			<image:title><![CDATA[Simplified SB]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-to-standup-an-application-security-program-fast-a-practical-and-strategic-approach/</loc>
		<lastmod>2020-06-02T18:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/How-to-stand-up.png</image:loc>
			<image:title><![CDATA[How to stand up]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/why-securing-server-side-javascript-source-code-is-so-hard-how-to-fix-it/</loc>
		<lastmod>2020-06-03T19:24:07+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Why-securing-server-side-SB.png</image:loc>
			<image:title><![CDATA[Why securing server side SB]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/threat-informed-defense-transforming-the-security-organization-as-we-know-it/</loc>
		<lastmod>2020-06-17T21:05:26+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/05/Transforming-organization.png</image:loc>
			<image:title><![CDATA[Transforming organization]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/controlling-cloud-costs-with-hashicorp-terraform/</loc>
		<lastmod>2020-06-29T13:53:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Controlling.png</image:loc>
			<image:title><![CDATA[Controlling]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-i-achieved-security-discipline-and-governance-across-aws-azure-and-gcp/</loc>
		<lastmod>2020-07-01T20:57:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/How-I-achieved.png</image:loc>
			<image:title><![CDATA[How I achieved]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/turn-cloud-events-into-actionable-security/</loc>
		<lastmod>2020-07-09T19:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Turn-into-02.png</image:loc>
			<image:title><![CDATA[Turn into-02]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/achieving-the-optimal-application-security-posture-across-the-enterprise/</loc>
		<lastmod>2020-07-13T20:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/AppSec-Posture-01.png</image:loc>
			<image:title><![CDATA[AppSec Posture-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/protect2020-securing-the-heart-of-our-election-systems/</loc>
		<lastmod>2020-07-15T17:06:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/protect-2020-01.png</image:loc>
			<image:title><![CDATA[protect 2020-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/yes-you-can-apply-nist-iso-controls-to-unmanaged-iot-devices/</loc>
		<lastmod>2020-07-16T18:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Yes-you-can-01.png</image:loc>
			<image:title><![CDATA[Yes you can-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/theres-an-openbullet-attack-config-for-your-site-what-should-you-do/</loc>
		<lastmod>2020-07-22T19:05:33+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/06/Open-bullet-attack-01.png</image:loc>
			<image:title><![CDATA[Open bullet attack-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-ever-evolving-trendlines-in-cloud-native-security-2020/</loc>
		<lastmod>2020-07-31T16:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/7.31.20-Palo-Alto-01.png</image:loc>
			<image:title><![CDATA[7.31.20 Palo Alto-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/immutable-security-for-immutable-infrastructure/</loc>
		<lastmod>2020-08-05T18:57:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/Immutable-security-01.png</image:loc>
			<image:title><![CDATA[Immutable security-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/pki-in-devops-how-to-deploy-certificate-automation-within-ci-cd/</loc>
		<lastmod>2020-08-13T20:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/8.13.20-Keyfactor-01.png</image:loc>
			<image:title><![CDATA[8.13.20 Keyfactor-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/cyber-crisis-simulation-live-youre-in-control/</loc>
		<lastmod>2020-09-01T18:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/07/9.1.20-Immersive-Labs-01.png</image:loc>
			<image:title><![CDATA[9.1.20 Immersive Labs-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/industry-best-practices-for-ssh-access/</loc>
		<lastmod>2020-09-09T20:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/9.9.20-Gravitational-01.png</image:loc>
			<image:title><![CDATA[9.9.20 Gravitational-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/managing-the-appsec-toolstack/</loc>
		<lastmod>2020-09-21T18:42:52+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/9.21.20-AppSec-Panel-03-01.png</image:loc>
			<image:title><![CDATA[9.21.20 AppSec Panel-03-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/preventing-code-leaks-other-critical-security-risks-from-code/</loc>
		<lastmod>2020-09-22T20:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/08/9.22.20-BlueBracket-01.png</image:loc>
			<image:title><![CDATA[9.22.20 BlueBracket-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-the-cloud-breaks-traditional-security-approaches/</loc>
		<lastmod>2020-09-23T15:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/9.23.20-Lacework-01.png</image:loc>
			<image:title><![CDATA[9.23.20 Lacework-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/automating-app-security-with-ai-how-to-secure-a-million-lines-of-code-in-five-minutes/</loc>
		<lastmod>2020-09-24T20:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/9.24.20-Irdeto-01-01.png</image:loc>
			<image:title><![CDATA[9.24.20 Irdeto-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/step-by-step-guide-to-protecting-web-apps-with-google-recaptcha/</loc>
		<lastmod>2020-09-29T20:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/09/9.29.20-Chronicle-01.png</image:loc>
			<image:title><![CDATA[9.29.20 Chronicle-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-future-of-active-host-vulnerability-monitoring/</loc>
		<lastmod>2020-10-21T16:18:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/SB-Webinar-Lacework-10.21.20-01.png</image:loc>
			<image:title><![CDATA[SB Webinar Lacework 10.21.20-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/more-than-monitoring-how-observability-takes-you-from-firefighting-to-fire-prevention/</loc>
		<lastmod>2020-10-27T13:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/10.27.20-Splunk-01.png</image:loc>
			<image:title><![CDATA[10.27.20 Splunk-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/best-practices-for-driving-software-quality-through-a-federated-application-security-responsibility-model/</loc>
		<lastmod>2020-10-28T19:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/SB-ZeroNorth-10.28.20-01.png</image:loc>
			<image:title><![CDATA[SB ZeroNorth 10.28.20-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-to-make-the-promise-of-machine-learning-a-reality/</loc>
		<lastmod>2020-10-29T20:42:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/10-29-20-ThreatStack-SB-01.png</image:loc>
			<image:title><![CDATA[10-29-20 ThreatStack SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/issues-and-answers-in-cloud-security/</loc>
		<lastmod>2020-10-30T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/12-14-20-SB-Panel-01.png</image:loc>
			<image:title><![CDATA[12-14-20 SB Panel-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/cyber-threat-intelligence-highlights-and-trends-for-2020/</loc>
		<lastmod>2020-11-03T16:32:06+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-3-20-Nokia-SB-01.png</image:loc>
			<image:title><![CDATA[11-3-20 Nokia SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/discover-deliver-and-secure-your-apis-anywhere/</loc>
		<lastmod>2020-11-04T03:31:37+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/12-16-20-Volterra-SB-01-01.png</image:loc>
			<image:title><![CDATA[12-16-20 Volterra SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/xdr-extended-detection-and-response-the-next-generation-of-protection/</loc>
		<lastmod>2020-11-04T07:28:51+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-8-20-Cynet-SB-01-01.png</image:loc>
			<image:title><![CDATA[12-8-20 Cynet SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/data-security-for-contact-centers-leveraging-cloud-technologies/</loc>
		<lastmod>2020-11-05T03:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/11-10-20-Echoh-SB-01-01.png</image:loc>
			<image:title><![CDATA[11-10-20 Echoh SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/modern-code-analysis-workflows-for-javascript/</loc>
		<lastmod>2020-11-05T22:48:10+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-5-20-ShiftLeft-SB-01.png</image:loc>
			<image:title><![CDATA[11-5-20 ShiftLeft SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-devsecops-showdown-how-to-bridge-the-gap-between-security-and-developers/</loc>
		<lastmod>2020-11-10T20:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-10-20-WhiteSource-SB-01.png</image:loc>
			<image:title><![CDATA[11-10-20 WhiteSource SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/threats-at-the-kitchen-table-balancing-security-and-usability-in-remote-workforces/</loc>
		<lastmod>2020-11-11T18:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-11-20-Immersive-Labs-SB-01.png</image:loc>
			<image:title><![CDATA[11-11-20 Immersive Labs SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/static-analysis-of-scala-applications/</loc>
		<lastmod>2020-11-11T20:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/11-11-20-ShiftLeft-SB-01.png</image:loc>
			<image:title><![CDATA[11-11-20 ShiftLeft SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/pentest-as-a-service-impact-2020/</loc>
		<lastmod>2020-11-16T19:52:20+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/SB-Cobalt-11.16.20-01-1.png</image:loc>
			<image:title><![CDATA[SB Cobalt 11.16.20-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/solving-kubernetes-security-challenges-using-red-hat-openshift-and-sysdig/</loc>
		<lastmod>2020-11-16T19:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-17-20-Sysdig-SB-01-01.png</image:loc>
			<image:title><![CDATA[12-17-20 Sysdig SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/integrating-data-security-into-the-devsecops-toolchain/</loc>
		<lastmod>2020-11-17T21:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-17-20-Fortanix-SB-01-01-01.png</image:loc>
			<image:title><![CDATA[11-17-20 Fortanix SB-01-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/shifting-compliance-and-security-left-into-the-hands-of-the-developers/</loc>
		<lastmod>2020-11-18T18:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-18-20-WhiteSource-SB-01.png</image:loc>
			<image:title><![CDATA[11-18-20 WhiteSource SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/zero-trust-network-security-for-containers-and-kubernetes/</loc>
		<lastmod>2020-11-19T19:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/11-19-20-Sysdig-SB-01.png</image:loc>
			<image:title><![CDATA[11-19-20 Sysdig SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/protecting-mobile-apps-and-apis-from-the-inside-out/</loc>
		<lastmod>2020-11-20T14:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/11-19-20-Numerify-SB-01.png</image:loc>
			<image:title><![CDATA[11-19-20 Numerify SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/secure-your-peace-of-mind-and-your-mobile-app-while-giving-developers-back-their-happy-coding-time/</loc>
		<lastmod>2020-11-23T13:47:55+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-17-20-Irdeto-01.png</image:loc>
			<image:title><![CDATA[12-17-20 Irdeto-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-medical-apps-in-the-age-of-covid-19-how-to-close-security-gaps-and-meet-accelerated-demand/</loc>
		<lastmod>2020-11-23T19:22:24+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-16-20-Intertrust-SB-01-01.png</image:loc>
			<image:title><![CDATA[12-16-20 Intertrust SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/unsolved-problems-in-open-source-security/</loc>
		<lastmod>2020-11-30T17:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-16-20-WhiteSource-SB-01.png</image:loc>
			<image:title><![CDATA[12-16-20 WhiteSource SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/a-new-years-ransomware-resolution/</loc>
		<lastmod>2020-11-30T18:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/1-19-21-Axio-SB-01.png</image:loc>
			<image:title><![CDATA[1-19-21 Axio SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-medical-apps-in-the-age-of-covid-19-how-to-close-security-gaps-and-meet-accelerated-demand-2/</loc>
		<lastmod>2020-11-30T18:37:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-16-20-Intertrust-SB-01-01-1.png</image:loc>
			<image:title><![CDATA[12-16-20 Intertrust SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/hotels-hookups-and-video-conferencing-a-top-10-countdown-to-2020s-worst-data-breaches/</loc>
		<lastmod>2020-12-01T20:18:29+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-1-20-Sonrai-SB-01.png</image:loc>
			<image:title><![CDATA[12-1-20 Sonrai SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/securing-javascript-go-code-with-insights-and-analytics/</loc>
		<lastmod>2020-12-02T00:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/12/12-17-20-ShiftLeft-01.png</image:loc>
			<image:title><![CDATA[12-17-20 ShiftLeft-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/12-things-to-get-right-for-successful-devsecops/</loc>
		<lastmod>2020-12-02T14:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-15-20-Lacework-SB-01-01-1.png</image:loc>
			<image:title><![CDATA[12-15-20 Lacework SB-01-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/devsecops-best-practices-for-enterprises/</loc>
		<lastmod>2020-12-02T18:24:32+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-2-20-WhiteSource-SB-01-1.png</image:loc>
			<image:title><![CDATA[12-2-20 WhiteSource SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/simple-alternative-to-kubernetes-container-orchestration-with-nomad/</loc>
		<lastmod>2020-12-02T22:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-2-20-Hashicorp-SB-01.png</image:loc>
			<image:title><![CDATA[12-2-20 Hashicorp SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/how-to-govern-identities-and-access-in-cloud-infrastructure-appsflyer-case-study/</loc>
		<lastmod>2020-12-03T19:49:54+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/11/12-3-20-Ermetic-SB-01.png</image:loc>
			<image:title><![CDATA[12-3-20 Ermetic SB-01]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://securityboulevard.com/webinars/the-battle-for-container-security/</loc>
		<lastmod>2020-12-04T19:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://securityboulevard.com/wp-content/uploads/2020/10/12-7-20-SB-Panel-01-01-01.png</image:loc>
			<image:title><![CDATA[12-7-20 SB Panel-01-01-01]]></image:title>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->