<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://zerotrustplaybook.com/events/</loc><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/05/bsides-tampa-13-title-only-transparent.webp</image:loc><image:title>bsides-tampa-13-title-only-transparent</image:title></image:image><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/05/bsides_logo_color.webp</image:loc><image:title>BSides_Logo_Color</image:title></image:image><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/05/speaking-1.png</image:loc><image:title>speaking</image:title></image:image><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/05/speaking.png</image:loc><image:title>speaking</image:title></image:image><lastmod>2026-05-10T13:32:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zerotrustplaybook.com/zero-trust-overview-and-playbook-introduction/</loc><lastmod>2026-05-02T13:22:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zerotrustplaybook.com/about/</loc><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/04/nikhilheadshot_png.png</image:loc><image:title>NikhilHeadShot_PNG</image:title></image:image><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/04/mark-simos-bio-pic.jpg</image:loc><image:title>OLYMPUS DIGITAL CAMERA</image:title><image:caption>OLYMPUS DIGITAL CAMERA</image:caption></image:image><lastmod>2026-05-02T12:20:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zerotrustplaybook.com/playbook-roles/</loc><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/04/security-roles-1.png</image:loc><image:title>security roles</image:title></image:image><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/04/security-roles.png</image:loc><image:title>security roles</image:title></image:image><lastmod>2026-04-26T18:36:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zerotrustplaybook.com/about-zero-trust/</loc><image:image><image:loc>https://zerotrustplaybook.com/wp-content/uploads/2026/04/zero-trust-assumptions.png</image:loc><image:title>Zero Trust Assumptions</image:title></image:image><lastmod>2026-04-26T18:35:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://zerotrustplaybook.com/2026/04/19/hello-world/</loc><lastmod>2026-04-19T20:03:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://zerotrustplaybook.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-05-10T13:32:44+00:00</lastmod></url></urlset>
