<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://reidwallace.com/categories/board-level-security/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/board-level-security/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/categories/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/cyber-risk-communication/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/cyber-risk-management/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/executive-cybersecurity/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/how-cyber-professionals-should-communicate-with-executives/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/security-leadership/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/</loc>
    <lastmod>2026-01-13T04:52:23+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/cyber-risk/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/executive-leadership/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/governance/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/information-security/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/risk-management/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/what-most-executives-still-get-wrong-about-cyber-risk/</loc>
    <lastmod>2025-12-19T06:14:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/tags/cybersecurity/</loc>
    <lastmod>2025-10-30T04:10:37+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/october-cybersecurity-recap-the-top-10-stories-shaping-the-threat-landscape/</loc>
    <lastmod>2025-10-30T04:10:37+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/categories/weekly-roundup/</loc>
    <lastmod>2025-10-30T04:10:37+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/categories/ai-security/</loc>
    <lastmod>2025-09-28T01:28:16+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/u-s-government-scrambles-to-contain-cisco-firewall-breaches/</loc>
    <lastmod>2025-09-28T01:28:16+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/cybersecurity-weekly-roundup-september-12-19-2025/</loc>
    <lastmod>2025-09-19T23:50:51+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/ai-driven-cyber-threats-the-new-frontier-of-digital-risk/</loc>
    <lastmod>2025-09-13T02:20:25+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/supply-chain-shock-salesforce-breaches-without-a-direct-hack/</loc>
    <lastmod>2025-09-07T04:06:03+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/agentic-ai-took-over-black-hat-def-con-2025/</loc>
    <lastmod>2025-08-18T03:09:15+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/categories/conference-coverage/</loc>
    <lastmod>2025-08-18T03:09:15+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/posts/5-big-takeaways-from-black-hat-def-con-2025/</loc>
    <lastmod>2025-08-18T02:57:37+00:00</lastmod>
  </url><url>
    <loc>https://reidwallace.com/about/</loc>
  </url>
</urlset>
