<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>http://cschwartz.net/posts/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/risk-managment/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-07-17-third-party-risk-management-know-when-to-walk-away/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/third-party-risk/</loc><lastmod>2025-07-17T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/controls/</loc><lastmod>2025-07-10T06:30:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/optimizing-party-due-diligence-business-impact/</loc><lastmod>2025-07-10T06:30:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-07-02-third-party-risk-assessment-start-with-impact-not-questionnaires/</loc><lastmod>2025-07-02T05:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/governance/</loc><lastmod>2025-06-26T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-06-26-streamlining-third-party-risk-governance-in-infosec/</loc><lastmod>2025-06-26T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-06-18-third-party-risk-management-beyond-vendor-questionnaires/</loc><lastmod>2025-06-19T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/asset-inventories/</loc><lastmod>2025-06-11T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/assets/</loc><lastmod>2025-06-11T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-06-11-operational-artifacts-managing-governance-bling-spots/</loc><lastmod>2025-06-11T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/scaling-governance-secondary-assets/</loc><lastmod>2025-06-05T06:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/slicing-secondary-assets-broadly-narrow-undermines-risk-management/</loc><lastmod>2025-05-29T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/threats/</loc><lastmod>2025-05-29T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-05-22-if-everything-is-a-secondary-asset-nothing-is-manageable/</loc><lastmod>2025-05-22T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/infosec/</loc><lastmod>2025-05-22T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/tags/risks/</loc><lastmod>2025-05-15T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-05-15-threat-ontologies-over-threat-lists-less-listicle-more-logic/</loc><lastmod>2025-05-15T07:00:00+00:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-05-9-not-all-controls-all-the-time/</loc><lastmod>2025-05-09T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-05-02-infosec-inventories-need-layers/</loc><lastmod>2025-05-02T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/tags/near-misses/</loc><lastmod>2025-04-24T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-04-24-near-misses-are-worth-talking-about/</loc><lastmod>2025-04-24T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/tags/security-incidents/</loc><lastmod>2025-04-24T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/posts/2025-04-17-incident-frequency-stats-are-mostly-useless/</loc><lastmod>2025-04-17T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/tags/statistics/</loc><lastmod>2025-04-17T09:00:00+02:00</lastmod></url><url><loc>http://cschwartz.net/legal-notice/</loc></url><url><loc>http://cschwartz.net/talks/</loc></url><url><loc>http://cschwartz.net/categories/</loc></url></urlset>