
<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//sennovate.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://sennovate.com/resources/</loc>
		<lastmod>2026-02-11T17:14:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://sennovate.com/resources/what-is-identity-and-access-management/</loc>
		<lastmod>2020-08-04T11:04:39+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/05/iStock-846202328.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/the-impact-of-ai-and-ml-on-identity-access-management/</loc>
		<lastmod>2021-01-10T08:50:30+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/07/iStock-686690190.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/galvanizing-cyber-security-in-healthcare-and-fin-tech/</loc>
		<lastmod>2021-01-13T13:55:30+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Healthcare.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/secure-insights-highlighting-data-breaches-and-the-best-approach-to-handle-it/</loc>
		<lastmod>2021-01-13T19:12:44+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Data-Breaches-And-The-Best-Approach-e1615966610273.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/digital-identities-security-budgets-and-zero-trust/</loc>
		<lastmod>2021-01-13T19:16:08+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/04/Idaptive-Multi-factor-Authentication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/what-is-single-sign-on/</loc>
		<lastmod>2021-02-06T10:19:59+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/05/iStock-926493504.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/data-use-related-to-biometrics/</loc>
		<lastmod>2021-02-09T12:18:49+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/02/DEbbie.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/security-challenges-in-a-remote-worker-world/</loc>
		<lastmod>2021-02-09T12:19:08+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/02/Data-Bank.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/single-sign-on-market-guide/</loc>
		<lastmod>2021-03-12T02:44:38+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/03/SSO-Market-Guide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/get-compete-threat-visibility-with-all-in-one-security-essentials/</loc>
		<lastmod>2021-08-20T10:55:42+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Security-Essentials.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/mitigating-the-cyber-security-risk-with-siem-and-soc/</loc>
		<lastmod>2021-08-20T10:58:12+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/04/1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/wait-where-is-everyone-security-in-the-time-of-the-remote-workforce/</loc>
		<lastmod>2021-08-20T11:42:07+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/04/IAM-Webinar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/strategies-to-streamline-itsm-it-security-management-perspective/</loc>
		<lastmod>2021-08-20T11:44:48+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/IT-Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/future-on-am-cyberark-webinar/</loc>
		<lastmod>2021-09-25T08:14:32+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/09/MicrosoftTeams-image-111.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/insurance-usecase/</loc>
		<lastmod>2021-10-06T11:05:02+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-82.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/healthcare-industry-usecase/</loc>
		<lastmod>2021-10-06T11:07:19+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-78.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/education-usecase/</loc>
		<lastmod>2021-10-06T11:22:57+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-81.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/edtech-usecase/</loc>
		<lastmod>2021-10-06T11:28:42+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-80.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/sme-usecases-free-download/</loc>
		<lastmod>2021-10-06T11:30:09+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-77.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/what-your-password-policy-should-be-and-why/</loc>
		<lastmod>2021-10-18T09:19:33+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/10/MicrosoftTeams-image-48-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/building-cybersecurity-culture-guide/</loc>
		<lastmod>2021-10-18T13:54:20+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/09/MicrosoftTeams-image-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/how-can-insurance-sector-improve-their-cybersecurity-justin-medlock-risk-and-investment-advisor/</loc>
		<lastmod>2021-11-02T12:38:41+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/11/MicrosoftTeams-image-56-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/embracing-open-source-iam-solutions/</loc>
		<lastmod>2021-11-17T10:54:58+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/11/MicrosoftTeams-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/build-a-cybersecurity-culture-in-your-organization-with-dan-lohrmann-secure-insights-part-ii/</loc>
		<lastmod>2022-02-03T12:25:41+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/09/MicrosoftTeams-image-65.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/minimize-risk-with-zero-trust/</loc>
		<lastmod>2022-02-03T12:28:30+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Minimize-Risk-Data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cyber-insurance-everything-you-need-to-know-with-jim-rutt-cio-of-dana-foundation/</loc>
		<lastmod>2022-02-09T11:18:33+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/01/Podcast-Poster.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cyber-insurance-everything-you-need-to-know-with-jim-rutt-cio-of-dana-foundation-part-2/</loc>
		<lastmod>2022-03-02T12:15:12+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/03/Youtube-Thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/importance-of-building-a-secure-mfa-framework-with-roger-grimes/</loc>
		<lastmod>2022-03-18T07:39:27+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/03/15th-January-2022-I-5-PM-IST-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/when-choosing-a-modern-single-sign-on-solution/</loc>
		<lastmod>2022-03-21T04:31:41+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/04/Modern-Single-Sign-On.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cybercrime-in-the-cloud-w-greg-foss-principal-cloud-security-researcherlacework-labs/</loc>
		<lastmod>2022-04-14T10:38:40+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/12/MicrosoftTeams-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/the-role-of-identity-and-access-management-in-cloud-security/</loc>
		<lastmod>2022-04-19T11:29:07+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/04/GregFossss.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/what-is-privileged-access-management/</loc>
		<lastmod>2022-04-23T17:39:52+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/06/nesa-by-makers-736784-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/be-a-iam-pro-in-30-days/</loc>
		<lastmod>2022-04-23T18:27:47+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2019/05/iStock-846202328.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/gluu-log4shell-patch-script/</loc>
		<lastmod>2022-05-03T14:43:43+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/01/gluu-log4shell-scanner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/forgerock-am-installation-steps/</loc>
		<lastmod>2022-05-03T16:10:57+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/05/ForgeRock-AM-Ansible-Playbook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/the-growing-importance-of-cyber-security-in-the-education-sector/</loc>
		<lastmod>2022-05-30T07:36:43+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/05/Youtube-Thumbnail-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/gluu-server-monitoring-solution/</loc>
		<lastmod>2022-08-10T04:52:07+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/02/Gluu.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/idaptive-multi-factor-authentication-services/</loc>
		<lastmod>2022-10-23T19:22:20+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/04/Idaptive-Multi-factor-Authentication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/watch-over-brute-force-attacks-with-sennovate-open-xdr-platform/</loc>
		<lastmod>2022-10-27T11:14:46+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/02/cyber-attacks-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/iam-for-startups-how-to-architect-scalable-and-secure-iam-infrastructure-using-open-source-technologies-with-kirk-sullivan/</loc>
		<lastmod>2022-12-01T12:31:50+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/12/WhatsApp-Image-2022-12-01-at-5.34.10-PM.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/build-secure-open-source-software-with-a-security-first-approach-with-santosh-yadav/</loc>
		<lastmod>2022-12-01T12:33:27+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2022/12/Podcast-Reminder-post-video.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/social-engineering-a-ticking-time-bomb-with-mike-crandall/</loc>
		<lastmod>2023-01-04T07:59:51+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/01/Promotion-post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cybersecurity-will-never-end-its-always-a-new-beginning/</loc>
		<lastmod>2023-01-10T05:25:34+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2021/02/CYBER-SECURITY-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/data-security-insights-2020/</loc>
		<lastmod>2023-01-10T05:26:21+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/DATA-SECURITY-INSIGHTS-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/how-should-we-prevent-data-breaches/</loc>
		<lastmod>2023-01-10T05:27:09+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/The-privacy-Advisor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/sharpen-your-security-by-focusing-on-people-process-and-technology/</loc>
		<lastmod>2023-01-10T05:29:47+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Sharpen-your-Security-by-Focusing-on-People-Process-and-Technology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/data-breach-and-how-this-can-be-prevented/</loc>
		<lastmod>2023-01-10T05:30:36+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Digital-Identities-Security-Budgets-And-Zero-Trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/identity-management-and-data-security-over-the-years/</loc>
		<lastmod>2023-01-10T05:31:51+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2020/08/Advancement-of-identity-management-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cyber-mayday-understanding-the-threat-and-how-to-prepare-your-organization-with-dan-lohrmann-ciso-at-presidio-part-1/</loc>
		<lastmod>2023-01-12T13:25:43+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/01/Promotion-post-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/episode-22-cyber-mayday-trilogy-part-2-manage-the-cyber-mayday/</loc>
		<lastmod>2023-01-30T05:59:07+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/01/promotion-post-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cyber-mayday-trilogy-prepare-manage-recover-from-the-cyber-mayday-part-3/</loc>
		<lastmod>2023-01-31T05:02:05+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/01/promotion-post-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/rise-of-data-breaches-in-the-healthcare-industry-and-how-to-reduce-the-risk-part-2/</loc>
		<lastmod>2023-04-04T10:04:41+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/04/Thumbnail-jon-garon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/rise-of-data-breaches-in-the-healthcare-industry-and-how-to-reduce-the-risk-part-1/</loc>
		<lastmod>2023-04-04T10:06:31+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/03/Promotion-post-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/social-engineering-the-silent-threat-lurking-in-your-digital-life-perry-carpenter-chief-evangelist-and-strategy-office-at-knowbe4/</loc>
		<lastmod>2023-07-26T11:47:57+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/07/Thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/seamless-transition-migrating-from-okta-to-azure-ad/</loc>
		<lastmod>2023-12-19T12:42:55+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/12/Usecase.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/seamless-migration-iam-from-on-premises-to-cloud-architecture/</loc>
		<lastmod>2024-01-03T06:51:29+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/01/Case-Study-ForgeRock.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/gluu-iam-migration-for-the-american-association-for-the-advancement-of-science-aaas/</loc>
		<lastmod>2024-01-03T07:08:28+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2023/09/Case-Study-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/secure-2024-a-safer-future-with-sennovate-and-stellar-cyber/</loc>
		<lastmod>2024-02-06T08:03:58+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/01/SENNOVATE-STELLAR-CYBER-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/strengthening-multi-factor-authentication-for-dermalogica/</loc>
		<lastmod>2024-02-12T14:56:01+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/02/Case-Study-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/implementing-a-global-idp-for-dermalogica/</loc>
		<lastmod>2024-03-12T09:53:42+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/03/Case-Study-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/cybersecurity-for-non-profits-in-2024-andrew-nuxoll-md-it-operations-and-cybersecurity-at-unicef-usa/</loc>
		<lastmod>2024-03-22T11:13:53+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/03/Managing-Director-IT-Operations-and-Cybersecurity-at-UNICEF-USA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/sennovate-delivers-streamlined-okta-sso-for-marqetas-secure-growth/</loc>
		<lastmod>2024-03-28T10:05:27+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/03/Case-Study-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/ennovate-socaas-for-school-security/</loc>
		<lastmod>2024-04-19T06:39:13+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/04/Case-Study-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/demystifying-application-security-what-you-need-to-know/</loc>
		<lastmod>2024-05-03T09:10:45+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/05/Derek-Fisher-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/microsoft-crowsdtrike-outage-what-really-happened/</loc>
		<lastmod>2024-07-29T15:23:39+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/07/Derek-Fisher-Thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/navigating-the-cybersecurity-maze-in-healthcare-with-vikrant-arora/</loc>
		<lastmod>2024-08-08T13:50:50+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/08/Derek-Fisher-Thumbnail-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/single-sign-on-for-oracle-apps-streamline-access-with-miniorange-sso/</loc>
		<lastmod>2024-09-06T16:29:47+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/09/Usecase-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/lets-talk-cybersecurity-technical-to-enterprise-risk-perspective-with-keith-duemling/</loc>
		<lastmod>2024-09-23T09:49:47+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/09/Keith.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/too-many-products-in-cybersecurity-is-confusing-jim-rutt-sennovate/</loc>
		<lastmod>2024-12-09T14:37:19+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2024/12/Jim-Rutt-Podcast-Thumbnail-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://sennovate.com/resources/when-automation-becomes-the-attack-surface-a-leadership-view-on-the-n8n-ni8mare-vulnerability/</loc>
		<lastmod>2026-02-11T17:14:21+00:00</lastmod>
		<image:image>
			<image:loc>http://sennovate.com/wp-content/uploads/2026/02/Blue-and-White-Corporate-Business-Case-Study-Presentation-2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->