<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://relatablesecurity.com/about/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/contact/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/cookies-policy/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/kit-barker/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/melissa-george/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/privacy-policy/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/yet-another-policy/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/advisory-governance-management-systems/control-process-design-effectiveness-reviews/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/advisory-governance-management-systems/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/advisory-governance-management-systems/management-system-certification-support/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/advisory-governance-management-systems/policy-process-standard-design/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/advisory-governance-management-systems/virtual-ciso-security-quality-advisory/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/business-resilience-continuous-improvement/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/business-resilience-continuous-improvement/process-efficiency-re-engineering/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/business-resilience-continuous-improvement/security-awareness-assurance-platform/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/business-resilience-continuous-improvement/tabletop-business-continuity-exercises/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/business-resilience-continuous-improvement/transformation-people-culture/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/security-assessment-assurance/application-threat-modelling/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/security-assessment-assurance/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/security-assessment-assurance/internal-audits-effectiveness-reviews/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/security-assessment-assurance/penetration-testing-web-application-security-reviews/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/services/security-assessment-assurance/technical-security-reviews/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/what-are-sub-processors-and-why-should-you-care/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/controller-or-processor-why-the-distinction-matters-for-data-retention/</loc>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/a-framework-for-safe-no-code-development/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/no-code-does-not-mean-no-engineer/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/leave-no-trace-why-digital-footprints-matter/</loc>
    <lastmod>2025-01-14</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/beyond-compliance-how-training-drives-business-success/</loc>
    <lastmod>2025-01-09</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/caf-and-dspt/</loc>
    <lastmod>2025-01-06</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/security-as-a-business-enabler-the-case-for-a-virtual-ciso/</loc>
    <lastmod>2024-12-17</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/data-retention-why-it-matters-and-how-to-stay-compliant/</loc>
    <lastmod>2024-11-21</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/iso27001-transition/</loc>
    <lastmod>2024-11-07</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/the-importance-of-culture/</loc>
    <lastmod>2024-10-14</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/a-positive-view-of-risk/</loc>
    <lastmod>2024-10-07</lastmod>
  </url>
  <url>
    <loc>https://relatablesecurity.com/articles/a-practical-guide-to-uk-gdpr-compliance/</loc>
    <lastmod>2024-10-07</lastmod>
  </url>
</urlset>
