<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://siegecyber.com.au/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-03 09:17:45 GMT -->
	<url>
		<loc>https://siegecyber.com.au/</loc>
		<lastmod>2026-03-31T00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/privacy-policy/</loc>
		<lastmod>2025-03-25T05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/home/</loc>
		<lastmod>2026-01-29T18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services-page/</loc>
		<lastmod>2023-09-24T07:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/faq/</loc>
		<lastmod>2024-05-30T02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/about/</loc>
		<lastmod>2026-03-26T00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/contact-us/</loc>
		<lastmod>2026-02-09T08:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/brisbane-cyber-security/</loc>
		<lastmod>2024-01-25T06:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/gold-coast-cyber-security/</loc>
		<lastmod>2024-01-25T07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/townsville-cyber-security/</loc>
		<lastmod>2024-01-25T07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/cairns-cyber-security/</loc>
		<lastmod>2024-01-25T06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/sydney-cyber-security/</loc>
		<lastmod>2024-01-25T07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/melbourne-cyber-security/</loc>
		<lastmod>2024-01-25T07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/perth-cyber-security/</loc>
		<lastmod>2024-01-25T07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/adelaide-cyber-security/</loc>
		<lastmod>2024-01-25T06:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/canberra-cyber-security/</loc>
		<lastmod>2024-01-25T06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/hobart-cyber-security/</loc>
		<lastmod>2024-01-25T07:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/newcastle-cyber-security/</loc>
		<lastmod>2024-01-25T07:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/sunshine-coast-cyber-security/</loc>
		<lastmod>2024-01-25T07:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/tweed-heads-cyber-security/</loc>
		<lastmod>2024-01-25T07:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/code-of-conduct/</loc>
		<lastmod>2025-02-12T07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/modern-slavery-statement/</loc>
		<lastmod>2025-02-12T07:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/australian-reconciliation-action-plan/</loc>
		<lastmod>2025-02-12T07:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/environmental-social-governance-policy/</loc>
		<lastmod>2025-02-12T07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/home-copy-2/</loc>
		<lastmod>2026-01-28T11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/home-copy/</loc>
		<lastmod>2026-01-28T10:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-for-small-business-australia/</loc>
		<lastmod>2026-04-01T08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-soc-2-mandatory-in-australia/</loc>
		<lastmod>2026-03-30T08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/web-application-penetration-testing-secure-your-online-assets/</loc>
		<lastmod>2026-03-30T07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-risk-assessment-a-guide/</loc>
		<lastmod>2026-03-25T07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc-2-for-australian-saas-companies/</loc>
		<lastmod>2026-03-25T06:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-prepare-for-a-penetration-test-a-step-by-step-checklist/</loc>
		<lastmod>2026-03-25T06:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-the-soci-act-guide-for-australian-businesses/</loc>
		<lastmod>2026-02-24T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-prepare-for-a-soc-2-audit-timeline-steps-and-common-mistakes/</loc>
		<lastmod>2026-02-22T00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-penetration-testing-required-for-soc-2-what-you-actually-need-to-know/</loc>
		<lastmod>2026-02-21T23:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-audit-what-to-expect-at-stage-1-and-stage-2/</loc>
		<lastmod>2026-02-21T23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-much-does-soc-2-certification-cost-in-australia/</loc>
		<lastmod>2026-02-21T23:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/5-types-of-penetration-testing-every-australian-business-should-know/</loc>
		<lastmod>2026-02-21T23:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/security-of-critical-infrastructure-act-compliance-services/</loc>
		<lastmod>2026-03-26T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-certification-in-australia-the-complete-2026-guide/</loc>
		<lastmod>2026-02-21T22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-ultimate-soc-2-compliance-checklist-for-australian-companies/</loc>
		<lastmod>2026-02-21T22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-complete-guide-to-penetration-testing-in-brisbane/</loc>
		<lastmod>2026-02-21T22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-iso-27001-a-simple-guide-for-australian-business-owners/</loc>
		<lastmod>2026-02-16T23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc-2-trust-service-criteria-explained-security-availability-and-beyond/</loc>
		<lastmod>2026-02-16T23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-much-does-penetration-testing-cost-in-australia-2026-pricing-guide/</loc>
		<lastmod>2026-02-16T22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-iso-27001-checklist-every-step-from-gap-analysis-to-certification/</loc>
		<lastmod>2026-02-16T22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc-2-compliance-for-australian-businesses/</loc>
		<lastmod>2026-02-16T22:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-for-iso-27001-what-your-auditor-expects/</loc>
		<lastmod>2026-02-16T07:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-australia-why-it-matters-and-how-to-get-started/</loc>
		<lastmod>2026-02-16T07:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc-2-type-1-vs-type-2/</loc>
		<lastmod>2026-02-16T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-testing-from-the-inside-matters/</loc>
		<lastmod>2026-02-15T01:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-certification-cost-in-australia/</loc>
		<lastmod>2026-02-14T22:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc-2-in-australia-2026/</loc>
		<lastmod>2026-02-14T22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-internal-audit/</loc>
		<lastmod>2026-02-13T22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-penetration-testing-a-plain-english-guide-for-australian-businesses/</loc>
		<lastmod>2026-02-10T07:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-certification-australia/</loc>
		<lastmod>2026-01-13T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/vanta-support/</loc>
		<lastmod>2025-10-27T06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cmmc/</loc>
		<lastmod>2026-02-23T21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/irap-audit-certification/</loc>
		<lastmod>2025-08-24T00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/irap-readiness/</loc>
		<lastmod>2025-08-24T22:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/official-vanta-partner/</loc>
		<lastmod>2026-01-20T02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/siege-cybers-drata-partnership/</loc>
		<lastmod>2026-01-20T02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/critical-role-of-continuous-vulnerability-scanning/</loc>
		<lastmod>2025-03-31T22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-growing-threat-of-maritime-cybersecurity-in-australia-and-the-indo-pacific/</loc>
		<lastmod>2025-03-31T22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/finalist-for-cyber-security-consulting-business-of-the-year/</loc>
		<lastmod>2025-03-02T01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cybersecurity-and-privacy-reforms-2025/</loc>
		<lastmod>2025-02-24T04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/importance-of-a-incident-response-plan/</loc>
		<lastmod>2024-12-07T08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/advantages-of-continuous-vulnerability-scanning-for-companies-in-australia/</loc>
		<lastmod>2024-12-07T08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cyber-security-policy-development/</loc>
		<lastmod>2026-02-13T22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cyber-insurance-readiness/</loc>
		<lastmod>2025-02-23T06:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/top-10-cyber-security-companies-in-brisbane-2026/</loc>
		<lastmod>2025-03-02T02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/top-10-cyber-security-companies-in-brisbane-2025/</loc>
		<lastmod>2025-03-02T02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/tabletop-exercises/</loc>
		<lastmod>2026-02-13T21:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/defence-industry-security-program-disp/</loc>
		<lastmod>2026-03-26T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/report-a-cybersecurity-incident-to-the-asd/</loc>
		<lastmod>2024-12-30T01:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/aaustralias-leading-experts-in-soc-2-vulnerability-management/</loc>
		<lastmod>2025-03-02T03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/smb1001-for-australian-companies/</loc>
		<lastmod>2024-12-07T07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/leading-iso-27001-vulnerability-management-experts/</loc>
		<lastmod>2025-03-02T03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-6clicks-experts-for-compliance-risk-management/</loc>
		<lastmod>2025-03-02T03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-vanta-experts-for-compliance-success/</loc>
		<lastmod>2025-03-02T02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-iso-27001-data-loss-prevention-dlp-experts/</loc>
		<lastmod>2025-03-02T03:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-soc-2-data-loss-prevention-dlp-experts/</loc>
		<lastmod>2025-03-02T03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-soc-2-identity-and-access-management-iam-experts/</loc>
		<lastmod>2025-03-02T03:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-soc-2-security-information-and-event-management/</loc>
		<lastmod>2025-03-02T03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australias-leading-iso-27001-security-information-and-event-management/</loc>
		<lastmod>2025-03-02T03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-identity-and-access-management/</loc>
		<lastmod>2025-03-02T03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/right-fit-for-risk-cyber-security-accreditation-guide/</loc>
		<lastmod>2024-08-17T10:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/our-first-90-days-as-your-vciso/</loc>
		<lastmod>2024-08-17T08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/becoming-iso-27001-certified/</loc>
		<lastmod>2024-08-17T08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/achieving-iso-27001-best-practices-for-australian-business/</loc>
		<lastmod>2024-07-23T01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/right-fit-for-risk/</loc>
		<lastmod>2026-03-26T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cybersecurity-with-cybercert-smb1001/</loc>
		<lastmod>2024-08-17T21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/smb1001/</loc>
		<lastmod>2024-08-17T21:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/maritime-cyber-security/</loc>
		<lastmod>2024-06-26T21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-power-of-penetration-testing/</loc>
		<lastmod>2024-06-25T01:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/top-5-benefits-of-vulnerability-management-as-a-service-vmaas-for-small-businesses/</loc>
		<lastmod>2024-06-24T00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-safeguarding-australian-organisations/</loc>
		<lastmod>2024-06-23T23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/maritime-cyber-security/</loc>
		<lastmod>2024-06-26T21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-power-of-vciso-protecting-australia/</loc>
		<lastmod>2024-06-23T22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-siege-cyber-is-australias-top-cyber-security-company/</loc>
		<lastmod>2024-06-12T09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-101/</loc>
		<lastmod>2024-05-30T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cybersecurity-maturity-for-australian-companies/</loc>
		<lastmod>2024-05-30T01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-attacks-in-australia-cyber-insurance/</loc>
		<lastmod>2024-05-30T01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-monthly-vulnerability-assessments/</loc>
		<lastmod>2024-05-30T01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-power-of-phishing-testing/</loc>
		<lastmod>2024-03-27T05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/mastering-incident-response-planning/</loc>
		<lastmod>2024-03-27T04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/safeguarding-critical-infrastructure-in-australia/</loc>
		<lastmod>2024-02-13T22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/a-ciso-guide-to-cybersecurity-in-australia/</loc>
		<lastmod>2024-05-30T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-legal-regulatory-and-contractual-requirements-in-australia/</loc>
		<lastmod>2024-02-02T21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-get-asd-essential-8-alignment/</loc>
		<lastmod>2024-02-01T22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-get-apra-cps-234-certification/</loc>
		<lastmod>2024-02-02T21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-get-your-company-soc2-certified/</loc>
		<lastmod>2024-02-02T21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-get-cyber-insurance-in-australia/</loc>
		<lastmod>2024-01-31T21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-incident-management-training-testing/</loc>
		<lastmod>2024-05-30T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/incident-investigation-and-evaluation/</loc>
		<lastmod>2024-05-30T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-get-nist-certification-a-comprehensive-guide/</loc>
		<lastmod>2024-01-30T05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-you-should-know-about-soc2/</loc>
		<lastmod>2024-02-02T04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-certification-in-australia/</loc>
		<lastmod>2024-05-30T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-information-asset-identification-and-classification/</loc>
		<lastmod>2024-02-02T07:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-incident-containment-methods/</loc>
		<lastmod>2024-02-02T10:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-robust-information-security-programs/</loc>
		<lastmod>2024-05-30T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-incident-response-communications/</loc>
		<lastmod>2024-02-02T10:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-guide-australia-incident-response-plan/</loc>
		<lastmod>2024-05-30T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-risk-and-compliance-in-australia/</loc>
		<lastmod>2024-01-24T05:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-robust-disaster-recovery-plan/</loc>
		<lastmod>2024-02-02T09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-establish-and-maintain-information-security-processes/</loc>
		<lastmod>2024-05-30T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-resilient-business-continuity-plan/</loc>
		<lastmod>2024-02-02T08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-risk-assessment-and-analysis/</loc>
		<lastmod>2024-02-02T07:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-you-should-know-about-apra-cps-234/</loc>
		<lastmod>2024-02-02T06:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/reporting-information-security-metrics/</loc>
		<lastmod>2024-05-30T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-information-security-awareness-and-training/</loc>
		<lastmod>2024-02-02T08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-apra-cps-234-is-required-for-australia/</loc>
		<lastmod>2024-05-30T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-how-to-gain-ongoing-commitment-from-senior-leadership/</loc>
		<lastmod>2024-02-02T21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-security-control-testing-and-evaluation/</loc>
		<lastmod>2024-05-30T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unraveling-the-mystery-of-credential-stuffing-attacks/</loc>
		<lastmod>2024-01-17T04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-information-security-control/</loc>
		<lastmod>2024-02-02T08:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-information-security-program-resources/</loc>
		<lastmod>2024-05-30T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-and-when-soc2-is-required/</loc>
		<lastmod>2024-02-02T04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-developing-business-cases/</loc>
		<lastmod>2024-02-02T21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/information-security-policies-and-guidelines/</loc>
		<lastmod>2024-05-30T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/understanding-apra-cps-234-requirements/</loc>
		<lastmod>2024-02-02T06:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/maintaining-a-security-governance-framework/</loc>
		<lastmod>2024-05-30T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/who-needs-cyber-insurance-in-australia/</loc>
		<lastmod>2024-02-01T08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-threat-landscape-in-australia/</loc>
		<lastmod>2024-05-30T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc2-compliance-for-brisbane-companies/</loc>
		<lastmod>2024-02-02T04:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-maintaining-an-information-security-strategy/</loc>
		<lastmod>2024-05-30T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/industry-standards-and-frameworks-for-information-security/</loc>
		<lastmod>2024-05-30T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-post-incident-review-practices/</loc>
		<lastmod>2024-02-02T20:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-risk-monitoring-and-reporting/</loc>
		<lastmod>2024-02-02T07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/monthly-cyber-security-as-a-service/</loc>
		<lastmod>2024-01-31T22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-information-governance-frameworks/</loc>
		<lastmod>2024-02-02T07:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-role-of-a-cybersecurity-scorecard/</loc>
		<lastmod>2024-01-06T07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-it-compliance-landscape/</loc>
		<lastmod>2024-01-06T07:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-asd-essential-8-mandatory-in-australia/</loc>
		<lastmod>2024-05-30T01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/suspected-compromise-assessment/</loc>
		<lastmod>2024-01-08T06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/compromise-assessment/</loc>
		<lastmod>2023-12-25T02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/risk-assessment-with-soc2/</loc>
		<lastmod>2024-02-02T04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/corporate-cybersecurity-travel-policy/</loc>
		<lastmod>2023-12-19T23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-companies-checklist-for-cyber-insurance/</loc>
		<lastmod>2024-02-01T08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/apra-cps-234-vs-asd-essential-8/</loc>
		<lastmod>2024-02-02T06:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/conducting-risk-assessment-with-apra-cps-234/</loc>
		<lastmod>2024-05-30T01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-soc2-mandatory-in-australia/</loc>
		<lastmod>2024-02-02T04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cyber-audit/</loc>
		<lastmod>2024-06-26T01:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/incident-response-plan/</loc>
		<lastmod>2026-02-13T21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-you-should-know-about-cyber-insurance/</loc>
		<lastmod>2024-02-01T21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/apra-cps-234-for-brisbane-companies/</loc>
		<lastmod>2024-02-02T06:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-you-should-know-about-iso-27001/</loc>
		<lastmod>2024-05-30T01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-asd-essential-8-is-essential/</loc>
		<lastmod>2024-05-30T01:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/asd-essential-8-vs-nist/</loc>
		<lastmod>2024-02-01T22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-asd-essential-8-requirements/</loc>
		<lastmod>2024-02-01T22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-vs-asd-essential-8/</loc>
		<lastmod>2024-01-30T06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-you-should-know-about-nist/</loc>
		<lastmod>2024-01-31T21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-iso-27001-mandatory-in-australia/</loc>
		<lastmod>2024-01-30T01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-apra-cps-234-mandatory-in-australia/</loc>
		<lastmod>2024-02-02T05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-insurance-for-brisbane-companies/</loc>
		<lastmod>2024-02-01T09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-iso-27001-is-required/</loc>
		<lastmod>2024-01-30T03:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-nist-is-required-for-australian-companies/</loc>
		<lastmod>2024-05-30T01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-insurance-is-essential-for-small-businesses/</loc>
		<lastmod>2024-05-30T01:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/checklist-for-asd-essential-8-audit/</loc>
		<lastmod>2024-02-01T22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/risk-assessment-with-asd-essential-8/</loc>
		<lastmod>2024-02-01T22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ciso-guide-australia-business-impact-analysis-bia/</loc>
		<lastmod>2024-05-30T01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/checklist-for-an-apra-cps-234-audit/</loc>
		<lastmod>2024-02-02T05:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-cyber-insurance-mandatory-in-australia/</loc>
		<lastmod>2024-05-30T01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-requirements-a-comprehensive-guide/</loc>
		<lastmod>2024-05-30T01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-gaps-and-analysis-in-australia/</loc>
		<lastmod>2024-05-30T01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/thousands-of-mygov-accounts-hacked-monthly/</loc>
		<lastmod>2024-05-30T01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cybersecurity-assessment-testing-in-brisbane/</loc>
		<lastmod>2024-05-30T01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-australia/</loc>
		<lastmod>2024-05-30T01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/importance-of-cyber-security-infrastructure-assessment-in-australia/</loc>
		<lastmod>2024-05-30T01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-brisbane/</loc>
		<lastmod>2024-05-30T01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/risk-assessment-with-nist-in-australia/</loc>
		<lastmod>2024-01-30T06:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/is-nist-mandatory-in-australia/</loc>
		<lastmod>2024-01-30T05:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-compliance-checklist/</loc>
		<lastmod>2024-01-30T02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-queensland/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-townsville-safeguarding-your-digital-assets/</loc>
		<lastmod>2024-05-30T02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-adelaide/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-queensland/</loc>
		<lastmod>2024-05-30T01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/checklist-for-a-nist-audit/</loc>
		<lastmod>2024-01-30T05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-adelaide/</loc>
		<lastmod>2024-05-30T01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/asd-essential-8-for-brisbane-companies/</loc>
		<lastmod>2024-02-01T22:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-darwin/</loc>
		<lastmod>2024-05-30T01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-darwin/</loc>
		<lastmod>2024-05-30T01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-canberra/</loc>
		<lastmod>2024-05-30T01:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-soc2-requirements-are-essential/</loc>
		<lastmod>2024-02-02T04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-perth/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/checklist-for-soc2-audit/</loc>
		<lastmod>2024-02-02T02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-canberra/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-perth/</loc>
		<lastmod>2023-11-08T02:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-vs-essential-8/</loc>
		<lastmod>2024-01-30T02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-melbourne/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ten-things-to-know-about-asd-essential-8/</loc>
		<lastmod>2024-02-01T23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-managed-cyber-security-services-in-sydney/</loc>
		<lastmod>2024-05-30T01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-managed-cyber-security-services-in-brisbane/</loc>
		<lastmod>2023-11-08T05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/queensland-government-mandatory-data-breach/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc2-certification-in-australia/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/risk-assessment-with-cyber-insurance/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/who-needs-apra-cps-234-in-australia/</loc>
		<lastmod>2024-02-02T05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-adelaide-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-melbourne/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-darwin-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/risk-assessment-with-iso-27001/</loc>
		<lastmod>2024-01-30T01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-canberra-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-infrastructure-assessment-in-sydney/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-perth-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-melbourne-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-cybersecurity-framework-for-brisbane/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-infrastructure-assessment-in-brisbane/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-australia-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-queensland-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-sydney-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-insurance-requirements-in-australia/</loc>
		<lastmod>2024-05-30T01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/stay-protected-how-managed-cyber-security-services-in-townsville/</loc>
		<lastmod>2024-05-30T01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-brisbane-sydney/</loc>
		<lastmod>2023-10-04T22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-compliance-requirements-australia/</loc>
		<lastmod>2024-05-30T01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-brisbane-sydney-melbourne/</loc>
		<lastmod>2024-05-30T01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/who-needs-asd-essential-8-assessment-in-australia/</loc>
		<lastmod>2024-05-30T01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/who-needs-nist-certification-in-australia/</loc>
		<lastmod>2024-05-30T01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-compliance-ensuring-cybersecurity-and-data-protection/</loc>
		<lastmod>2024-01-30T20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-training-for-employees-in-australia/</loc>
		<lastmod>2024-05-30T01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/vulnerability-assessments-in-australia/</loc>
		<lastmod>2023-09-26T02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/medibanks-expenditure-after-cyber-attack-reaches-46-4-million/</loc>
		<lastmod>2024-05-30T01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-for-smb-in-brisbane/</loc>
		<lastmod>2023-09-27T03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ipeacock-bros-hacked/</loc>
		<lastmod>2023-09-23T08:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/importance-of-employee-phishing-testing/</loc>
		<lastmod>2023-09-23T07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/siege-tv/kerberoasting-attack/</loc>
		<lastmod>2023-09-22T20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/pizza-hut-exposed-to-possible-breach/</loc>
		<lastmod>2024-05-30T01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-australia/</loc>
		<lastmod>2023-09-28T04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-townsville/</loc>
		<lastmod>2023-09-28T04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/incident-response-to-cyber-attacks-in-australia/</loc>
		<lastmod>2023-09-24T00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/discovering-ransomware-resiliency/</loc>
		<lastmod>2024-05-30T02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/dymocks-says-data-breach-due-to-a-third-party/</loc>
		<lastmod>2023-09-23T21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cybersecurity-assessment-testing-in-townsville-protecting-your-business-from-digital-threats/</loc>
		<lastmod>2024-05-30T01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/tissupath-pathology-third-party-hack/</loc>
		<lastmod>2023-09-23T22:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/seasons-darling-harbour-financial-data/</loc>
		<lastmod>2023-09-23T21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/siege-tv/ntlm-relay-attack/</loc>
		<lastmod>2023-09-22T20:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/apra-cps-234-and-penetration-testing/</loc>
		<lastmod>2024-05-30T01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/mdr-poc-attack-simulation-vendor-selection/</loc>
		<lastmod>2024-05-30T01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/attack-simulation-in-australia/</loc>
		<lastmod>2024-05-30T01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-queensland/</loc>
		<lastmod>2023-09-28T04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-australia/</loc>
		<lastmod>2023-09-26T22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/siege-tv/dumping-hashes/</loc>
		<lastmod>2023-09-22T20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-townsville/</loc>
		<lastmod>2023-09-28T05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-in-brisbane/</loc>
		<lastmod>2023-09-26T07:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/understanding-the-role-of-it-security-networks/</loc>
		<lastmod>2024-05-30T01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/ivanti-releases-urgent-patch/</loc>
		<lastmod>2023-09-24T00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/citrix-adc-and-citrix-gateway-security/</loc>
		<lastmod>2024-05-30T01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/poc-mdr-attack-simulation/</loc>
		<lastmod>2024-05-30T02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-threats-with-a-firewall-configuration-review/</loc>
		<lastmod>2023-09-23T23:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-adelaide/</loc>
		<lastmod>2023-09-28T04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/asd-essential-8-maturity-assessment/</loc>
		<lastmod>2024-05-30T01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-townsville/</loc>
		<lastmod>2023-09-26T22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-queensland/</loc>
		<lastmod>2024-05-30T02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-gold-coast/</loc>
		<lastmod>2024-05-30T01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-based-virtual-security-manager/</loc>
		<lastmod>2024-05-30T01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-virtual-ciso/</loc>
		<lastmod>2024-05-30T01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/creating-an-effective-incident-response-plan/</loc>
		<lastmod>2024-05-30T01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-a-darkweb-security-assessment-is-a-must/</loc>
		<lastmod>2024-05-30T01:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/siege-tv/pass-the-hash/</loc>
		<lastmod>2023-09-22T20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-darwin/</loc>
		<lastmod>2023-09-28T04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-queensland/</loc>
		<lastmod>2023-09-26T22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-adelaide/</loc>
		<lastmod>2023-09-28T05:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/achieving-iso-27001-compliance/</loc>
		<lastmod>2023-09-24T08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/iso-27001-for-data-security-in-australia/</loc>
		<lastmod>2024-05-30T01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-australia/</loc>
		<lastmod>2023-09-27T04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/physical-penetration-testing-in-australia/</loc>
		<lastmod>2024-05-30T01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/executive-briefings-subject-matter-expert/</loc>
		<lastmod>2024-05-30T02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/virtual-security-manager/</loc>
		<lastmod>2024-05-30T02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/virtual-ciso/</loc>
		<lastmod>2026-03-26T06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cyber-security-maturity-assessment/</loc>
		<lastmod>2026-02-23T23:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/apra-cps-234-audits/</loc>
		<lastmod>2026-03-26T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/soc2/</loc>
		<lastmod>2026-03-26T06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/nist-risk-assessment-report-gap-analysis/</loc>
		<lastmod>2024-07-06T22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/network-architecture-design-review/</loc>
		<lastmod>2024-06-26T22:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/continuous-vulnerability-scanning/</loc>
		<lastmod>2026-02-12T21:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/security-awareness-training/</loc>
		<lastmod>2026-02-13T03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/firewall-hardening-configuration-review/</loc>
		<lastmod>2026-02-13T03:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/darkweb-osint-security-assessment/</loc>
		<lastmod>2023-10-05T02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/ransomware-resiliency-assessment/</loc>
		<lastmod>2023-10-05T02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/importance-of-vulnerability-management/</loc>
		<lastmod>2023-09-23T08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/red-teaming-attack-simulation/</loc>
		<lastmod>2026-02-12T20:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/employee-phishing-testing/</loc>
		<lastmod>2026-02-12T21:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-townsville/</loc>
		<lastmod>2024-05-30T01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/importance-of-apra-cps-234/</loc>
		<lastmod>2024-05-30T01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-canberra/</loc>
		<lastmod>2023-09-28T04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-queensland/</loc>
		<lastmod>2024-05-30T01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-adelaide/</loc>
		<lastmod>2023-09-27T04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/siege-tv/ntlmv2-password-cracking/</loc>
		<lastmod>2023-09-22T20:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-darwin/</loc>
		<lastmod>2023-09-27T04:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-canberra/</loc>
		<lastmod>2023-09-27T04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-perth/</loc>
		<lastmod>2023-09-27T04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/nist-risk-assessment-for-australian-businesses/</loc>
		<lastmod>2024-05-30T01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-melbourne/</loc>
		<lastmod>2023-09-27T04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-adelaide/</loc>
		<lastmod>2023-09-26T22:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cyber-security-advisory/</loc>
		<lastmod>2024-06-26T23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/iso-27001/</loc>
		<lastmod>2026-03-26T06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/asd-essential-8/</loc>
		<lastmod>2026-03-26T06:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/cloud-security-review/</loc>
		<lastmod>2026-02-12T21:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/incident-response/</loc>
		<lastmod>2024-06-26T23:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/vulnerability-assessment/</loc>
		<lastmod>2026-02-12T20:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/services/penetration-testing/</loc>
		<lastmod>2026-03-26T06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-darwin/</loc>
		<lastmod>2023-09-28T05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-attack-simulation-brisbane-sydney/</loc>
		<lastmod>2023-10-04T22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/it-cyber-security-risk-assessment-service-brisbane/</loc>
		<lastmod>2023-10-03T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-brisbane/</loc>
		<lastmod>2023-10-03T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-on-the-gold-coast/</loc>
		<lastmod>2024-05-30T01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-for-every-business-in-australia/</loc>
		<lastmod>2024-05-30T01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-brisbane/</loc>
		<lastmod>2023-10-03T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/it-cyber-security-in-brisbane/</loc>
		<lastmod>2023-10-03T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/sydney-cyber-security-companies/</loc>
		<lastmod>2024-05-30T01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/checklist-for-iso-27001-audit/</loc>
		<lastmod>2024-01-30T01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/security-awareness-training-in-australia/</loc>
		<lastmod>2023-09-23T22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cybersecurity-in-australia/</loc>
		<lastmod>2023-09-23T09:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/australian-soc2-audits/</loc>
		<lastmod>2023-09-24T08:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-darwin/</loc>
		<lastmod>2023-09-26T22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-canberra/</loc>
		<lastmod>2023-09-28T05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-australia/</loc>
		<lastmod>2023-09-27T03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-risk-assessment-protecting-your-business-in-queensland/</loc>
		<lastmod>2024-05-30T01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-townsville/</loc>
		<lastmod>2023-09-27T03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-queensland/</loc>
		<lastmod>2023-09-27T03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-adelaide/</loc>
		<lastmod>2023-09-27T03:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-darwin/</loc>
		<lastmod>2023-09-27T03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-canberra/</loc>
		<lastmod>2023-09-27T03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-perth/</loc>
		<lastmod>2023-09-27T03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-melbourne/</loc>
		<lastmod>2023-09-27T03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/unveiling-the-threats-exploring-the-need-for-it-cyber-security-in-sydney/</loc>
		<lastmod>2023-09-27T03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-solutions-in-brisbane/</loc>
		<lastmod>2023-10-03T01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-brisbane/</loc>
		<lastmod>2023-10-03T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-company-in-melbourne/</loc>
		<lastmod>2024-05-30T02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cloud-security-measures-in-australia/</loc>
		<lastmod>2023-09-23T22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consultancy-in-australia/</loc>
		<lastmod>2023-09-26T08:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-australia/</loc>
		<lastmod>2023-09-28T05:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-perth/</loc>
		<lastmod>2023-09-28T04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/benefits-of-a-virtual-security-manager/</loc>
		<lastmod>2023-09-24T20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-canberra/</loc>
		<lastmod>2023-09-26T22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-perth/</loc>
		<lastmod>2024-05-30T01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-risk-assessment-protecting-your-business-in-perth/</loc>
		<lastmod>2023-09-26T20:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/essential-8-assessment-in-brisbane/</loc>
		<lastmod>2023-10-03T01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-risk-assessment-brisbane/</loc>
		<lastmod>2024-05-30T01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/it-security-services-in-australia/</loc>
		<lastmod>2023-09-25T22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-brisbane/</loc>
		<lastmod>2023-10-03T01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/investing-in-brisbane-it-security/</loc>
		<lastmod>2023-09-26T07:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-melbourne/</loc>
		<lastmod>2023-09-28T04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/guide-to-penetration-testing-in-australia/</loc>
		<lastmod>2024-05-30T01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/security-architecture-review/</loc>
		<lastmod>2024-05-30T01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-perth/</loc>
		<lastmod>2023-09-26T22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-townsville/</loc>
		<lastmod>2023-09-26T22:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-perth/</loc>
		<lastmod>2023-09-26T22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-melbourne/</loc>
		<lastmod>2023-09-28T05:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-risk-assessment-protecting-your-business-in-melbourne/</loc>
		<lastmod>2023-09-26T20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-australia/</loc>
		<lastmod>2023-09-29T03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-australia/</loc>
		<lastmod>2023-09-26T22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-townsville/</loc>
		<lastmod>2024-05-30T01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-queensland/</loc>
		<lastmod>2023-09-26T22:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-queensland/</loc>
		<lastmod>2024-05-30T01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-adelaide/</loc>
		<lastmod>2023-09-26T22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-adelaide/</loc>
		<lastmod>2023-09-29T03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-darwin/</loc>
		<lastmod>2023-09-26T21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-darwin/</loc>
		<lastmod>2023-09-29T03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-canberra/</loc>
		<lastmod>2023-09-26T21:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-canberra/</loc>
		<lastmod>2023-09-29T03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-melbourne/</loc>
		<lastmod>2023-09-26T21:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-perth/</loc>
		<lastmod>2023-09-29T04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-testing-in-sydney/</loc>
		<lastmod>2023-09-26T21:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/harvest-now-decrypt-later-the-cybersecurity-threat-that-lurks-in-the-shadows/</loc>
		<lastmod>2023-09-26T08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-melbourne/</loc>
		<lastmod>2024-05-30T01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/why-cyber-security-risk-assessment-services-are-essential-for-businesses-in-sydney/</loc>
		<lastmod>2023-09-29T03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-australia/</loc>
		<lastmod>2023-09-27T04:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-townsville/</loc>
		<lastmod>2023-09-27T04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-company-in-brisbane/</loc>
		<lastmod>2024-05-30T01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/managed-cyber-security-services-in-brisbane/</loc>
		<lastmod>2024-05-30T01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-queensland/</loc>
		<lastmod>2023-09-27T04:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-in-australia/</loc>
		<lastmod>2023-09-25T22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/best-practices-for-maintaining-it-security/</loc>
		<lastmod>2024-05-30T01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-adelaide/</loc>
		<lastmod>2023-09-27T04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-costs-in-melbourne/</loc>
		<lastmod>2023-09-24T00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-australian-business-from-cyber-threats-why-you-need-a-cyber-security-advisor/</loc>
		<lastmod>2023-09-24T22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-darwin/</loc>
		<lastmod>2023-09-27T04:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-canberra/</loc>
		<lastmod>2023-09-27T04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-perth/</loc>
		<lastmod>2023-09-27T04:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-melbourne/</loc>
		<lastmod>2023-09-27T04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/boost-your-organisations-security-exploring-the-benefits-of-asd-essential-8-assessment-in-sydney/</loc>
		<lastmod>2023-09-27T04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/network-penetration-testing-in-australia/</loc>
		<lastmod>2023-09-26T07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/protecting-your-business-the-benefits-of-expert-cyber-security-solutions-in-sydney/</loc>
		<lastmod>2023-09-28T04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-melbourne/</loc>
		<lastmod>2023-09-26T22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/website-penetration-testing-in-sydney/</loc>
		<lastmod>2023-09-27T04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-consulting-in-sydney/</loc>
		<lastmod>2023-09-26T22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-for-smb-in-townsville/</loc>
		<lastmod>2024-05-30T01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-for-smb-in-perth/</loc>
		<lastmod>2023-09-26T22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-sydney/</loc>
		<lastmod>2023-09-28T05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/the-importance-of-cyber-security-risk-assessment-protecting-your-business-in-sydney/</loc>
		<lastmod>2023-09-29T04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-australia-for-smbs/</loc>
		<lastmod>2023-09-26T21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-queensland-for-smbs/</loc>
		<lastmod>2024-05-30T01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-adelaide-for-smbs/</loc>
		<lastmod>2023-09-26T21:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-darwin-for-smbs/</loc>
		<lastmod>2023-09-26T21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-canberra-for-smbs/</loc>
		<lastmod>2023-09-26T21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-melbourne-for-smbs/</loc>
		<lastmod>2023-09-26T21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/building-resilience-the-benefits-of-penetration-testing-in-sydney-for-smbs/</loc>
		<lastmod>2023-09-26T21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/soc2-vs-asd-essential-8/</loc>
		<lastmod>2024-02-02T04:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/understanding-security-vulnerabilities-vulnerabilities-threats-and-exploits/</loc>
		<lastmod>2023-09-24T07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-services-in-sydney/</loc>
		<lastmod>2023-09-25T00:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/penetration-testing-pci-dss-v4-0-changes-and-differences/</loc>
		<lastmod>2023-09-24T07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-to-choose-the-best-cyber-security-company-in-melbourne/</loc>
		<lastmod>2024-05-30T01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/choosing-the-right-cyber-security-company-in-australia/</loc>
		<lastmod>2024-05-30T01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/web-application-penetration-testing-what-you-need-to-know/</loc>
		<lastmod>2023-09-24T07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/managed-cyber-security-services-in-australia/</loc>
		<lastmod>2024-05-30T01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-company-in-perth/</loc>
		<lastmod>2023-09-24T22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/reporting-cyber-crime-in-australia-who-to-contact-and-how-to-take-action/</loc>
		<lastmod>2023-09-24T22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/cyber-security-in-australia/</loc>
		<lastmod>2023-09-24T22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/working-from-home-has-opened-the-door-for-hackers/</loc>
		<lastmod>2024-05-30T01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/whats-the-difference-between-a-gap-analysis-and-a-penetration-test/</loc>
		<lastmod>2023-09-24T07:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-a-penetration-test-and-why-do-i-need-it/</loc>
		<lastmod>2024-05-30T01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/our-external-penetration-testing-methodology/</loc>
		<lastmod>2024-05-30T01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/buyers-guide-to-penetration-testing-services/</loc>
		<lastmod>2024-05-30T01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/how-often-do-you-need-penetration-testing-for-iso-27001/</loc>
		<lastmod>2023-09-24T00:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/vulnerability-scan-vs-penetration-test/</loc>
		<lastmod>2023-07-24T22:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-spear-phishing/</loc>
		<lastmod>2023-09-29T03:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/7-steps-to-make-yourself-more-secure/</loc>
		<lastmod>2023-07-24T22:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-ransomware/</loc>
		<lastmod>2024-05-30T01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/6-ways-to-spot-a-phishing-email/</loc>
		<lastmod>2023-09-29T03:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/email-phishing-explained/</loc>
		<lastmod>2023-09-29T03:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-a-penetration-test/</loc>
		<lastmod>2024-05-30T01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://siegecyber.com.au/blog/what-is-social-engineering/</loc>
		<lastmod>2023-07-24T22:00+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
