<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://timzeimann.com/2018/08/14/agile-security/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/05/shutterstock_429285145-e1527016391340.jpg</image:loc><image:title>shutterstock_429285145</image:title></image:image><lastmod>2018-08-14T19:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/2018/07/27/lessons-learned-as-ciso/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/05/shutterstock_375912232-e1527016067683.jpg</image:loc><image:title>shutterstock_375912232</image:title></image:image><lastmod>2018-07-27T19:25:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/2018/05/17/web-application-filtering-a-silver-bullet/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/05/shutterstock_664738555-e1526677375780.jpg</image:loc><image:title>shutterstock_664738555</image:title></image:image><lastmod>2018-07-02T21:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/2018/07/02/measuring-security-tool-utilization/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/05/shutterstock_553264531-e1526841368898.jpg</image:loc><image:title>shutterstock_553264531</image:title></image:image><lastmod>2018-07-02T21:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/2018/06/19/compliance-vs-true-security/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/05/shutterstock_790131034-e1526842065383.jpg</image:loc><image:title>shutterstock_790131034</image:title></image:image><lastmod>2018-07-02T15:17:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/2018/03/07/application-security-lessons-learned/</loc><image:image><image:loc>https://timzeimann.com/wp-content/uploads/2018/03/shutterstock_694311889-e1526678150627.jpg</image:loc><image:title>shutterstock_694311889</image:title></image:image><lastmod>2018-06-20T14:10:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://timzeimann.com/blog/</loc><lastmod>2018-05-20T22:15:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://timzeimann.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2018-08-14T19:44:03+00:00</lastmod></url></urlset>
