<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://frameworksecurity.com</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/about</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/careers</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/contact</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/experience</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/glossary</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/partners</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/top10</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/referral-program</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/checklist/lander</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/checklist/lander-v2</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/category/enterprise</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/category/individuals</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/addressing-cyber-vulnerabilities-insights-from-cisa-and-nsa</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/advanced-phishing-attacks-the-successful-phishermans-mindset</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/agentic-design-building-production-tooling</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ai-powered-cve-threat-intelligence-framework-securitys-agentic-workflow-for-cyber-defense</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ai-regulation-is-coming-how-businesses-should-prepare-for-global-standards</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ai-risk-is-now-a-cybersecurity-problem</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/attacking-the-person-what-works-and-what-doesnt-in-vishing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/automated-vs-manual-vs-hybrid-pen-tests-which-approach-is-right-for-your-organization</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/best-practices-for-healthcare-organizations-and-beyond-to-respond-to-ddos-attacks</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/bridging-the-cybersecurity-challenge-protecting-data-in-the-cloud-and-the-accountable-humans</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/caesars-and-mgm-cybersecurity-attacks-a-cautionary-tale-for-the-hospitality-sector</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/celebrating-five-remarkable-years-of-framework-security-a-journey-of-innovation-and-impact</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/citrixbleed-vulnerability-exploitation-plagues-organizations-a-deep-dive</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/clearview-ais-gdpr-fine-overturned-in-the-uk</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/converge-security-conference</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/current-events-lessons-from-cloudnordics-breach</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cyber-attack-warning-signs-and-proactive-defense-strategies</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cyber-attacks-through-the-ages-a-spooky-look-back-at-octobers-haunting-cybersecurity-incidents</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cyber-protection-series-ep-1-how-to-create-a-great-bcdr-plan</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cyberplay-how-gamification-is-transforming-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cybersecurity-company-trends-for-2025</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cybersecurity-in-the-post-perimeter-future</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cybersecurity-outlook-2024-navigating-emerging-digital-threats-with-key-learnings-from-2023</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/cybersecurity-risks-in-the-motion-picture-and-film-industry</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/do-these-5-things-to-protect-your-small-business</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/dont-let-cyber-nightmares-haunt-you-7-spooky-cybersecurity-tips-for-halloween</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ethical-hacking-manual-penetration-testing-vs-vulnerability-scanning-vs-pen-testing-as-a-service</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/evaluating-cybersecurity-companies-for-your-business</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/flip-the-script-5-best-practices-in-cybersecurity-for-startups</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-achieves-an-outstanding-net-promoter-score-of-92</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-and-jerry-sanchez-nominated-for-prestigious-cybersecurity-awards</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-bags-a-clutch-global-award-for-incredible-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-celebrates-second-consecutive-year-of-triple-gold-wins-at-2024-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-earns-title-of-top-b2b-provider-in-los-angeles-at-the-2021-clutch-leader-awards</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-sweeps-the-2023-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-security-unveils-minerva-insights-transforming-pentest-report-writing-with-ai-driven-automation</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/framework-securitys-differentiator-we-can-give-you-guidance-for-every-security-and-privacy-standard</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ftc-enhances-data-security-measures-for-non-banking-financial-institutions</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/how-a-risk-assessment-can-help-you-stay-in-line-with-the-ccpa</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/how-much-does-cybersecurity-really-cost</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/how-often-should-you-pentest</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/how-to-combat-business-email-compromise-a-guide-to-best-practices</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/how-to-select-a-cybersecurity-consulting-firm</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/inside-the-largest-u-s-telecom-cyber-breach-youve-probably-never-heard-of</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/insider-risk-understanding-the-threat-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/introducing-ai-risk-assessments-securing-the-future-of-innovation</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/introducing-framework-securitys-comprehensive-soc-2-compliance-services</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/join-our-upcoming-webinar-hosted-by-imprivata-elevating-security-privacy-and-compliance-in-todays-complex-cyber-landscape</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/key-components-of-an-effective-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/maximizing-cybersecurity-roi-a-strategic-approach-for-todays-digital-landscape</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/nation-faces-acute-shortage-of-cybersecurity-workers</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/navigating-cybersecurity-storms-the-crucial-role-of-a-data-breach-coach</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/navigating-the-haunted-house-of-vulnerabilities-how-to-ghost-proof-your-business</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/navigating-the-new-eu-digital-operational-resilience-act-dora-for-businesses</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/navigating-the-next-evolution-in-cybersecurity-a-deep-dive-into-nists-cybersecurity-framework-2-0</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/nist-report-highlights-adversarial-machine-learning-threats-and-the-lack-of-foolproof-defenses</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/overcoming-mitigation-hurdles-best-practices-for-remediating-penetration-test-findings</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/policy-shift-in-motion-comparing-bidens-and-trumps-cybersecurity-executive-orders</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/private-equity-firms-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/protecting-your-business-from-email-compromise-a-guide-to-ensuring-cybersecurity-and-financial-integrity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/redefining-cybersecurity-the-essential-role-of-cyber-risk-quantification-in-modern-business-strategy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ruminations-on-the-likely-end-of-malicious-word-macros</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/sec-contemplates-stricter-cybersecurity-breach-reporting-rules</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/secs-solarwinds-charges-highlight-growing-importance-of-cybersecurity-whistleblowers</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/simplifying-cybersecurity-the-key-to-cost-effective-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/spooky-security-breaches-famous-hacks-that-sent-chills-down-our-spines</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/strategizing-cybersecurity-funding-a-roadmap-for-business-leaders</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/tara-anderson-new-managing-partner-at-framework-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/tech-deal-making-in-cybersecurity-the-year-of-consolidation-and-the-rise-of-add-ons</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/texas-sb-2610-the-safe-harbor-for-cybersecurity-what-your-smb-needs-to-know</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-4-biggest-myths-affecting-cybersecurity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-benefits-of-hiring-a-virtual-ciso-for-your-organization</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-electromagnetic-whisper-decoding-vulnerabilities-in-air-gapped-networks</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-equifax-hack-a-cybersecurity-catastrophe</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-essential-guide-to-acquiring-cybersecurity-insurance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-hidden-risk-in-your-stack-rethinking-vendor-access-and-third-party-security-in-2025</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-imperative-of-penetration-testing-for-data-centers-averting-a-crippling-blow-to-your-organization</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-manifest-recognizes-framework-security-as-one-of-the-most-reviewed-cybersecurity-companies-in-los-angeles</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-new-breach-economy-2025s-biggest-cybersecurity-threat-shift-and-how-to-protect-your-business</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-rapid-rise-of-ai-in-cybersecurity-a-game-changer-or-a-double-edged-sword</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-rise-of-ai-agents-in-the-enterprise-opportunities-risks-and-security-strategies</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-rise-of-ransomware-attacks-how-to-protect-your-business-from-cyber-extortion</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-rising-importance-of-cybersecurity-insurance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-role-of-leadership-in-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-soft-underbelly-of-cybersecurity-phone-based-social-engineering-as-utilized-in-the-mgm-attack</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-sony-pictures-breach-a-deep-dive-into-a-landmark-cyber-attack</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/the-target-breach-a-historic-cyberattack-with-lasting-consequences</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/ticketmaster-breach-a-deep-dive-into-the-may-2024-cyberattack-and-the-history-of-the-alleged-hackers</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/title-streamlining-security-a-closer-look-at-texas-risk-and-authorization-management-program-tx-ramp</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/top-10-cybersecurity-frameworks-that-matter-in-2022</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/top-reasons-why-ai-is-evolving-cybersecurity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/unlocking-the-power-of-penetration-testing-framework-securitys-approach</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/vulnerability-scanning-vs-penetration-testing-whats-the-difference-and-why-does-it-matter</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/weve-gone-live-with-our-own-internally-developed-llm</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/what-is-the-difference-between-a-gap-analysis-and-cybersecurity-framework-assessment</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/what-the-crunchbase-breach-reveals-about-modern-cyber-risk</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/what-the-moveit-breach-tells-us-about-third-party-risk-in-2025</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/why-framework-security-is-the-missing-layer-in-most-appsec-programs</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/why-framework-security-open-sourced-minerva-insights</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/why-full-cybersecurity-plans-are-essential-for-businesses</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/why-mdr-gap-assessments-and-pen-testing-are-critical-for-modern-cybersecurity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/why-no-one-cares-about-the-ccpa</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/post/your-security-program-didnt-break----the-business-changed</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/advanced-threats</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/corporate</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/current-events</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/cybersecurity-awareness-training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/cybersecurity-best-practices</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/cybersecurity-regulation</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/decoding-cybersecurity</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/events</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/in-the-news</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/methodologies</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/privacy-legislation-and-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/regulations</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/small-business</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/blog-categories/vciso</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/dillon-rangel</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/erkan-kahraman</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/jerry-sanchez</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/paul-preiss</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/roberto-planos</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/leadership/tiernan-omalley</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/advanced-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/architecting-a-highly-secure-enterprise-multi-cloud-infrastructure</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/building-a-saas-infrastructure</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/certifying-a-saas-provider</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/comprehensive-vciso-engagement-and-ai-governance-for-lender-toolkit-fintech</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/framework-securitys-role-in-ideal-livings-e-commerce-expansion</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/framework-securitys-role-in-jobandtalents-strategic-expansion-introduction</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/framework-securitys-role-in-strategic-growth-and-post-acquisition-integration</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/how-bzi-construction-built-a-federal-grade-cybersecurity-program-without-hiring-a-single-security-employee</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/case-studies/instituting-a-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/advanced-threat-hunting</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/ai-compliance-fintech</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/ai-governance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/automated-evidence-gathering-and-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/automated-manual-and-hybrid</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/automated-pentest-report-generation-minerva-insights</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/cis-18-assessments</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/construction</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/cyber-risk-assessments</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/education</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/energy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/entertainment</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/financial-services</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/healthcare</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/incident-response-and-forensics</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/incident-response-training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/infrastructure</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/m-a-due-diligence</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/managed-detection-and-response</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/manufacturing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/mobile-applications</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/nist-csf-assessments</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/non-profits</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/organizational-leadership</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/privacy-hipaa-gdpr-ccpa</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/program-and-policy-development-wisp</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/secure-sdlc</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/soc-2</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/social-engineering</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/social-engineering-campaigns</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/technology</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/tx-ramp-certification</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/user-awareness-training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/virtual-ciso</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services-old/web-applications</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/ai</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/industries</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/managed-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/penetration-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/service-categories/training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/careers/ai-automation-security-admin</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/careers/solutions-consultant</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/ai-governance-strategy</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/ai-llm-security-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/ai-management-system-certification</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/api-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/automated-evidence-gathering-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/automated-pentest-report-generation</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/cis-18-assessments</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/cloud-infrastructure-azure-aws-gcp</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/cloud-security-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/cmmc</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/cyber-risk-gap-assessments</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/disaster-recovery-planning-resilience</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/endpoint-detection-response</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/identity-access-management</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/incident-response-training-forensics</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/m-a-due-diligence</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/managed-detection-response</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/microsoft-365-hardening</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/minerva-insights</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/mobile-application-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/network-penetration-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/nist-csf-800-171-800-53-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/pci-dss-preparation</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/penetration-testing-approaches</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/physical-security-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/privacy-compliance-data-protection</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/ransomware-defense</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/red-team-operations</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/red-teaming-adversary-simulations</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/secure-sdlc-program-development</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/siem-services-deployment</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/soc-2-audit-readiness-compliance</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/social-engineering-campaigns</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/social-engineering-testing</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/tx-ramp-certification</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/virtual-ciso</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/vulnerability-assessment-management</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/web-application-security</loc>
    </url>
    <url>
        <loc>https://frameworksecurity.com/services/zero-trust-advisory-implementation</loc>
    </url>
</urlset>