<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cyrisma.com</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/platform-overview</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resource-center</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/about</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/events</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/contact</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/schedule-demo</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/mssp-software</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/vciso-platform</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/solutions/compliance-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/solutions/data-discovery</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/solutions/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies/auto-lenders</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies/buena-vista-university</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies/cyflare</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies/orbitalfire</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/case-studies/securicom</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/legal/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/accountability-data-protection-process</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/active-directory-why-important-cybersecurity-perspective</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/beyond-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/building-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cis-benchmarks-securing-your-operating-system-configuration</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cis-guide-to-defining-reasonable-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cloud-data-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cloud-security-challenges-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/common-cve-types-what-they-mean-and-how-they-can-impact-your-business</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/compliance-as-a-service-msp-growth-driver</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-risk-management-new-digital-landscape</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-risk-management-practices</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-risk-monetization-for-informed-decision-making-and-resource-allocation</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-risk-quantification-financial-impact</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-risk-quantification-use-cases-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cyber-threat-trends-2024</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybercrime-and-data-breaches-in-the-finance-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybercrime-and-the-dark-web-2</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-as-an-enabler-of-digital-innovation-and-growth</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-challenges-in-the-manufacturing-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-in-the-healthcare-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-platformization</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-risk-in-the-education-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-tool-consolidation</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-trends-2025</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/cybersecurity-trends-emerging-threats-2024</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/dark-web-monitoring-importance</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/data-centric-approach-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/data-centric-cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/data-classification-and-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/data-governance-digital-transformation</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/data-governance-for-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/empowering-organizations-to-achieve-cybersecurity-excellence</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/essential-eight-cyber-essentials</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/exploring-access-control-mfa-and-the-principle-of-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/five-essential-cybersecurity-controls-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/generative-ai-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/good-data-governance-in-the-age-of-genai</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/grc-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/grc-for-cyber-leaders-next-gen-grc-tools</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/how-do-you-choose-a-grc-tool-ask-these-9-questions</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/it-asset-inventory-importance</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/keeping-common-cyber-threats-at-bay</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/marketing-cybersecurity-services</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/nist-csf-2-0-the-new-govern-function</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/preventing-data-breaches-with-more-structured-cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/ransomware-prevention-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/reducing-cyber-risk-in-the-healthcare-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/secure-baseline-management-what-it-is-and-how-it-helps-with-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/securing-sensitive-data-in-k-12-schools-with-cis-controls-ig1</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/shadow-it-risks-detection</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/smb-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/streamlining-cybersecurity-operations-with-cyrisma</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/tackling-cyber-risk-in-the-education-sector</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/understanding-cvss-and-whats-new-in-version-4-0</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/understanding-internal-and-external-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/understanding-sensitive-data-types</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/upselling-managed-security-services-a-growth-guide-for-msps</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/verizon-dbir-highlight-the-need-for-faster-patching-and-proactive-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/whats-new-in-nist-csf-2-0</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/whats-new-in-the-cis-critical-controls-v-8-1</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/why-active-directory-monitoring-is-important</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/why-cyber-risk-management-is-failing</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/blog/zero-trust-security-data-pillar</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/cyrisma---vulnerability-assessment-management-review</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/cyrisma-cyflare-at-the-worlds-largest-open-xdr-summit</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/cyrisma-delivers-an-elevator-pitch</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/data-centric-cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/data-centric-security</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/grc-for-cybersecurity-professionals-2</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/msp-initiative-live-with-cyrisma-co-founder-liam-downward</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/mssp-alert-webcast-with-cyrisma-cpo-liam-downward</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/revolutionizing-msp-cybersecurity-strategies-pax8</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/simplifying-the-process-of-identifying-assessing-mitigating-risks</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/small-business-cybersecurity-its-all-about-the-data</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/understanding-cis-controls-with-liam-downward-from-cyrisma</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/resources-center/vulnerability-and-patch-management</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/apple-illegally-surveilled-and-censored-workers-employee-lawsuit-says</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/corrupted-microsoft-office-documents-used-in-phishing-campaign</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/crn-report-cyrisma-among-10-of-the-hottest-products-for-msps-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-awarded-cis-benchmark-certification</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-continues-to-be-a-momentum-leader-in-three-categories-in-g2s-fall-2024-reports</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-earns-10-badges-in-g2-summer-2023-reports</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-earns-11-g2-summer-2024-badges-including-momentum-leader-and-best-est-roi</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-earns-14-badges-in-g2-fall-2023-reports</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-earns-8-badges-in-g2s-spring-2024-reports</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-earns-seven-badges-in-g2s-2023-spring-reports</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-is-now-soc2-compliant</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-is-now-soc2-compliant-2</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-joins-pax8-marketplace</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-receives-soc2-type-ii-compliance</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-secures-7-million-growth-equity-financing-led-by-blueprint-equity</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/cyrisma-welcomes-new-chief-executive-officer-mark-balovnev</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/news/elevate-your-cybersecurity-experience-with-cyrismas-enhanced-new-version</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/mssp-software/mssp-software</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/mssp-software/vulnerability-management-automation</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/mssp-software/vulnerability-prioritization</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/vciso-platform/cybersecurity-policy-template</loc>
    </url>
    <url>
        <loc>https://www.cyrisma.com/vciso-platform/vciso-platform</loc>
    </url>
</urlset>