<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://adammchugh.com/</loc><lastmod>2026-05-20T20:04:22.290Z</lastmod></url>
  <url><loc>https://adammchugh.com/blog</loc><lastmod>2026-05-17T04:00:49.588Z</lastmod></url>
  <url><loc>https://adammchugh.com/cyber-engineering</loc><lastmod>2026-05-17T04:01:02.647Z</lastmod></url>
  <url><loc>https://adammchugh.com/risk</loc><lastmod>2026-05-17T04:01:09.454Z</lastmod></url>
  <url><loc>https://adammchugh.com/security-operations</loc><lastmod>2026-05-17T04:01:19.232Z</lastmod></url>
  <url><loc>https://adammchugh.com/security-operations/forensics</loc><lastmod>2026-05-17T04:02:32.203Z</lastmod></url>
  <url><loc>https://adammchugh.com/security-operations/incident-response</loc><lastmod>2026-05-17T04:02:45.943Z</lastmod></url>
  <url><loc>https://adammchugh.com/security-operations/vulnerability-management</loc><lastmod>2026-05-17T04:02:59.499Z</lastmod></url>
  <url><loc>https://adammchugh.com/risk/frameworks-standards</loc><lastmod>2026-05-17T04:02:04.952Z</lastmod></url>
  <url><loc>https://adammchugh.com/risk/threat-modelling</loc><lastmod>2026-05-17T04:02:19.547Z</lastmod></url>
  <url><loc>https://adammchugh.com/cyber-engineering/automation</loc><lastmod>2026-05-17T04:01:29.844Z</lastmod></url>
  <url><loc>https://adammchugh.com/cyber-engineering/devsecops</loc><lastmod>2026-05-17T04:01:41.928Z</lastmod></url>
  <url><loc>https://adammchugh.com/cyber-engineering/infrastructure</loc><lastmod>2026-05-17T04:01:52.981Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/the-ism-statement-of-applicability-is-an-engineering-artefact</loc><lastmod>2026-05-17T05:36:40.405Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/the-hierarchy-of-remediation-a-strategic-framework-for-cybersecurity-resilience-in-the-post-patching-era</loc><lastmod>2026-05-17T05:33:40.154Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/a-comprehensive-analysis-of-attack-surface-reduction-rules-as-compensatory-controls-for-exploitation-primitives-in-windows-environments</loc><lastmod>2026-05-17T05:30:15.074Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/from-vulnerable-to-vigilant-transforming-vulnerability-management-processes</loc><lastmod>2026-05-17T05:22:32.294Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/communicating-vulnerability-risks-translating-technical-jargon-into-business-impact</loc><lastmod>2026-05-17T05:46:49.183Z</lastmod></url>
  <url><loc>https://adammchugh.com/posts/beyond-nist-diversifying-sources-for-accurate-vulnerability-context</loc><lastmod>2026-05-17T04:59:13.943Z</lastmod></url>
</urlset>
