<?xml version="1.0" encoding="utf-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://infosecinstitute.com/iq/content-library/western-mobile-cybersecurity-game/</loc><lastmod>2026-01-26T19:44:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/mummy-personal-information-cybersecurity-game/</loc><lastmod>2026-01-21T21:26:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/deep-space-cybersecurity-game/</loc><lastmod>2026-01-26T19:44:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cyberheroes-social-media-cybersecurity-game/</loc><lastmod>2026-01-26T19:45:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/deep-sea-safe-web-browsing-cybersecurity-game/</loc><lastmod>2026-01-26T19:45:08+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/yeti-working-remotely-cybersecurity-game/</loc><lastmod>2026-01-26T19:44:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/zombie-phishing-cybersecurity-game/</loc><lastmod>2026-01-26T19:45:54+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cjis-policy-dissemination-destruction/</loc><lastmod>2026-01-21T21:04:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cjis-policy-media-protection/</loc><lastmod>2026-01-21T21:04:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cjis-policy-physical-security/</loc><lastmod>2026-01-21T21:04:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cjis-security-policy/</loc><lastmod>2026-01-21T21:05:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cjis-handling-cji/</loc><lastmod>2026-01-21T21:04:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/complying-with-nist-800-171/</loc><lastmod>2026-01-21T21:06:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/coppa/</loc><lastmod>2026-01-21T21:09:52+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-business-email-compromise-bec/</loc><lastmod>2026-01-21T21:18:16+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-cipa/</loc><lastmod>2026-01-21T21:18:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-cloud-security/</loc><lastmod>2026-01-21T21:13:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-data-destruction/</loc><lastmod>2026-01-21T21:14:20+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-data-loss-prevention/</loc><lastmod>2026-01-21T21:29:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-ferpa/</loc><lastmod>2026-01-21T21:19:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-gdpr/</loc><lastmod>2026-01-21T21:14:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-government-data-types/</loc><lastmod>2026-01-21T21:19:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-hipaa/</loc><lastmod>2026-01-21T21:16:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-how-to-report-phishing-emails/</loc><lastmod>2026-01-21T21:19:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-incident-response/</loc><lastmod>2026-01-21T21:19:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-insider-threats/</loc><lastmod>2026-01-21T21:20:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-internet-of-things-iot/</loc><lastmod>2026-01-21T21:16:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-malware/</loc><lastmod>2026-01-21T21:16:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-mfa-fatigue/</loc><lastmod>2026-01-21T21:20:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-multi-factor-authentication/</loc><lastmod>2026-01-21T21:20:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-owasp/</loc><lastmod>2026-01-21T21:21:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-pci-dss/</loc><lastmod>2026-01-21T21:21:41+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-phishing/</loc><lastmod>2026-01-21T21:17:09+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-physical-security/</loc><lastmod>2026-01-21T21:21:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-ppra/</loc><lastmod>2026-01-21T21:22:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-qr-code-security/</loc><lastmod>2026-01-21T21:22:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-ransomware/</loc><lastmod>2026-01-21T21:17:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-social-media-best-practice/</loc><lastmod>2026-01-21T21:23:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-stick-to-the-policy/</loc><lastmod>2026-01-21T21:23:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-travel-security/</loc><lastmod>2026-01-21T21:17:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cpni-for-consumers/</loc><lastmod>2026-01-21T21:24:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cpni-for-providers/</loc><lastmod>2026-01-21T21:24:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/cybersecurity-awareness-month-csam-the-road-to-cybersecurity/</loc><lastmod>2026-01-21T21:26:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/electronic-funds-transfer-act-efta/</loc><lastmod>2026-01-21T21:30:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/fcpa/</loc><lastmod>2026-01-21T21:51:44+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-consequences-of-non-compliance/</loc><lastmod>2026-01-27T19:50:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-rights-of-the-data-subjects/</loc><lastmod>2026-01-27T19:50:37+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-for-data-processors/</loc><lastmod>2026-01-26T19:23:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-for-executives/</loc><lastmod>2026-01-26T19:23:11+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-for-managers/</loc><lastmod>2026-01-26T19:23:20+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hacked-for-the-holidays/</loc><lastmod>2026-01-26T19:25:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hacked-for-the-holidays-fireside-chat/</loc><lastmod>2026-01-26T19:29:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hipaa-hitech/</loc><lastmod>2026-01-21T21:09:20+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hipaa-hitech-for-healthcare-executives/</loc><lastmod>2026-01-26T19:26:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hipaa-hitech-for-healthcare-managers/</loc><lastmod>2026-01-26T19:28:13+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/hipaa-minimum-necessary-standard/</loc><lastmod>2026-01-26T19:50:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/introduction-to-ccpa/</loc><lastmod>2026-01-21T21:08:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/introduction-to-dfars/</loc><lastmod>2026-01-21T21:08:45+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-business-email-compromise-bec/</loc><lastmod>2026-01-26T19:36:17+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-cloud-security/</loc><lastmod>2026-01-21T21:45:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-data-destruction/</loc><lastmod>2026-01-21T21:42:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-data-privacy/</loc><lastmod>2026-01-21T21:42:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-internet-of-things-iot/</loc><lastmod>2026-01-21T21:40:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-introduction-for-educators/</loc><lastmod>2026-03-17T13:03:42+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-introduction-for-new-hires/</loc><lastmod>2026-01-21T21:46:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-malware/</loc><lastmod>2026-01-26T19:35:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-mobile-security/</loc><lastmod>2026-01-21T21:46:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-multi-factor-authentication/</loc><lastmod>2026-01-26T19:37:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-password-security/</loc><lastmod>2026-01-21T21:47:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-phishing/</loc><lastmod>2026-01-21T21:47:21+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-physical-security/</loc><lastmod>2026-01-21T21:47:35+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-public-wi-fi/</loc><lastmod>2026-01-21T21:48:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-ransomware/</loc><lastmod>2026-01-21T21:41:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-removable-media/</loc><lastmod>2026-01-21T21:47:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-safe-web-browsing/</loc><lastmod>2026-01-21T21:48:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-social-engineering/</loc><lastmod>2026-01-21T21:48:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-stick-to-the-policy/</loc><lastmod>2026-01-26T19:37:25+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-travel-security/</loc><lastmod>2026-01-21T21:48:34+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-working-remotely/</loc><lastmod>2026-01-21T21:49:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/marine-lowlifes-clone-phish/</loc><lastmod>2026-01-21T21:06:15+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/marine-lowlifes-common-phish/</loc><lastmod>2026-01-26T19:38:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/marine-lowlifes-spearphish/</loc><lastmod>2026-01-26T19:38:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/marine-lowlifes-whaling-shark/</loc><lastmod>2026-01-26T19:39:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-clean-desk-policy/</loc><lastmod>2026-01-26T19:40:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-creating-strong-passwords/</loc><lastmod>2026-01-26T19:39:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-email-security/</loc><lastmod>2026-01-26T19:41:02+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-installing-printers/</loc><lastmod>2026-01-26T19:41:18+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-introduction-to-cybersecurity/</loc><lastmod>2026-01-21T21:28:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-introduction-to-cybersecurity-for-educators/</loc><lastmod>2026-01-21T21:28:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-iot/</loc><lastmod>2026-01-26T19:39:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-malware/</loc><lastmod>2026-01-26T19:40:01+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-malware-forecast/</loc><lastmod>2026-01-26T19:38:00+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-mobile-security/</loc><lastmod>2026-01-21T21:37:53+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-password-security/</loc><lastmod>2026-01-21T21:37:39+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-phishing/</loc><lastmod>2026-01-26T19:43:22+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-physical-security/</loc><lastmod>2026-01-21T21:37:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-privacy-by-design/</loc><lastmod>2026-01-21T21:35:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-proper-disposal/</loc><lastmod>2026-01-26T19:47:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-public-wi-fi/</loc><lastmod>2026-01-21T21:43:33+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-removable-media/</loc><lastmod>2026-01-21T21:37:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-safe-web-browsing/</loc><lastmod>2026-01-26T19:48:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-social-engineering/</loc><lastmod>2026-01-21T21:36:50+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-too-much-information/</loc><lastmod>2026-01-26T19:40:28+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-travel-security/</loc><lastmod>2026-01-21T21:36:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-unauthorized-cloud-services/</loc><lastmod>2026-01-26T19:49:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/need-to-know-working-remotely/</loc><lastmod>2026-01-21T21:36:36+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/phi-definition/</loc><lastmod>2026-01-26T19:42:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/phi-life-cycle/</loc><lastmod>2026-01-26T19:42:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/phi-policy/</loc><lastmod>2026-01-26T19:42:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/privacy-and-eu-gdpr/</loc><lastmod>2026-01-26T19:46:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/protecting-cui/</loc><lastmod>2026-01-21T21:08:04+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/protecting-federal-tax-information/</loc><lastmod>2026-01-26T19:48:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/sarbanes-oxley-act-sox/</loc><lastmod>2026-01-26T19:49:12+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-password-security/</loc><lastmod>2025-07-23T00:39:48+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-phishing/</loc><lastmod>2026-01-26T19:51:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-physical-security/</loc><lastmod>2026-01-26T19:51:27+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-public-wi-fi/</loc><lastmod>2026-01-26T19:52:23+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-social-engineering/</loc><lastmod>2026-01-26T19:52:40+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/work-bytes-social-media-best-practices/</loc><lastmod>2026-01-26T19:53:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-1-bathroom/</loc><lastmod>2026-01-21T21:44:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-11-x-men/</loc><lastmod>2026-01-26T19:53:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-2-evite/</loc><lastmod>2026-01-26T19:54:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-3-robot-lawnmower/</loc><lastmod>2026-01-26T19:54:43+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-4-coffee-guy/</loc><lastmod>2026-01-26T19:54:56+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-5-mallowmars/</loc><lastmod>2026-01-26T19:55:14+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-6-demons/</loc><lastmod>2026-01-26T19:55:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-7-laptop-down/</loc><lastmod>2026-01-26T19:55:58+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-8-eagle-eye/</loc><lastmod>2026-01-26T19:56:10+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-9-tailgating/</loc><lastmod>2026-01-26T19:54:06+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-teaser/</loc><lastmod>2026-01-26T19:56:29+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/core-concepts-cmmc-2-0/</loc><lastmod>2026-01-21T21:13:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/worked-episode-10-travel-stories/</loc><lastmod>2026-01-26T20:03:32+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-breach-notification/</loc><lastmod>2026-01-27T20:02:49+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/gdpr-important-definitions/</loc><lastmod>2026-01-27T20:02:57+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/what-is-gdpr/</loc><lastmod>2026-01-27T20:03:05+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/handling-ssa-provided-information/</loc><lastmod>2026-01-27T20:01:03+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/introduction-to-hipaa/</loc><lastmod>2026-01-27T20:10:38+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/introduction-to-nist-800-171/</loc><lastmod>2026-01-27T20:10:24+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-clean-desk-policy/</loc><lastmod>2026-01-27T20:13:59+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-incident-response/</loc><lastmod>2026-01-27T20:18:51+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/just-the-facts-insider-threats/</loc><lastmod>2026-01-27T20:26:30+00:00</lastmod></url><url><loc>https://infosecinstitute.com/iq/content-library/</loc><lastmod>2026-03-17T13:03:02+00:00</lastmod></url></urlset>