<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://cyberinformed.com.au/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/blog/capture-the-value-not-the-risk-making-ai-note-takers-safe-by-default</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/blog/the-y2k-legacy-what-a-forgotten-crisis-can-teach-us-about-cyber-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/blog/storytelling-in-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d75e7906a0145e7abae1f4/45a5f0d3-203e-4098-9cb4-22eccc4e02e5/darren-arnott-cyber-informed-portrait.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/68d75e7906a0145e7abae1f4/45d102ec-0f6a-4561-a304-a7ad4c8fd0f0/logo.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618497259178-6XJGK9GR6YAVBQL5L519/20140301_Trade-151_012-2.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1607638148090-Y6OFDI575CM3NQV732RJ/Large+JPG-Aro+Ha_0387.jpg</image:loc>
      <image:title>Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/glossary</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberinformed.com.au/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-12</lastmod>
  </url>
</urlset>

