<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://sicurezzainformaticamagazine.it/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://sicurezzainformaticamagazine.it/cybersecurity-litalia-diventa-sede-dellhub-di-incident-response-di-cynet/</loc><lastmod>2024-03-26T14:00:08+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cybersicurezza-deloitte-fondamentale-lequilibrio-tra-gli-obiettivi-di-cybersicurezza-nazionali-e-gli-impegni-richiesti-alle-imprese/</loc><lastmod>2024-08-05T13:51:36+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/come-gestire-attivamente-la-vulnerabilita-dei-dati-grazie-al-bpm/</loc><lastmod>2024-09-16T07:11:56+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cyber-guru-chiude-round-b-da-23-milioni-di-euro/</loc><lastmod>2024-10-25T21:20:17+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cybersecurity-tips-come-imparare-a-riconoscere-gli-attacchi-cyber-e-a-difendere-il-proprio-business/</loc><lastmod>2025-02-13T10:25:43+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/bei-e-liftt-e-levante-capital-round-da-3-milioni-per-drivesec-torinese-attiva-nel-cyber-testing-industriale-delliot/</loc><lastmod>2025-02-18T16:54:08+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/trasformazione-dei-dati-e-cybersecurity-industriale-al-centro-del-tech-day-2025/</loc><lastmod>2025-03-07T16:56:29+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cyber-security-si-e-svolto-ieri-a-milano-il-dns-day-the-ciso-game-incontro-di-formazione-interattiva-dedicato-alla-sicurezza-informatica/</loc><lastmod>2025-04-09T22:22:07+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/il-valore-del-dialogo-tra-generazioni-nellimpresa-del-futuro-smi-group-celebra-10-anni-di-innovazione-nellict/</loc><lastmod>2025-05-28T22:39:22+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cyber-security-a-genova-arriva-il-digital-club-cyber-unopportunita-di-formazione-e-networking-per-affrontare-gli-attacchi-informatici/</loc><lastmod>2025-05-29T15:54:51+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/shecyber-bridging-the-gender-gap-leadership-femminile-cybersecurity-e-ai-al-centro-di-un-confronto-tra-professionisti-istituzioni-e-universita/</loc><lastmod>2025-06-15T15:01:30+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/pagamenti-istantanei-e-antifrode-perche-serve-un-approccio-predittivo/</loc><lastmod>2025-07-08T07:00:10+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/cybersecurity-successo-per-fondazione-serics-in-silicon-valley-la-ricerca-italiana-incontra-il-mercato-globale/</loc><lastmod>2026-02-03T17:53:17+00:00</lastmod></url><url><loc>https://sicurezzainformaticamagazine.it/security-e-cybersecurity-protagoniste-a-urban-tech-2026-con-secsolutionforum/</loc><lastmod>2026-03-04T09:14:11+00:00</lastmod></url></urlset>
