<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://paolocarner.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/2026313not-all-vcisos-are-solving-the-same-problem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/one-extra-letter-73-million-gone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/why-diy-iso-27001-is-a-tax-on-growth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/the-vciso-trap-how-the-industry-solved-the-wrong-problem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/why-chatgpt-cant-save-you-from-security-questionnaires</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/just-show-me-the-risk-first-why-this-common-executive-push-back-misses-the-point</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/f281191e-1ddc-4c49-abfa-6a4e95a7c2bb/Figure+1%3A+Different+contexts+for+security+investment+decisions</image:loc>
      <image:title>PUBLIC BLOG - "Just Show Me the Risk First" - Why This Common Executive Push-Back Misses the Point - Make it stand out</image:title>
      <image:caption>Figure 1: Different contexts for security investment decisions</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/the-controls-that-fail-when-you-need-them-most</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/the-security-spending-trap-why-your-investment-isnt-protecting-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-18</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/understanding-third-party-cyber-risk-for-smbs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/f88522d5-f67d-420d-a459-00f744a9638f/image.png</image:loc>
      <image:title>PUBLIC BLOG - Understanding Third-Party Cyber Risk for SMBs - Cloudflare Outage</image:title>
      <image:caption>The typical message users received from the recent Cloudflare outage.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/why-your-fintech-customers-are-reworking-your-saas-contract-and-what-you-need-to-fix-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/a-practical-guide-to-cybersecurity-spending-for-smbs-in-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/1746c48f-fb4d-4156-9665-5274b3e703d4/Screenshot+2025-10-08+at+10.38.36.png</image:loc>
      <image:title>PUBLIC BLOG - A Practical Guide to Cybersecurity Spending for SMBs in 2025 - Losses by Threat Type</image:title>
      <image:caption>This table summarizes the most common and costly cyber threats facing SMBs today</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/better-cybersecurity-10-steps-of-wisdom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/is-your-incident-response-plan-ready-for-the-spotlight</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/d9d3a762-df9a-4bd3-a981-217a1997e6ff/Screenshot+2025-09-26+at+13.17.46.png</image:loc>
      <image:title>PUBLIC BLOG - Is Your Incident Response Plan Ready for the Spotlight? - Reporting Incidents: A a quick look at some of the reporting timeframes.</image:title>
      <image:caption>This table is for illustrative purposes and is not an exhaustive list. Always consult with legal counsel to ensure compliance with all applicable regulations.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/a-startup-guide-to-risk-appetite-and-risk-tolerance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/1a8594a5-b5b4-4a74-9381-699d95456d49/Screenshot+2025-09-22+at+13.27.55.png</image:loc>
      <image:title>PUBLIC BLOG - A Startup Guide to Risk Appetite and Risk Tolerance - Make it stand out</image:title>
      <image:caption>Risk Appetite Categories, according to ISO/IEC 31000</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/5290629f-314e-4577-866a-85b4ff17509e/Screenshot+2025-09-22+at+13.48.44.png</image:loc>
      <image:title>PUBLIC BLOG - A Startup Guide to Risk Appetite and Risk Tolerance - Example of a Risk Assessment Heat Map</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/15aebd61-6bfc-4840-9edd-9a8afa4d42d3/Screenshot+2025-09-22+at+13.51.30.png</image:loc>
      <image:title>PUBLIC BLOG - A Startup Guide to Risk Appetite and Risk Tolerance - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/ditch-that-password-why-your-business-needs-to-embrace-passkeys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/the-language-used-in-your-security-policies-could-land-you-in-legal-hot-water</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-01</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/cybersecurity-career-progression-from-analyst-to-leader</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/y4vzmqalbb5y58urpa11uzsyb3eto2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-21</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/the-million-dollar-question-when-youre-spending-too-much-on-risk-prevention</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/my-lost-smartphone-and-learned-lessons-in-incident-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/bd47e2a4-56a6-412c-a790-aedb03038dc5/Screenshot+2025-07-15+at+12.09.03.png</image:loc>
      <image:title>PUBLIC BLOG - What losing my Smartphone taught me about Incident Response and Business Continuity - My safety line:</image:title>
      <image:caption>This trusty old iPhone.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/cybersecurity-career-roadmap-your-path-from-beginner-to-leader</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/d5d41cf2-f17a-4b19-9794-30efde33c0db/Screenshot+2025-07-08+at+10.26.53.png</image:loc>
      <image:title>PUBLIC BLOG - Breaking Into Cybersecurity: A Realistic Guide for Career Changers - Cybersecurity isn't like the movie "The Net" or "War Games" (yes, I am that old!)</image:title>
      <image:caption>You won't be typing furiously in a dark room while dramatic music plays in the background. But here's what it is: one of the most rewarding, challenging, and future-proof career paths you can choose.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/cba589eb-3a2c-4136-a382-26dfa9431e1f/677bb9b63e6de14700bdf99f_v2_DSC05465-p-2000.jpg</image:loc>
      <image:title>PUBLIC BLOG - Breaking Into Cybersecurity: A Realistic Guide for Career Changers - Let me let you into a secret…</image:title>
      <image:caption>The most successful cybersecurity professionals aren't necessarily the most technical. They're the ones who can explain complex problems in simple terms. Work on this.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/from-security-guard-to-business-conductor-the-modern-cisos-journey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/5e0ee945-24a0-40a0-8c64-2ca9149f54f2/Gemini_Generated_Image_9ogozs9ogozs9ogo.jpeg</image:loc>
      <image:title>PUBLIC BLOG - The Modern CISO: from Tech Geek to Business Consultant - Here's the thing about cybersecurity leadership that might surprise you: it's no longer only about technology. It is — and, I would argue, mostly — about people, and having them follow the right processes. You've heard this three-legged stool already: People, Process, and Technology.</image:title>
      <image:caption>When any of these fail, your organization will be the equivalent of the owners of a house in the neighborhood that close all the windows but leave its front door wide open with a sign saying "valuables inside”: just waiting for the "right” person to notice.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/tag/Executive+Essentials</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://paolocarner.com/blog/tag/Business+Impact</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://paolocarner.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-06</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/1f0ddb8d-3978-46d0-b377-8b9757b99363/IMG_3512.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/a6adda30-8711-4ecb-9efa-e7e532175aa7/ms_cyber.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/9580d6f6-91fa-4184-bdc9-34119e440645/cissp.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/d89cc522-8a55-4790-a9ea-83f1d2dc8f95/issmp.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/b693e205-c958-4416-b20b-6bc6e6ff4147/fair.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/686a338c324e1f5223e0566b/92068e63-948f-4943-9663-f18b7e3a6802/twitter_thumb_201604_azure-solutions-architect-expert-600x600.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://paolocarner.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-06</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/speaking</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-14</lastmod>
  </url>
  <url>
    <loc>https://paolocarner.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-13</lastmod>
  </url>
</urlset>

