<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://jackgeddes.com/</loc></url>
  <url><loc>https://jackgeddes.com/answers/</loc></url>
  <url><loc>https://jackgeddes.com/answers/access-review-glossary/</loc></url>
  <url><loc>https://jackgeddes.com/answers/anonymization-vs-pseudonymization/</loc></url>
  <url><loc>https://jackgeddes.com/answers/ariba-coupa/</loc></url>
  <url><loc>https://jackgeddes.com/answers/audit-log-glossary/</loc></url>
  <url><loc>https://jackgeddes.com/answers/baa/</loc></url>
  <url><loc>https://jackgeddes.com/answers/backup-purge-process/</loc></url>
  <url><loc>https://jackgeddes.com/answers/backups-policy/</loc></url>
  <url><loc>https://jackgeddes.com/answers/bcp-dr/</loc></url>
  <url><loc>https://jackgeddes.com/answers/change-management-process/</loc></url>
  <url><loc>https://jackgeddes.com/answers/cis-benchmarks/</loc></url>
  <url><loc>https://jackgeddes.com/answers/compliance-automation/</loc></url>
  <url><loc>https://jackgeddes.com/answers/controller-processor/</loc></url>
  <url><loc>https://jackgeddes.com/answers/data-minimization/</loc></url>
  <url><loc>https://jackgeddes.com/answers/data-residency-vs-transfer/</loc></url>
  <url><loc>https://jackgeddes.com/answers/data-subject-rights/</loc></url>
  <url><loc>https://jackgeddes.com/answers/deletion-policy/</loc></url>
  <url><loc>https://jackgeddes.com/answers/dlp-glossary/</loc></url>
  <url><loc>https://jackgeddes.com/answers/dlp/</loc></url>
  <url><loc>https://jackgeddes.com/answers/dpa/</loc></url>
  <url><loc>https://jackgeddes.com/answers/dpia/</loc></url>
  <url><loc>https://jackgeddes.com/answers/dpo/</loc></url>
  <url><loc>https://jackgeddes.com/answers/edr-mdm/</loc></url>
  <url><loc>https://jackgeddes.com/answers/grc-definition/</loc></url>
  <url><loc>https://jackgeddes.com/answers/idp/</loc></url>
  <url><loc>https://jackgeddes.com/answers/incident-response/</loc></url>
  <url><loc>https://jackgeddes.com/answers/iso-27001/</loc></url>
  <url><loc>https://jackgeddes.com/answers/kms/</loc></url>
  <url><loc>https://jackgeddes.com/answers/mfa/</loc></url>
  <url><loc>https://jackgeddes.com/answers/onetrust/</loc></url>
  <url><loc>https://jackgeddes.com/answers/pentest-glossary/</loc></url>
  <url><loc>https://jackgeddes.com/answers/phi/</loc></url>
  <url><loc>https://jackgeddes.com/answers/pii/</loc></url>
  <url><loc>https://jackgeddes.com/answers/policy-vs-procedure/</loc></url>
  <url><loc>https://jackgeddes.com/answers/polp/</loc></url>
  <url><loc>https://jackgeddes.com/answers/rbac/</loc></url>
  <url><loc>https://jackgeddes.com/answers/ropa/</loc></url>
  <url><loc>https://jackgeddes.com/answers/ror-break-glass/</loc></url>
  <url><loc>https://jackgeddes.com/answers/rto-rpo/</loc></url>
  <url><loc>https://jackgeddes.com/answers/saml-oidc/</loc></url>
  <url><loc>https://jackgeddes.com/answers/sccs/</loc></url>
  <url><loc>https://jackgeddes.com/answers/secrets-management/</loc></url>
  <url><loc>https://jackgeddes.com/answers/secrets-scanning/</loc></url>
  <url><loc>https://jackgeddes.com/answers/secure-sdlc-process/</loc></url>
  <url><loc>https://jackgeddes.com/answers/service-level-metrics/</loc></url>
  <url><loc>https://jackgeddes.com/answers/siem/</loc></url>
  <url><loc>https://jackgeddes.com/answers/soc-2/</loc></url>
  <url><loc>https://jackgeddes.com/answers/sop-definition/</loc></url>
  <url><loc>https://jackgeddes.com/answers/sso/</loc></url>
  <url><loc>https://jackgeddes.com/answers/subprocessors-management/</loc></url>
  <url><loc>https://jackgeddes.com/answers/tls/</loc></url>
  <url><loc>https://jackgeddes.com/answers/vulnerability-management-process/</loc></url>
  <url><loc>https://jackgeddes.com/answers/vulnerability-metrics/</loc></url>
  <url><loc>https://jackgeddes.com/answers/vulnerability-scanners/</loc></url>
  <url><loc>https://jackgeddes.com/answers/whistic/</loc></url>
</urlset>
