<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://kevinlmclaughlin.com/youth-football/</loc><lastmod>2025-09-19T11:37:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://kevinlmclaughlin.com/2025/01/16/15-cybersecurity-leadership-shorts-data-breach/</loc><lastmod>2025-09-19T11:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2025/01/10/14-cybersecurity-leadership-shorts-firewalls/</loc><lastmod>2025-01-10T22:56:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2025/01/08/13-cybersecurity-leadership-shorts-encryption/</loc><lastmod>2025-01-08T13:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2025/01/06/12-cybersecurity-leadership-shorts-cybersecurity-awareness/</loc><lastmod>2025-01-06T15:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2025/01/02/11-cybersecurity-leadership-shorts-least-privilege/</loc><lastmod>2025-01-06T14:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/30/10-cybersecurity-leadership-shorts-defense-in-depth/</loc><lastmod>2024-12-30T19:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/28/9-cybersecurity-leadership-shorts-cia-triad/</loc><lastmod>2024-12-28T18:52:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/26/8-cybersecurity-leadership-shorts_career-development/</loc><lastmod>2024-12-26T22:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/24/7-cybersecurity-leadership-shorts_-threat-hunting/</loc><lastmod>2024-12-24T00:42:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/22/6-cybersecurity-leadership-shorts-cyber-hygiene/</loc><lastmod>2024-12-22T14:56:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/20/5-cybersecurity-leadership-shorts_zero-trust/</loc><lastmod>2024-12-20T21:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/18/4-cybersecurity-leadership-shorts-incident-response/</loc><lastmod>2024-12-18T16:55:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/17/3-cybersecurity-leadership-shorts_-insider-threats/</loc><lastmod>2024-12-17T21:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/16/2-cybersecurity-leadership-shorts_-3-pillars-of-success/</loc><lastmod>2024-12-16T17:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2024/12/16/cybersecurity-leadership-shorts-1_a-team-effort/</loc><lastmod>2024-12-16T17:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/10/02/soc-book-published/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/10/soc-book_mclaughlin.png</image:loc><image:title>soc-book_mclaughlin</image:title></image:image><lastmod>2023-10-02T13:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/09/29/the-power-of-digital-twins-in-the-cybersecurity-mesh/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/09/orcid.png</image:loc><image:title>orcid</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/09/edpacs.png</image:loc><image:title>edpacs</image:title></image:image><lastmod>2023-09-29T16:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/07/28/interweaving-the-strands-of-ai-and-soar-onto-the-cybersecurity-mesh-a-deep-dive-into-the-cybersecurity-mesh-and-its-role-in-modern-digital-defense-strategies/</loc><lastmod>2023-07-28T13:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/06/11/mastering-the-interplay-the-role-and-culture-of-a-cyber-physical-security-cps-professional-in-global-cybersecurity-teams/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/06/orcid.png</image:loc><image:title>orcid</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/06/edpacs.png</image:loc><image:title>edpacs</image:title></image:image><lastmod>2023-06-11T18:07:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/05/25/harmonizing-the-digital-symphony-the-essential-role-of-cybersecurity-detection-engineers-in-safeguarding-cyber-landscapes/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/orcid-2.png</image:loc><image:title>orcid-2</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/edpacs-3.png</image:loc><image:title>edpacs-3</image:title></image:image><lastmod>2023-05-25T19:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/05/23/cybersecurity-deception-engineers-the-unseen-guardians-of-cybersecurity-programs-and-the-unsung-heroes-in-the-battle-against-cyber-threats/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/orcid-1.png</image:loc><image:title>orcid-1</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/orcid.png</image:loc><image:title>orcid</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/edpacs-2.png</image:loc><image:title>edpacs-2</image:title></image:image><lastmod>2023-05-23T00:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/04/30/edpacs-_-2023-_-kevin-lynn-mclaughlin-phd-erik-s-a-elliott/</loc><lastmod>2023-09-25T14:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/05/04/securing-corporate-iot-devices-challenges-strategies-and-the-role-of-ai-and-ml-in-cybersecurity/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/edpacs-iot.png</image:loc><image:title>edpacs-iot</image:title></image:image><lastmod>2023-09-25T14:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/05/18/defense-is-the-best-offense-the-evolving-role-of-cybersecurity-blue-teams-and-the-impact-of-soar-technologies/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/edpacs.png</image:loc><image:title>edpacs</image:title></image:image><lastmod>2023-05-19T12:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/05/19/offense-for-defense-the-art-and-science-of-cybersecurity-red-teaming/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/05/edpacs-1.png</image:loc><image:title>edpacs-1</image:title></image:image><lastmod>2023-05-19T12:38:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/04/30/unlocking-leadership-excellence-one-cybersecurity-executives-guide-to-essential-reads-for-aspiring-team-leaders/</loc><lastmod>2023-04-30T03:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/04/27/cybersecurity-and-fusion-centers/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-29T23:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/02/17/sometimes-you-need-a-who-a-what-no-a-who-oh-ok/</loc><lastmod>2023-02-17T20:08:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/02/14/pollyanna-leadership/</loc><lastmod>2023-02-14T18:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2016/09/29/cyber-security-working-quote/</loc><lastmod>2023-02-10T21:13:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/02/09/retaining-cybersecurity-talent/</loc><lastmod>2023-02-09T16:55:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2023/01/31/ai-and-cybersecurity/</loc><lastmod>2023-01-31T16:49:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2022/07/15/zero-trust/</loc><lastmod>2022-07-15T17:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2022/05/13/a-risk-approach-to-cybersecurity-vulnerability-management-mclaughlin-2022/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2022/05/vuln-metric.png</image:loc><image:title>vuln-metric</image:title></image:image><lastmod>2022-05-13T13:57:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2018/04/10/small-and-medium-size-organizations-at-risk/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2018/04/certified-ciso.png</image:loc><image:title>Certified CISO</image:title></image:image><lastmod>2018-04-10T20:13:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2018/02/15/security-steering-committee-members-needed/</loc><lastmod>2018-02-15T16:52:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2017/06/12/the-office-of-no-really/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2017/06/no.png</image:loc><image:title>No</image:title></image:image><lastmod>2017-06-12T21:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2017/06/06/for-cyber-security-the-perimeter-still-exists-and-never-went-away/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2017/06/perimeter-defense2.png</image:loc><image:title>Perimeter Defense2</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2017/06/perimeter-defense.png</image:loc><image:title>Perimeter Defense</image:title></image:image><lastmod>2023-09-25T14:04:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2017/06/04/why-protect-end-user-workstations-instead-of-servers-first/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2017/06/servers.png</image:loc><image:title>Servers</image:title></image:image><lastmod>2017-06-04T02:38:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2015/02/09/your-horse-was-analog/</loc><lastmod>2016-03-23T23:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2016/03/13/critical-manufacturing-legacy-systems/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2016/03/legacy-table.png</image:loc><image:title>Legacy Table</image:title></image:image><lastmod>2016-03-13T00:57:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2016/03/07/information-security-defense-in-depth-part-2-a-bit-more-technical-view/</loc><lastmod>2016-03-07T00:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2016/02/28/critical-manufacturing-cyber-security-defense-program-a-starting-look/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2016/02/manufacturing-network-segmentation.png</image:loc><image:title>Manufacturing Network Segmentation</image:title></image:image><lastmod>2016-02-28T16:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2016/02/27/cyber-security-a-basic-look-at-defense-in-depth/</loc><lastmod>2016-02-27T16:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2015/12/20/the-highest-risk-ever-not/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2015/12/blog-overnight.jpg</image:loc><image:title>Blog- Overnight</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2015/12/blogwordle.jpg</image:loc><image:title>BlogWordle</image:title></image:image><lastmod>2015-12-20T15:46:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2015/04/09/just-a-note-i-wrote-to-a-previous-employee/</loc><lastmod>2015-04-10T00:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2015/02/23/ciso-or-ciso/</loc><lastmod>2015-02-23T14:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/11/29/home-depot-breach-43m-loss-posting-on-linkedin/</loc><lastmod>2014-11-29T05:38:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/11/04/the-insider-threat-is-alive-and-well-a-summary-taken-directly-from-raytheons-how-to-build-an-insider-threat-program-2014/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/11/factory.jpg</image:loc><image:title>factory</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/11/oops.jpg</image:loc><image:title>oops</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/11/ninjahacker.jpg</image:loc><image:title>NinjaHacker</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/11/white-hat.jpg</image:loc><image:title>White Hat</image:title></image:image><lastmod>2014-11-04T15:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/10/31/just-a-random-thought-after-an-information-technology-it-meeting/</loc><lastmod>2014-10-31T13:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/about/</loc><lastmod>2023-09-25T14:01:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://kevinlmclaughlin.com/2014/10/21/a-day-in-the-life-of-a-senior-cyber-security-incident-responder/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/10/second-guessing.jpg</image:loc><image:title>Second Guessing</image:title></image:image><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2014/10/cyber-hacker.jpg</image:loc><image:title>cyber hacker</image:title></image:image><lastmod>2014-10-21T00:57:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/10/04/whats-it-going-to-take-to-have-cyber-security/</loc><lastmod>2014-10-04T22:05:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/09/03/the-cyber-security-cia-explained-via-calvin-and-hobbes/</loc><lastmod>2014-09-03T19:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2014/03/13/compliance-does-not-equal-security/</loc><lastmod>2014-03-13T20:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2013/12/11/excelsior-national-cyber-security-institute/</loc><lastmod>2014-02-15T14:55:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2013/10/24/fun-story-about-uc-cyber-warfare-game/</loc><lastmod>2013-12-02T16:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2013/12/02/short-iso-presentation/</loc><lastmod>2013-12-02T16:02:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2013/03/10/department-of-homeland-security-fusion-centers-the-cyber-security-liaison-program-a-sharing-of-intelligence/</loc><lastmod>2023-09-25T14:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/11/20/why-is-it/</loc><lastmod>2012-11-20T03:50:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/11/09/the-talent-within/</loc><lastmod>2012-11-09T02:50:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/11/06/in-cyber-crisis/</loc><lastmod>2012-11-06T03:37:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/10/21/non-expiring-passwords-for-c-level-employees-really/</loc><image:image><image:loc>https://kevinlmclaughlin.com/wp-content/uploads/2012/10/password-picture1.jpg</image:loc><image:title>password picture</image:title></image:image><lastmod>2012-11-06T03:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/10/21/building-the-information-assurance-program/</loc><lastmod>2012-11-06T03:35:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/10/25/22/</loc><lastmod>2012-11-06T03:35:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/10/28/common-sense-requires-no-policy/</loc><lastmod>2012-11-06T03:34:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/2012/11/02/a-myth-of-information-security-all-data-needs-to-be-protected/</loc><lastmod>2012-11-06T03:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com/disclaimer/</loc><lastmod>2012-10-28T02:46:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://kevinlmclaughlin.com/2012/10/21/hello-world/</loc><lastmod>2012-10-21T02:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kevinlmclaughlin.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-09-19T11:37:11+00:00</lastmod></url></urlset>
