<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-5-1717183603653</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan-5-1717183486684</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-5-1717176735097</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-5-1717183327679</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-5-1717182984742</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-5-1717171904976</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-5-1717176667071</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/how-can-i-connect-with-a-ciso-or-an-instructor</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-5-1717171598763</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-5-1717174089593</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-5-1717171804642</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-5-1717172576740</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-5-1717173193498</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-5-1717171033607</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/the-importance-of-proper-email-etiquette.pdf</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-5-1717183963779</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-5-1717182928872</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-5-1717183409646</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-5-1717171852849</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-5-1717182586945</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-5-1717183734721</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-5-1717183388725</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-5-1717171758012</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-5-1717171696770</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-5-1717171876658</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-5-1717182884610</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-5-1717172508664</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-5-1717183914737</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/url-heaven</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-5-1717172673809</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-5-1717173040784</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-5-1717183822706</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-5-1717184097602</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-5-1717183458725</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-5-1717183431692</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-5-1717170937796</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-5-1717172602825</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-5-1717172938153</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-5-1717172916757</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-5-1717183674699</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-5-1717171403045</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/kb-search-results</loc><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1).png</image:loc><image:caption>SymposiaSocialIcon1</image:caption><image:title>SymposiaSocialIcon1</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1)-1.png</image:loc><image:caption>SymposiaSocialIcon11</image:caption><image:title>SymposiaSocialIcon11</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Knowledge%20Base%20Banner%20(2).png</image:loc><image:caption>KnowledgeBaseBanner2</image:caption><image:title>KnowledgeBaseBanner2</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-5-1717184150764</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration</loc><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Knowledge%20Base%20Banner%20(2).png</image:loc><image:caption>KnowledgeBaseBanner2</image:caption><image:title>KnowledgeBaseBanner2</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1)-1.png</image:loc><image:caption>SymposiaSocialIcon11</image:caption><image:title>SymposiaSocialIcon11</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1).png</image:loc><image:caption>SymposiaSocialIcon1</image:caption><image:title>SymposiaSocialIcon1</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-5-1717183560761</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-5-1717172556948</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-5-1717171156762</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-5-1717171070661</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-5-1717171542116</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-5-1717183225850</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/do-i-have-to-take-every-foundational-cohort</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-5-1717172773494</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-5-1717173916954</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-5-1717172642624</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-5-1717172535637</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-5-1717171935663</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-5-1717183639802</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-5-1717171827703</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-5-1717183254853</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-5-1717182960693</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-5-1717173115245</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-5-1717184130690</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-5-1717172752084</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/all-things-information-security</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-5-1717173291727</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-5-1717171729931</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-5-1717172846847</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-5-1717183043659</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-5-1717171443234</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-5-1717183940700</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-5-1717184182710</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-5-1717182619675</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-5-1717171256555</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-5-1717171575847</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-5-1717183990880</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-archive-retention-and-destruction-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-5-1717171232057</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/how-to-write-a-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-5-1717174148217</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-5-1717183017683</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-5-1717173011091</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/pci-4.0-aws</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-5-1717173999657</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-5-1717173976544</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-5-1717173270001</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-5-1717184071749</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-5-1717173936803</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-5-1717175310140</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-5-1717182831890</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-5-1717172820702</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/how-do-i-turn-in-my-homework</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-5-1717172621637</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recover-plan</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-5-1717175281194</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-5-1717172485412</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-5-1717172989741</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-5-1717171337903</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-5-1717182862814</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-5-1717183762668</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-protection-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-5-1717173151922</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-5-1717175206209</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-5-1717170998123</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-5-1717173887636</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy-5-1717171781718</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-5-1717171620792</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-checklist</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-5-1717183356707</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-5-1717171471841</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-5-1717175240239</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/data-classification-handling-policy-5-1717171287637</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-5-1717183886767</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-5-1717174031665</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-5-1717183133782</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-5-1717173955580</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy-5-1717173322407</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-5-1717183169672</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-5-1717171642640</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/ethics-code-of-conduct-policy-5-1717172796000</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-communications-protection-policy-5-1717183103739</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-5-1717173221683</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-5-1717182800790</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/access-control-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/byod-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/physical-environmental-protection-policy-5-1717171667716</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-5-1717167816946</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/change-management-policy-4</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-5-1717171365897</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-5-1717183796716</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy-5-1717172967948</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/system-and-information-integrity-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-management-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/vendor-management-policy-5-1717173343541</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/kb-404</loc><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1).png</image:loc><image:caption>SymposiaSocialIcon1</image:caption><image:title>SymposiaSocialIcon1</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Knowledge%20Base%20Banner%20(2).png</image:loc><image:caption>KnowledgeBaseBanner2</image:caption><image:title>KnowledgeBaseBanner2</image:title></image:image><image:image><image:loc>https://23841054.fs1.hubspotusercontent-na1.net/hubfs/23841054/Symposia%20-%20Social%20Icon%20(1)-1.png</image:loc><image:caption>SymposiaSocialIcon11</image:caption><image:title>SymposiaSocialIcon11</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/software-development-policy-5-1717183073738</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan-5-1717171104658</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recover-plan-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/audit-and-accountability-policy-5-1717183302727</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy-5-1717174054714</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-awareness-and-training-policy-5-1717173242904</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/privacy-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/asset-management-policy-5-1717183275259</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/security-assessment-policy-5-1717184033773</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/identification-and-authentication-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/incident-response-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/media-protection-policy-3</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/business-continuity-plan</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/risk-assessment-policy-5-1717173173958</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/logging-monitoring-policy-5-1717183710682</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/configuration-management-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/mobile-applications-and-devices-key-federal-laws</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/maintenance-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/encryption-cryptography-policy-5-1717183512658</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/network-security-policy</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/endpoint-security-policy-2</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/disaster-recovery-plan-1</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/acceptable-use-policy-5-1717172462070</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/personnel-security-policy-5-1717183846694</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://knowledge-base.symposia.com/migration/penetration-testing-methodology-3</loc><lastmod>2025-11-20</lastmod></url></urlset>