<?xml version="1.0" encoding="UTF-8"?>
<!--generator-class="Icamys\SitemapGenerator\SitemapGenerator"-->
<!--generator-version="5.0.0"-->
<!--generated-on="2026-05-21T03:12:39+00:00"-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://www.scworld.com/cybercast/rise-of-the-machines-how-to-secure-and-win-the-ai-revolution</loc>
  <lastmod>2026-05-20T22:07:27+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-inheritance-problem-why-agentic-ai-needs-a-unified-identity-foundation</loc>
  <lastmod>2026-05-15T21:04:56+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-new-threat-intel-arms-race-why-ai-automation-and-open-data-changes-everything</loc>
  <lastmod>2026-05-14T21:37:50+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/state-of-critical-infrastructure-security</loc>
  <lastmod>2026-05-11T21:53:26+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ai-for-better-secops-a-black-hat-preview</loc>
  <lastmod>2026-05-04T22:59:26+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ciso-stories-ai-security-blackhat-preview-arctic-wolf</loc>
  <lastmod>2026-05-04T22:04:12+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/evolving-defense-securing-the-enterprise-against-agentic-ai-threats</loc>
  <lastmod>2026-05-19T21:05:25+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/burnout-blind-spots-and-the-breaking-points-of-security-operations</loc>
  <lastmod>2026-04-15T20:29:04+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/iam-for-mssps-real-world-deployments</loc>
  <lastmod>2026-05-18T17:11:54+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-rise-of-non-human-identities-who-governs-ai-access-to-data</loc>
  <lastmod>2026-04-09T21:26:05+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/securing-every-door-scalable-strategies-to-manage-machine-and-ai-agent-risks</loc>
  <lastmod>2026-03-24T16:29:28+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ransomware-reloaded-finding-resilience-when-attackers-wield-ai</loc>
  <lastmod>2026-04-20T19:23:03+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/from-code-to-cloud-stopping-attacks-in-the-software-supply-chain</loc>
  <lastmod>2026-04-14T16:41:49+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/privilege-risk-is-in-the-lifecycle-a-ciso-discussion-on-modernizing-identity-control</loc>
  <lastmod>2026-03-09T18:43:16+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ring-the-alarm-your-it-security-program-has-a-mobile-app-gap</loc>
  <lastmod>2026-03-05T20:43:07+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-industrialization-of-identity-compromise</loc>
  <lastmod>2026-03-03T14:27:07+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/better-threat-intelligence-between-public-and-private-sectors</loc>
  <lastmod>2026-03-13T17:55:52+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/hard-to-handle-securing-ai-generated-code-and-the-ai-agents-that-write-it</loc>
  <lastmod>2026-03-03T14:27:03+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/rethinking-identity-security-for-a-borderless-attack-surface</loc>
  <lastmod>2026-03-19T14:22:46+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/cloud-security-the-ai-effect-and-how-to-proceed</loc>
  <lastmod>2026-04-17T21:53:19+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/protecting-passwords-properly-implementing-and-using-workforce-password-management</loc>
  <lastmod>2026-03-18T17:27:40+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/appsec-in-the-age-of-ai-an-rsac-conference-preview</loc>
  <lastmod>2026-01-28T22:44:21+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/inside-monday-coms-security-strategy-when-app-growth-outpaces-identity-control</loc>
  <lastmod>2026-02-24T22:23:44+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/rsac-preview-exposure-management-takes-center-stage</loc>
  <lastmod>2026-02-10T16:03:35+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/beyond-the-hype-the-cybersecurity-trends-cisos-are-keeping-an-eye-on-in-2026</loc>
  <lastmod>2026-01-27T00:38:39+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/how-to-transform-your-soc-through-xdr-and-mdr</loc>
  <lastmod>2026-01-28T16:48:45+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/beyond-the-data-perimeter-why-next-generation-dspm-is-the-foundation-for-modern-data-security</loc>
  <lastmod>2026-02-23T16:13:44+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/protecting-application-user-data-for-better-privacy-governance-and-compliance</loc>
  <lastmod>2026-02-10T16:52:43+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ai-vs-humans-the-coming-war-over-digital-identity</loc>
  <lastmod>2026-02-02T18:29:46+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/ai-for-network-security-problems-and-solutions</loc>
  <lastmod>2026-01-12T21:44:16+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-next-evolution-of-application-security-ai-accelerated-devsecops</loc>
  <lastmod>2026-01-02T18:41:04+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/mainframe-security-in-a-changing-regulatory-landscape-aligning-with-nydfs-dora-and-beyond</loc>
  <lastmod>2026-03-12T19:21:25+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/trusted-automation-building-autonomous-it-with-confidence</loc>
  <lastmod>2026-01-15T22:20:33+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/why-trust-and-data-integrity-are-the-cornerstones-of-ai-for-the-public-sector</loc>
  <lastmod>2026-01-09T18:12:56+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/beyond-mfa-securing-the-human-element-with-identity-threat-detection</loc>
  <lastmod>2025-12-09T22:50:42+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/securing-the-fasted-growing-identity-surface-the-rise-of-nhis-and-ai-agents</loc>
  <lastmod>2026-03-23T08:19:48+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/the-rise-of-shadow-ait-from-blind-spots-to-real-time-insight</loc>
  <lastmod>2025-12-18T19:05:08+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/beyond-the-seg-rethinking-email-security-for-the-modern-enterprise</loc>
  <lastmod>2025-11-26T17:49:41+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/scaling-secure-software-in-the-age-of-ai-turning-intelligence-into-action</loc>
  <lastmod>2025-11-21T15:19:12+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/sases-role-in-securing-ai-adoption</loc>
  <lastmod>2025-11-24T21:31:36+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/attack-surface-management-continuous-discovery-external-attack-paths</loc>
  <lastmod>2025-11-06T21:49:58+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/securing-the-ai-first-enterprise-access-controls-for-ai-agents-and-non-human-identities</loc>
  <lastmod>2025-11-11T17:20:11+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/access-under-attack-rethinking-identity-as-the-new-cyber-battleground</loc>
  <lastmod>2025-11-10T22:26:27+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/salesforce-security-in-a-shared-responsibility-world-eliminating-misconfigurations-and-drift-before-they-become-breaches</loc>
  <lastmod>2025-10-16T20:26:21+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/from-checklists-to-intelligence-integrating-ai-into-your-grc-strategy</loc>
  <lastmod>2025-11-03T21:20:37+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/inside-colgates-security-strategy-protecting-the-digital-face-of-a-global-brand</loc>
  <lastmod>2025-10-29T20:46:14+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/iam-zero-trust-tools-for-building-a-stronger-identity-fabric</loc>
  <lastmod>2025-12-02T18:17:16+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/securing-machine-identities-and-ssh-keys-deploying-zero-trust-to-close-gaps-that-attackers-exploit</loc>
  <lastmod>2025-10-07T18:23:51+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/cybercast/empowering-without-exposing-a-roadmap-for-security-teams-in-a-citizen-developers-world</loc>
  <lastmod>2025-11-05T15:43:31+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/securing-the-future-of-finance-strategies-to-counter-modern-cyber-threats-1</loc>
  <lastmod>2025-08-22T15:12:18+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/owasp-appsec-cybersecurity-summit</loc>
  <lastmod>2025-08-20T18:42:53+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/nationwide-cybersecurity-summit-2025-safeguarding-americas-digital-future</loc>
  <lastmod>2025-08-20T18:30:43+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/ransomware-resilience-strategies-to-defend-mitigate-and-recover</loc>
  <lastmod>2025-08-20T18:28:35+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/fortifying-the-foundation-tackling-evolving-challenges-in-network-security</loc>
  <lastmod>2025-08-20T18:25:20+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/securing-the-backbone-strategies-to-counter-cyber-threats-to-critical-infrastructure-in-the-public-sector</loc>
  <lastmod>2025-08-20T18:26:41+00:00</lastmod>
 </url>
 <url>
  <loc>https://www.scworld.com/virtual-conference/securing-the-future-of-finance-strategies-to-counter-modern-cyber-threats</loc>
  <lastmod>2025-03-31T19:45:11+00:00</lastmod>
 </url>
</urlset>
