<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://ericscyber.blog/2022/09/20/step-ten-its-all-about-the-journey-keeping-the-strategy-relevant/</loc><lastmod>2022-09-21T05:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/02/22/how-to-draft-a-winning-cybersecurity-strategy/</loc><lastmod>2022-09-21T04:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/08/23/step-nine-how-do-we-get-there-defining-the-operational-roadmap-for-the-strategy/</loc><lastmod>2022-09-21T04:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/07/26/step-eight-how-do-we-know-when-its-working-defining-metrics/</loc><lastmod>2024-10-08T14:46:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/06/29/developing-a-practical-cybersecurity-strategy/</loc><image:image><image:loc>https://ericscyber.blog/wp-content/uploads/2022/06/okr_dev.jpg</image:loc><image:title>okr_dev</image:title></image:image><image:image><image:loc>https://ericscyber.blog/wp-content/uploads/2022/06/okr.bmp</image:loc><image:title>okr</image:title></image:image><image:image><image:loc>https://ericscyber.blog/wp-content/uploads/2022/06/okr.jpg</image:loc><image:title>okr</image:title></image:image><image:image><image:loc>https://ericscyber.blog/wp-content/uploads/2022/06/strat_process_okr.png</image:loc><image:title>strat_process_okr</image:title></image:image><lastmod>2022-06-30T04:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/05/31/step-six-dare-to-dream-envisioning-the-future-state-and-articulating-the-vision/</loc><lastmod>2022-06-01T19:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/05/17/step-five-whats-the-worst-that-can-happen-defining-organizational-risks/</loc><lastmod>2022-05-13T15:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/05/03/step-four-whats-in-it-for-me-determining-your-organizations-priorities-business-value-drivers-and-principles/</loc><lastmod>2022-05-03T16:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/04/19/step-three-who-goes-there-understanding-the-current-and-projected-threat-landscape/</loc><lastmod>2022-04-21T16:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/04/05/step-two-where-are-you-understanding-your-organizations-current-cybersecurity-state/</loc><lastmod>2022-04-09T22:24:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/03/22/step-one-who-are-you-understanding-your-organization/</loc><lastmod>2022-04-07T05:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog/2022/03/08/step-zero-cybersecurity-strategy-isnt-something-to-be-scared-of-basics-of-cybersecurity-strategy/</loc><lastmod>2022-03-08T20:00:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ericscyber.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-10-08T14:46:51+00:00</lastmod></url></urlset>
