<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https:///www.ponemon.org/</loc></url>
<url><loc>https:///www.ponemon.org/.html</loc></url>
<url><loc>https:///www.ponemon.org/additional-site-content/</loc></url>
<url><loc>https:///www.ponemon.org/additional-site-content/default-header-image.html</loc></url>
<url><loc>https:///www.ponemon.org/additional-site-content/site-icons.html</loc></url>
<url><loc>https:///www.ponemon.org/additional-site-content/404-page-not-found.html</loc></url>
<url><loc>https:///www.ponemon.org/about/</loc></url>
<url><loc>https:///www.ponemon.org/about/our-leaders.html</loc></url>
<url><loc>https:///www.ponemon.org/about/why-we-are-unique.html</loc></url>
<url><loc>https:///www.ponemon.org/about/privacy-policy.html</loc></url>
<url><loc>https:///www.ponemon.org/about/ponemon-sullivan-privacy-report.html</loc></url>
<url><loc>https:///www.ponemon.org/contact-us/</loc></url>
<url><loc>https:///www.ponemon.org/contact-us/thank-you.html</loc></url>
<url><loc>https:///www.ponemon.org/contact-us/contact.html</loc></url>
<url><loc>https:///www.ponemon.org/rim/</loc></url>
<url><loc>https:///www.ponemon.org/rim/rim-council.html</loc></url>
<url><loc>https:///www.ponemon.org/rim/rim-presentations/</loc></url>
<url><loc>https:///www.ponemon.org/rim/rim-presentations/rim-presentations.html</loc></url>
<url><loc>https:///www.ponemon.org/account/</loc></url>
<url><loc>https:///www.ponemon.org/account/forgot-password.html</loc></url>
<url><loc>https:///www.ponemon.org/account/change-password.html</loc></url>
<url><loc>https:///www.ponemon.org/account/account.html</loc></url>
<url><loc>https:///www.ponemon.org/account/login.html</loc></url>
<url><loc>https:///www.ponemon.org/account/logout.html</loc></url>
<url><loc>https:///www.ponemon.org/search.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/are-we-taking-adequate-steps-to-protect-the-critical-infrastructure.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/aftermath-of-a-data-breach-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/advanced-threat-detection-with-machine-generated-intelligence.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/achieving-security-in-workplace-file-sharing.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/a-few-challenges-in-calculating-total-cost-of-a-data-breach-using-insurance-claims-payment-data.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2017-cost-of-data-breach-study-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2017-study-on-mobile-and-internet-of-things-application-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2017-cost-of-cyber-crime-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2016-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2016-cost-of-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2015-state-of-the-endpoint-report-user-centric-risk.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2015-cost-of-cyber-crime-study-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2015-cost-of-data-breach-global.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-global-report-on-the-cost-of-cyber-crime.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-cost-of-data-breach-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-cost-of-data-breach-global.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-best-schools-for-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-a-year-of-mega-breaches-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2014-a-year-of-mega-breaches.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-survey-on-medical-identity-theft-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-survey-on-medical-identity-theft.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-state-of-the-endpoint-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-state-of-the-endpoint.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-cost-of-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2013-cost-of-data-breach-global-analysis.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-web-session-intelligence-security-report-business-logic-abuse-edition-sponsored-by-silver-tail-systems.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-payment-security-practices-survey-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-most-trusted-companies-for-privacy-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-most-trusted-companies-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-cost-of-cyber-crime-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-business-banking-trust-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2012-application-security-gap-study-a-survey-of-it-security-developers.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-privacy-trust-study-for-retail-banking.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-second-annual-cost-of-cyber-crime-study-benchmark-study-of-us-companies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-germany.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-india.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-japan.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-france.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2011-cost-of-data-breach-australia.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2010-access-governance-trends-survey.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/around-the-world-it-security-practitioners-face-a-common-problem-a-budget-that-is-inadequate-to-deal-with-cyber-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/best-practices-in-data-protection-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/big-data-analytics-in-cyber-defense.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/can-a-data-breach-in-the-cloud-result-in-a-larger-and-more-costly-incident.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/compliance-like-a-club.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/corporate-data-a-protected-asset-or-a-ticking-time-bomb.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/cost-of-a-data-breach-climbs-higher.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/cost-of-data-breach-grows-as-does-frequency-of-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/criminal-attacks-the-new-leading-cause-of-data-breach-in-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/cyber-security-incident-response-are-we-as-prepared-as-we-think.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/cyber-security-incident-response-are-we-as-prepared-as-we-think-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/cyber-strategies-for-endpoint-defense-2014.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/data-breaches-caused-by-insiders-increase-in-frequency-and-cost.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/edelman-privacy-risk-index.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/efficacy-of-emerging-network-security-technologies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/egov-initiative-not-without-risk-to-citizen-data.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/encryption-in-the-cloud-who-is-responsible-for-data-protection-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/fear-and-loathing-in-online-advertising.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/flipping-the-economics-of-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/fourth-annual-benchmark-study-on-patient-privacy-and-data-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/fourth-annual-benchmark-study-on-patient-privacy-data-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/future-state-of-it-security-a-survey-of-it-security-executives.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/global-study-on-mobility-risks-survey-results-for-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/healthcare-organizations-are-in-the-cross-hairs-of-cyber-attackers.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/how-much-is-the-data-on-your-mobile-device-worth.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/how-single-sign-on-is-changing-healthcare-a-study-of-it-practitioners-in-acute-care-hospitals-in-the-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/hsm-global-market-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/integrated-holistic-security-strategies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/is-your-company-ready-for-a-big-data-breach-the-second-annual-study-on-data-breach-preparedness.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/listen-to-a-new-podcast-on-the-true-cost-of-compliance-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/live-threat-intelligence-impact-report-2013.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/live-threat-intelligence-impact-report-2013-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/managing-cyber-security-as-a-business-risk-cyber-insurance-in-the-digital-age.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/more-employees-ignoring-data-security-policies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/most-trusted-retail-banks-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/national-survey-on-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/new-ponemon-institute-study-released-economic-impact-of-mixed-content-warnings-on-consumer-behavior.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/new-ponemon-study-on-malware-detection-prevention-released.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/new-research-on-privileged-access-management-reveals-the-status-quo-is-not-secure.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/security-of-cloud-computing-users-2013-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-and-cloudera-announce-a-webinar-on-the-state-of-cybersecurity-big-data-analytics-on-october-11-at-10-am-pt-1-pm-et.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-and-kilpatrick-townsend-release-the-second-annual-study-on-the-cybersecurity-risk-to-knowledge-assets.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-and-raytheon-release-new-study-on-the-insider-threat.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-announces-results-of-2014-most-trusted-companies-for-privacy-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-announces-the-release-of-the-2018-megatrends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-releases-new-study-on-how-organizations-can-leapfrog-to-a-stronger-cyber-security-posture.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-institute-releases-new-study-on-the-efforts-of-retail-companies-and-financial-services-to-improve-the-time-to-detect-and-contain-advanced-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/ponemon-releases-cloud-service-provider-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/risk-of-insider-fraud-second-annual-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/risks-rewards-of-online-mobile-health-services-consumer-attitudes-explored.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/security-compliance-trends-in-innovative-electronic-payments.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/security-in-the-new-mobile-ecosystem.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/2010-security-in-the-trenches.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/separating-the-truths-from-the-myths-in-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/nearly-90-percent-of-healthcare-organizations-suffer-data-breaches-new-ponemon-study-shows.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/sixth-annual-benchmark-study-on-privacy-security-of-healthcare-data.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/smbs-are-vulnerable-to-cyber-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/thales-e-security-and-ponemon-institute-collaborate-to-produce-2013-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-2017-state-of-endpoint-security-risk-report.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-aftermath-of-a-data-breach-consumer-sentiment.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-business-case-for-data-protection-what-senior-executives-think-about-data-protection.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cost-of-insecure-mobile-devices-in-the-workplace.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cost-of-malware-containment.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cyber-hygiene-index-measuring-the-riskiest-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cyber-readiness-of-canadian-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cyber-resilient-organization-in-germany-learning-to-thrive-against-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-cyber-resilient-organization-learning-to-thrive-against-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-economic-productivity-impact-of-it-security-on-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-evolving-role-of-cisos-and-their-importance-to-the-business.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-human-factor-in-data-protection.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-impact-of-cybercrime-on-business-studies-of-it-practitioners-in-the-united-states-united-kingdom-germany-hong-kong-and-brazil.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-impact-of-it-transformation-on-enterprise-computing.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-importance-of-senior-executive-involvement-in-breach-response.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-imprivata-report-on-the-economic-impact-of-inefficient-communications-in-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-open-source-collaboration-study-viewpoints-on-security-privacy-in-the-us-emea.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-post-breach-boom-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-post-breach-boom.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-rise-of-nation-state-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-risk-of-regulated-data-on-mobile-devices-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-security-impact-of-mobile-device-use-by-employees.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-state-of-cybersecurity-in-local-state-and-federal-government.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-state-of-malware-detection-prevention.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-state-of-risk-based-security-management.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-true-cost-of-compliance-a-benchmark-study-of-multinational-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/think-before-you-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/third-annual-patient-privacy-data-security-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/third-annual-patient-privacy-data-security-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/third-annual-survey-on-medical-identity-theft-ponemon-institute.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/threat-intelligence-incident-response-a-study-of-us-and-emea-organizations-2.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/threat-intelligence-incident-response-a-study-of-us-and-emea-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/throughout-the-world-mssps-are-improving-security-posture-and-fighting-cyber-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/understanding-the-methodology-and-staggering-costs-in-the-annual-cost-of-failed-trust-report.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/unlocking-the-mobile-security-potential-the-key-to-effective-two-factor-authentication.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/visual-privacy-productivity-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/what-are-the-12-global-trends-in-identity-governance-and-access-management.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/what-erodes-trust-in-digital-brands.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/what-you-dont-know-will-hurt-you-a-study-of-the-risk-from-application-access-and-usage.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/why-companies-need-bcm-before-they-have-a-data-breach.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/why-ponemon-institutes-cost-of-data-breach-methodology-is-sound-and-endures.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/why-legacy-firewalls-are-ineffective-in-securing-applications-and-data-in-the-data-center.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-need-to-close-the-cultural-divide-between-application-security-and-developers.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/security/the-security-risk-organizations-should-not-ignore-careless-negligent-and-malicious-insiders.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/blog.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/archer-ponemon-treaty-for-data-governance.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/annual-privacy-trust-study-for-retail-banking.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/crowe-horwath-ponemon-release-hitech-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/data-center-outages-and-data-management.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/dr-ponemons-blog.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/economic-impact-of-privacy-on-online-behavioral-advertising.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/how-global-organizations-approach-the-challenge-of-protecting-personal-data.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/information-governance-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/making-web-20-work.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/most-trusted-companies-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/poor-privacy-practice-is-ailing-healthcare-industry.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/second-annual-cost-of-cyber-crime-study-is-released.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/sophos-ponemon-institute-announces-new-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/thank-you-friends-of-the-ponemon-institute.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/the-goal-is-credibility.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/the-road-to-data-breach-is-paved-with-good-intentions.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/training-is-the-strongest-link.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/what-auditors-think-about-crypto-technologies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/what-we-have-here-is-failure-to-communicate.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/privacy/second-annual-patient-privacy-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/global-security/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/global-security/global-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/global-security/understanding-security-complexity-in-21st-century-it-environments-a-study-of-it-practitioners-in-the-us-uk-france-japan-germany.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/providers/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/providers/providers.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/blog/providers/2011-cost-of-data-center-outages-sponsored-by-emerson-network-power.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/email-sign-up.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/news.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/mike-spinney-discusses-mtc-survey-on-foxbusiness.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/state-privacy-laws-national-reach-how-to-avoid-becoming-a-case-study-for-non-compliance.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/federal-agency-it-staff-it-execs-not-on-same-page-when-it-comes-to-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/forbes-column-cites-ponemon-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-survey-on-healthcare-trust-earns-media-attention.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-study-shows-the-cost-of-a-data-breach-continues-to-increase.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-featured-on-two-podcasts.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-survey-names-twenty-most-trusted-companies-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/forbes-what-ceos-dont-know-about-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/november-2009-ca-ponemon-institute-announces-study-at-cas-federal-expo.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/global-financial-crisis-weighs-on-results-of-ponemon-institute-2009-most-trusted-companies-for-retail-banking-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-symantec-job-loss-data-loss-video.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ajc-editorial-highlights-ponemon-privacy-trust-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/security-innovation-secure-systems-start-with-foundational-hardware.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/architecting-the-next-generation-of-ot-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-data-cited-in-cnn-travel-tips-column.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/forbes-article-examines-hidden-cost-of-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/larry-ponemon-featured-on-businessweek-podcast.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/wiped-out-along-with-jobs-laid-off-lose-photos-emails.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/november-2009-lumension-ponemon-institute-announces-the-state-of-the-endpoint-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/it-unaware-of-all-cloud-services-used-in-their-enterprise-less-than-half-of-cloud-services-are-vetted-for-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/listen-to-mobile-security-podcast-with-dr-larry-ponemon.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/us-postal-service-tops-ponemon-institute-list-of-most-trusted-federal-agencies.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/bob-barr-cites-privacy-trust-study-in-ajc.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-on-dhs-trusted-identities.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/hear-larry-on-wfed.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/forbes-covers-ponemon-study-on-tsa-practices.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/commercial-air-passengers-struggle-to-balance-desire-for-privacy-and-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/new-ponemon-study-points-to-need-for-smart-grid-education.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-examines-consumer-response-to-data-breach-notice.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-announces-2010-privacy-trust-study-of-retail-banking.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/presentation-about-privacy-on-the-smart-grid-at-iapp-privacy-summit.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-2012-web-session-intelligence-security-report-business-logic-abuse-edition-sponsored-by-silver-tail-systems.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/2012-cost-of-cyber-crime-study-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/third-annual-benchmark-study-on-patient-privacy-data-security.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/2013-state-of-the-endpoint.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/2012-most-trusted-companies-for-privacy-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/solera-networks-and-ponemon-study-reveals-rise-in-security-breaches-with-organizations-taking-months-to-detect-and-contain-them.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/risk-of-insider-fraud-second-annual-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/uk-school-opinions-of-cloud-services-and-student-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-economic-productivity-impact-of-it-security-on-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/cisos-the-good-the-bad-the-ugly.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/threat-intelligence-incident-response-study-on-mobility-e-discovery.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/reshaping-financial-services-it-cio-best-practices-for-the-shift-toward-mobile.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/global-cost-of-data-breach-increased-by-15-percent-according-to-ponemon-institute.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-releases-results-of-2008-most-trusted-companies-for-retail-banking-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-ponemon-sullivan-privacy-report.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-announces-results-of-2014-most-trusted-companies-for-privacy-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/useful-resources-for-cisos-blogs-papers-conferences-more.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-state-of-mobile-application-insecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/why-ponemon-institutes-cost-of-data-breach-methodology-is-sound-and-endures.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/criminal-attacks-are-now-leading-cause-of-data-breach-in-healthcare-according-to-new-ponemon-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/ponemon-institute-releases-11th-annual-most-trusted-companies-for-retail-banking-study.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-state-of-cybersecurity-in-local-state-and-federal-government.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/90-percent-of-cases-of-lost-or-stolen-private-data-go-unreported-by-british-firms.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/global-trends-in-identity-governance-access-management.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/handle-with-care-protecting-sensitive-data-in-microsoft-sharepoint-collaboration-tools-and-file-share-applications-in-us-uk-and-german-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/2017-cost-of-data-breach-study-sponsored-by-ibm-security-is-featured-in-nbc-news-article.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/securing-mobility-summit-at-automobility-la-november-27-2017.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/new-study-reveals-up-to-12000-laptop-computers-lost-weekly-and-up-to-600000-lost-annually-in-us-airports.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-true-cost-of-compliance-with-data-protection-regulations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-2018-state-of-endpoint-security-risk.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/2018-state-of-smb-cybersecurity-report.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/managing-the-risk-of-post-perimeter-or-resident-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/measuring-managing-the-cyber-risks-to-business-operations.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-2019-state-of-password-and-authentication-security-behaviors-report.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/safety-security-privacy-in-the-interconnected-world-of-it-ot-iiot.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/notebook-computer-study-reveals-security-implications-of-mobile-workforce.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-state-of-machine-identity-management.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-2024-study-on-the-state-of-ai-in-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/the-2024-state-of-enterprise-cyber-risk-in-the-age-of-ai.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news/webinar-state-of-ai-in-cybersecurity-2025.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/news-press-releases.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/press-releases/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/news-press-releases/press-releases/press-releases.html</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/videos/</loc></url>
<url><loc>https:///www.ponemon.org/news-updates/videos/videos.html</loc></url>
<url><loc>https:///www.ponemon.org/research/</loc></url>
<url><loc>https:///www.ponemon.org/research/our-research-methods.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/ponemon-library.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2010-access-governance-trends-survey.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-australia.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-france.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-germany.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-india.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-italy.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-japan.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-united-kingdom.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-cost-of-data-breach-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-privacy-trust-study-for-retail-banking.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2011-second-annual-cost-of-cyber-crime-study-benchmark-study-of-us-companies.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-application-security-gap-study-a-survey-of-it-security-developers.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-business-banking-trust-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-confidential-documents-at-risk-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-cost-of-cyber-crime-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-most-trusted-companies-for-privacy-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-most-trusted-companies-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-payment-security-practices-survey-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2012-web-session-intelligence-security-report-business-logic-abuse-edition-sponsored-by-silver-tail-systems.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-cost-of-data-breach-global-analysis.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-cost-of-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-cybersecurity-salary-benchmarking-report.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-state-of-the-endpoint-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-state-of-the-endpoint.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-survey-on-medical-identity-theft.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2013-survey-on-medical-identity-thef-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-a-year-of-mega-breaches.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-a-year-of-mega-breaches-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-best-schools-for-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-cost-of-data-breach-global.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-cost-of-data-breach-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2014-global-report-on-the-cost-of-cyber-crime.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2015-cost-of-cyber-crime-study-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2015-cost-of-data-breach-global.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2015-state-of-the-endpoint-report-user-centric-risk.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2016-cost-of-cyber-crime-study-the-risk-of-business-innovation.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2016-cost-of-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2016-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2017-cost-of-cyber-crime-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2017-cost-of-data-breach-study-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2017-study-on-mobile-and-internet-of-things-application-security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/achieving-security-in-workplace-file-sharing.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/aftermath-of-a-data-breach-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/are-we-taking-adequate-steps-to-protect-the-critical-infrastructure.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/benchmarking-information-security-efficiency.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/best-practices-in-data-protection-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/big-data-analytics-in-cyber-defense.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/can-a-data-breach-in-the-cloud-result-in-a-larger-and-more-costly-incident.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/architecting-the-next-generation-of-ot-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/compliance-like-a-club.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/cost-of-a-data-breach-climbs-higher.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/criminal-attacks-the-new-leading-cause-of-data-breach-in-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/cyber-security-incident-response-are-we-as-prepared-as-we-think.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/cyber-strategies-for-endpoint-defense-2014.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/data-breaches-caused-by-insiders-increase-in-frequency-and-cost.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/data-risk-in-the-third-party-ecosystem.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/egov-initiative-not-without-risk-to-citizen-data.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/encryption-in-the-cloud-who-is-responsible-for-data-protection-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/fear-and-loathing-in-online-advertising.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/fifth-annual-benchmark-study-on-privacy-security-of-healthcare-data.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/flipping-the-economics-of-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/fourth-annual-benchmark-study-on-patient-privacy-and-data-security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/fourth-annual-benchmark-study-on-patient-privacy-data-security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/future-state-of-it-security-a-survey-of-it-security-executives.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/global-insights-on-document-security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/global-study-on-mobility-risks-survey-results-for-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/hidden-threats-in-encrypted-traffic-a-study-of-north-america-emea.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/how-much-is-the-data-on-your-mobile-device-worth.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/how-single-sign-on-is-changing-healthcare-a-study-of-it-practitioners-in-acute-care-hospitals-in-the-united-states.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/hsm-global-market-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/integrated-holistic-security-strategies.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/is-your-company-ready-for-a-big-data-breach-the-second-annual-study-on-data-breach-preparedness.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/leading-practices-in-behavioral-advertising-consumer-privacy-study-of-internet-marketers-and-advertisers.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/listen-to-a-new-podcast-on-the-true-cost-of-compliance-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/live-threat-intelligence-impact-report-2013.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/live-threat-intelligence-impact-report-2013-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/managing-cyber-security-as-a-business-risk-cyber-insurance-in-the-digital-age.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/more-employees-ignoring-data-security-policies.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/most-trusted-retail-banks-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/moving-beyond-passwords-consumer-attitudes-on-online-authentication-a-study-of-us-uk-and-german-consumers.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/national-survey-on-data-center-outages.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/new-ponemon-study-on-malware-detection-prevention-released.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/security-of-cloud-computing-users-2013-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/rethinking-firewalls-security-and-agility-for-the-modern-enterprise.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/data-risk-in-the-third-party-ecosystem-third-annual-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-institute-announces-results-of-2014-most-trusted-companies-for-privacy-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-institute-announces-the-release-of-the-2018-megatrends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-institute-releases-new-study-on-how-organizations-can-leapfrog-to-a-stronger-cyber-security-posture.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-institute-releases-new-study-on-the-efforts-of-retail-companies-and-financial-services-to-improve-the-time-to-detect-and-contain-advanced-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/ponemon-releases-cloud-service-provider-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/risk-of-insider-fraud-second-annual-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/risks-rewards-of-online-mobile-health-services-consumer-attitudes-explored.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/security-compliance-trends-in-innovative-electronic-payments.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/security-in-the-new-mobile-ecosystem.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2010-security-in-the-trenches.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/security-metrics-to-manage-change-which-matter-which-can-be-measured.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/separating-the-truths-from-the-myths-in-cybersecurity.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/nearly-90-percent-of-healthcare-organizations-suffer-data-breaches-new-ponemon-study-shows.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/sixth-annual-benchmark-study-on-privacy-security-of-healthcare-data.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/smbs-are-vulnerable-to-cyber-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/state-of-it-security-study-of-utilities-energy-companies.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/thales-e-security-and-ponemon-institute-collaborate-to-produce-2013-global-encryption-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-aftermath-of-a-data-breach-consumer-sentiment.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-business-case-for-data-protection-what-senior-executives-think-about-data-protection.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cost-of-insecure-mobile-devices-in-the-workplace.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cost-of-malware-containment.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cyber-readiness-of-canadian-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cyber-resilient-organisation-in-the-united-kingdom-learning-to-thrive-against-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cyber-resilient-organization-in-germany-learning-to-thrive-against-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-cyber-resilient-organization-learning-to-thrive-against-threats.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-economic-productivity-impact-of-it-security-on-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-evolving-role-of-cisos-and-their-importance-to-the-business.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-human-factor-in-data-protection.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-identity-imperative-for-the-open-enterprise-what-it-users-and-business-users-think-about-bring-your-own-identity-byoid.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-impact-of-cybercrime-on-business-studies-of-it-practitioners-in-the-united-states-united-kingdom-germany-hong-kong-and-brazil.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-impact-of-it-transformation-on-enterprise-computing.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-importance-of-senior-executive-involvement-in-breach-response.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-imprivata-report-on-the-economic-impact-of-inefficient-communications-in-healthcare.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-internet-of-things-iot-a-new-era-of-third-party-risk.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-open-source-collaboration-study-viewpoints-on-security-privacy-in-the-us-emea.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-post-breach-boom-2.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-post-breach-boom.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-rise-of-nation-state-attacks.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-rise-of-ransomware.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-risk-of-regulated-data-on-mobile-devices-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-security-impact-of-mobile-device-use-by-employees.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-sql-injection-threat-recent-retail-breaches.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-sql-injection-threat-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-cybersecurity-in-local-state-and-federal-government.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-malware-detection-prevention.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-risk-based-security-management.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-true-cost-of-compliance-a-benchmark-study-of-multinational-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/think-before-you-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/third-annual-patient-privacy-data-security-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/third-annual-patient-privacy-data-security-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/third-annual-survey-on-medical-identity-theft-ponemon-institute.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/threat-intelligence-incident-response-a-study-of-us-and-emea-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/tone-at-the-top-and-third-party-risk.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/understaffed-and-at-risk-todays-it-security-department.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/understanding-the-methodology-and-staggering-costs-in-the-annual-cost-of-failed-trust-report.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/unlocking-the-mobile-security-potential-the-key-to-effective-two-factor-authentication.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/visual-privacy-productivity-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/why-companies-need-bcm-before-they-have-a-data-breach.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/will-security-privacy-concerns-stall-the-adoption-of-autonomous-automobiles.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-threat-feed-effectiveness-in-the-united-states-and-the-united-kingdom.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-soc-effectiveness-signs-of-progress-but-more-work-needs-to-be-done.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/reducing-enterprise-application-security-risks-more-work-needs-to-be-done.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-role-of-transparency-and-security-assurance-in-driving-technology-decision-making.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-economic-value-of-prevention-in-the-cybersecurity-lifecycle.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/2020-global-pki-and-iot-trends-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-breach-and-attack-simulation-and-the-need-for-continuous-security-validation-a-study-of-us-and-uk-organizations.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-state-of-machine-identity-management.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/the-importance-of-securing-embedded-and-connected-devices-in-the-supply-chain.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/security/exabeam-siem-productivity-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/benchmarking-information-security-efficiency.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/second-annual-patient-privacy-study-released.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/annual-privacy-trust-study-for-retail-banking.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/archer-ponemon-treaty-for-data-governance.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/crowe-horwath-ponemon-release-hitech-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/data-center-outages-and-data-management.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/dr-ponemons-blog.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/economic-impact-of-privacy-on-online-behavioral-advertising.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/how-global-organizations-approach-the-challenge-of-protecting-personal-data.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/information-governance-in-the-cloud.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/making-web-20-work.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/most-trusted-companies-for-privacy.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/poor-privacy-practice-is-ailing-healthcare-industry.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/second-annual-cost-of-cyber-crime-study-is-released.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/sophos-ponemon-institute-announces-new-study.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/thank-you-friends-of-the-ponemon-institute.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/the-goal-is-credibility.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/the-road-to-data-breach-is-paved-with-good-intentions.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/training-is-the-strongest-link.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/what-auditors-think-about-crypto-technologies.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/what-we-have-here-is-failure-to-communicate.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/privacy/the-impact-of-the-new-normal-on-workplace-privacy-a-study-of-business-and-it-and-it-security-managers.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/global-security/</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/global-security/global-security.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/global-security/understanding-security-complexity-in-21st-century-it-environments-a-study-of-it-practitioners-in-the-us-uk-france-japan-germany.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/providers/</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/providers/providers.html</loc></url>
<url><loc>https:///www.ponemon.org/research/ponemon-library/providers/2011-cost-of-data-center-outages-sponsored-by-emerson-network-power.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/</loc></url>
<url><loc>https:///www.ponemon.org/fellows/search-ponemon-fellows.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ed-adams.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/alessandro-acquisti-phd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/linda-ackerman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/joe-adams.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/philip-agcaoili.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mike-ahmadi.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/james-j-allen-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/darin-andersen.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jerry-l-archer-cissp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/chirag-arora.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/eric-ashdown.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/tom-bain.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ken-battista-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/david-bender.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/shaun-bertrand.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/simon-blackwell.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/william-m-blake.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/naheed-bleecker.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stu-bradley.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/bruce-brody.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/benjamin-d-brooks.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/christopher-budd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/dan-burks.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ann-cavoukian-phd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mark-carney.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jeffrey-carr.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/uma-chandrashekhar.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/alan-chapell-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/harry-c-chapman-cmc.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/raj-chaudhary.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/keith-cheresko.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/james-christiansen.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jason-clark.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mark-coderre.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/brian-contos-cissp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/don-lloyd-cook-phd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/nick-copping-phd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/patrick-corcoran.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/joshua-corman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/malcolm-crompton.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/tom-cross.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jack-danahy.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/dennis-dayman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/benjamin-dean.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/dennis-devlin.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/margaret-p-peggy-eisenhauer-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/steve-elefant.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/nicholas-d-evans.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/thomas-r-finneran.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/todd-fitzgerald.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/michael-fitzpatrick.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/patrick-florer.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jay-foley.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/linda-foley.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/christopher-fountain.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/steven-fox.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mari-j-frank-esquire-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/betsy-freeman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/d-reed-freeman-jr-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/beau-friedlander.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/daniel-b-garrie.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stanton-g-gatewood.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ellen-giblin.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/nikk-gilbert.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ben-goodman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/f-paul-greene.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/michael-gregg.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/lindsey-greig.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/rocco-grillo.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/john-grimm.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/peter-guffin.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/deborah-guild.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/renee-guttmann.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/brian-harrell.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/sam-harris.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/faith-m-heikkila.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jean-paul-hepp-phd-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/rebecca-herold.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/priscilla-hill-ardoin.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/chris-jay-hoofnagle.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/bryan-hurd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/larry-jaffee.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/john-johnson.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/chris-kennedy.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ondrej-krehel.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/bob-kellner.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/john-kropf.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/david-kuo.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ron-lapedis.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ryan-lasalle.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/barbara-lawler.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/arturo-leal.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/matt-leonard-cipp.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/bradley-lide.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jeff-lowder.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stephen-bruce.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/eitan-goldstein.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/gordon-mackay.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/alastair-macwillson.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/gail-magnuson.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/greg-mancusi-ungaro.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/larry-marks.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/lynn-mattice.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/thornton-a-may.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/joanne-mcnabb-cipp-g.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/chris-merritt.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/peter-milla.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/charlie-miller.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/tammy-moskites.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/richard-moulds.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/valmiki-mukherjee.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jon-neiditz.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jeff-nicol.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stuart-noad.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stanley-norman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/rena-mears.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/paul-e-paray.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/stuart-l-pardau.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/phyllis-a-patrick.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/deborah-c-peel-md.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/edgar-perez.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ken-pfeil.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jill-phillips.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/christopher-t-pierson-phd-jd.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/paige-poore.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/nils-puhlmann.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/michael-puldy-ceo-and-founder-of-puldy-resiliency-partners-llc.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/james-ransome-phd-cissp-cism.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/steve-ransom-jones.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/randy-raw.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mark-w-reardon.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/john-c-reece.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ojas-rege.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jim-richards.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/kevin-richards.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/paul-rohmeyer.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/greg-schaffer.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/howard-a-schmidt.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/winn-schwartau.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/amichai-shulman.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/al-silipigni.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/drew-simonis.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/daniel-solove.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/francesca-spidalieri.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/s-srinivasan.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/anish-srivastava.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/peter-stephenson.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/adam-stone.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/marylynn-stowers.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/patrick-sullivan.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/lee-sustar.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/dan-swartwood.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mohan-tanniru.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/timothy-r-thatcher.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/patricia-titus.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/macdonnell-ulsch.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/david-a-vandernaalt.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/mark-weatherford.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jo-webber.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/joseph-weiss.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/alan-s-wernick.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jeff-wierenga.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ashley-winton.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/jason-witty.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/carl-wright.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/martin-wlfert.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/tom-yemington.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/peter-panfil.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/michael-kaczmarek.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/ola-sergatchov.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/rich-owen.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/steve-salinas.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/larry-lunetta.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/tom-malta.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/selim-aissi-senior-vice-president-chief-information-security-officer.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/moshe-elias.html</loc></url>
<url><loc>https:///www.ponemon.org/fellows/anna-mercado-clark.html</loc></url>
</urlset>