<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://marklynd.com/articles/ai-in-ot-cybersecurity-defender-and-adversary/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>AI in OT Cybersecurity: Defender and Adversary</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/critical-infrastructure-sector-cascade-map/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>The Critical Infrastructure Sector Cascade Map</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/harvest-now-decrypt-later-what-boards-must-know/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>Harvest Now, Decrypt Later: What Boards Must Know</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/inside-cyber-war-one-scenario-coordinated-ot-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>Inside Cyber War: One Scenario — What a Coordinated OT Attack on America Actually Looks Like</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/it-ot-convergence-without-catastrophe/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>IT-OT Convergence Without Catastrophe</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/nerc-cip-vs-iec-62443-vs-nist-800-82/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>NERC CIP vs. IEC 62443 vs. NIST 800-82: The Executive Comparison</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/ot-cybersecurity-2026-state-of-the-discipline/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>OT Cybersecurity in 2026: The State of the Discipline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/post-quantum-migration-the-cio-playbook/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-09</news:publication_date>
      <news:title>The Post-Quantum Migration: A CIO Playbook</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/guide-to-hiring-ai-cybersecurity-keynote-speaker-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11</news:publication_date>
      <news:title>The 2026 Guide to Hiring an AI and Cybersecurity Keynote Speaker</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/what-an-enterprise-ai-keynote-should-cover-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11</news:publication_date>
      <news:title>What an Enterprise AI Keynote Should Cover in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/how-to-evaluate-cybersecurity-speaker-board-audience/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11</news:publication_date>
      <news:title>How to Evaluate a Cybersecurity Speaker for a Board Audience</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/agentic-ai-security-framework-enterprise/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12</news:publication_date>
      <news:title>The Agentic AI Security Framework: What Every Enterprise Needs Before Autonomous AI Acts on Its Behalf</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://marklynd.com/articles/ai-enabled-social-engineering-enterprise-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Mark Lynd</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14</news:publication_date>
      <news:title>AI-Enabled Social Engineering in 2026: The Attack Your Enterprise Security Program Is Not Ready For</news:title>
    </news:news>
  </url>
</urlset>