<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://chaleit.com/</loc>
<lastmod>2026-04-03T19:09:56.112Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-six-layers-of-responsible-ai-adoption/</loc>
<lastmod>2026-03-30T09:31:24.059Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ai-and-the-illusion-of-control/</loc>
<lastmod>2026-02-18T08:29:25.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/2026-cyber-security-conferences/</loc>
<lastmod>2026-03-30T09:29:07.551Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/when-governance-creates-risk/</loc>
<lastmod>2026-01-29T08:02:18.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ai-the-new-superuser-in-your-organisation/</loc>
<lastmod>2026-01-22T08:40:44.411Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/brilliant-at-the-basics-cisos-share-what-actually-works/</loc>
<lastmod>2026-01-22T08:41:23.501Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/cyber-security-efficacy-over-efficiency/</loc>
<lastmod>2026-01-22T08:42:28.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/how-murky-scopes-leave-you-exposed/</loc>
<lastmod>2025-11-24T08:33:11.568Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/cyber-security-uplift-what-pen-testing-30-looks-like-in-practice/</loc>
<lastmod>2025-11-17T08:58:14.552Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-school-of-hard-knocks-ciso/</loc>
<lastmod>2026-01-22T08:44:12.384Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/commodity-pen-testing-is-dead/</loc>
<lastmod>2025-10-18T05:34:46.818Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/pen-testing-with-ai/</loc>
<lastmod>2025-10-02T07:28:25.536Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/your-network-architecture-matters-more-than-your-vulnerability-scanner/</loc>
<lastmod>2025-09-22T07:23:32.279Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/security-leadership-is-a-team-sport/</loc>
<lastmod>2026-01-22T08:44:57.670Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/penetration-testing-30-intelligence-led-security-validation/</loc>
<lastmod>2025-09-08T09:02:54.939Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/cyber-security-needs-a-simpler-smarter-mindset/</loc>
<lastmod>2026-01-22T08:45:44.659Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/Aaron-Katz-pen-testing/</loc>
<lastmod>2025-08-25T06:00:48.682Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/rethink-tabletop-exercises-for-real-resilience/</loc>
<lastmod>2026-01-22T08:47:32.099Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ai-chaos-engineering/</loc>
<lastmod>2026-01-22T08:48:22.303Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/red-bubble-trap-how-cyber-security-tools-are-hijacking-our-priorities/</loc>
<lastmod>2026-01-22T08:49:22.119Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/from-pointless-to-practical-how-to-get-real-value-from-pen-testing/</loc>
<lastmod>2025-07-21T07:07:23.208Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/modern-penetration-testing-methodology-from-perimeter-to-context/</loc>
<lastmod>2025-07-11T07:58:10.637Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/security-assessment-gap-maturing-supply-chain-risk-management-in-the-ai-era/</loc>
<lastmod>2025-07-07T08:56:12.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/how-to-buy-penetration-testing-that-works-a-smart-buyers-perspective/</loc>
<lastmod>2025-09-08T08:18:23.464Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/maslow-meets-malware-an-actionable-hierarchy-for-cyber-resilience/</loc>
<lastmod>2026-01-22T08:50:23.219Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/why-context-is-king-in-penetration-testing/</loc>
<lastmod>2025-06-23T06:48:49.812Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/why-generic-pen-testing-falls-short-and-what-to-do-differently/</loc>
<lastmod>2025-09-08T08:21:10.156Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ai-quietly-everywhere-a-guide-to-building-ai-security-frameworks/</loc>
<lastmod>2026-01-22T08:51:03.505Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/penetration-testing-guide-clear-and-effective-security-in-2025/</loc>
<lastmod>2025-10-29T09:18:50.410Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/coastal-erosion-in-security-why-your-program-needs-higher-tide-marks-to-survive/</loc>
<lastmod>2026-01-22T08:52:09.842Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/back-to-basics-with-steve-gillham-why-security-needs-fewer-tools-and-more-skills/</loc>
<lastmod>2025-04-25T09:33:28.483Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/hive-mind-security-the-captains-table-leadership-model/</loc>
<lastmod>2026-01-22T08:53:03.554Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-pen-testing-value-triangle-connecting-teams-providers-and-objectives/</loc>
<lastmod>2025-09-08T08:20:11.805Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/applied-risk-management-the-value-of-context-time-and-collective-understanding/</loc>
<lastmod>2025-04-07T11:56:57.988Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/silent-threats-why-risk-based-security-matters-in-2025/</loc>
<lastmod>2025-05-24T09:06:02.777Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-t-shaped-ciso-how-to-balance-technical-roots-with-strategic-wings/</loc>
<lastmod>2026-01-22T08:53:46.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ai-security-testing-new-attack-vectors-and-strategies-in-application-security/</loc>
<lastmod>2025-10-29T08:57:10.872Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/security-leadership-from-technical-control-to-business-value/</loc>
<lastmod>2026-01-22T08:54:31.122Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/purple-team-exercises-turning-security-investment-into-real-protection/</loc>
<lastmod>2025-03-31T16:15:02.318Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/application-security-from-reactive-remediation-to-proactive-protection/</loc>
<lastmod>2025-02-20T08:57:17.572Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/security-tools-vs-security-mastery-why-the-difference-matters/</loc>
<lastmod>2025-02-27T09:06:18.065Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/threat-modelling-that-works-the-power-of-simple-security/</loc>
<lastmod>2025-02-27T09:04:09.247Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/behind-security-blind-spots-a-lesson-in-predictable-human-behaviour/</loc>
<lastmod>2025-01-27T00:13:42.845Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-contextual-ciso-matching-leadership-to-organisational-need/</loc>
<lastmod>2025-01-25T23:56:00.388Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/data-overload-causes-challenges-and-strategies-for-actionable-security-insights/</loc>
<lastmod>2025-10-17T07:27:54.608Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-art-of-risk-management-conversations-simplification-and-prioritisation/</loc>
<lastmod>2025-10-29T09:11:42.176Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-future-of-grc-consistency-care-and-the-human-factor/</loc>
<lastmod>2025-01-14T08:30:45.427Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/risk-as-opportunity-from-avoidance-to-strategic-exploitation/</loc>
<lastmod>2025-01-20T02:27:34.597Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/risk-under-pressure-its-not-about-being-right-its-about-making-decisions/</loc>
<lastmod>2025-01-14T08:30:32.506Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/cyber-security-innovation-with-robin-fewster-a-new-paradigm-for-pen-testing-and-compliance/</loc>
<lastmod>2025-05-15T11:00:39.129Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/partnership-over-process-mark-logalbos-strategies-for-refined-vendor-risk-management/</loc>
<lastmod>2025-02-07T00:13:29.264Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/christian-toon-on-reinventing-cyber-security-leadership/</loc>
<lastmod>2025-02-07T00:10:06.109Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/andrew-priest-on-cross-border-data-protection-privacy-and-compliance-challenges-and-solutions/</loc>
<lastmod>2025-02-07T00:07:00.842Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/leading-with-empathy-how-tammy-klotz-shapes-cyber-security-culture/</loc>
<lastmod>2025-02-27T10:43:55.588Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/justin-soong-and-sasha-biskup-on-bridging-business-goals-security-innovation-and-global-practices/</loc>
<lastmod>2025-02-07T00:12:27.431Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/marius-poskus-on-building-value-in-cyber-security-beyond-snake-oil-and-short-term-gains/</loc>
<lastmod>2025-02-10T13:10:57.494Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/neira-jones-on-regulation-cooperation-and-the-future-of-payment-security-part-2/</loc>
<lastmod>2025-02-10T10:51:07.589Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/jonathan-evans-on-dora-real-world-impact-in-the-eus-financial-sector/</loc>
<lastmod>2025-05-23T11:46:53.303Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/from-basics-to-anti-fragility-mandy-andress-on-building-resilient-security-strategies/</loc>
<lastmod>2025-02-07T00:13:02.056Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/jane-frankland-on-the-power-of-partnership-cultivating-a-sustainable-future-for-cyber-security/</loc>
<lastmod>2025-02-07T00:10:48.536Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/jacob-thampi-on-cultivating-curiosity-and-collaboration-in-cyber-security/</loc>
<lastmod>2025-12-01T09:01:04.114Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/alexander-stangl-on-rethinking-audits-from-compliance-checklists-to-security-enablers/</loc>
<lastmod>2025-04-11T12:15:52.266Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/neira-jones-on-enhancing-payment-security-part-1/</loc>
<lastmod>2025-02-10T10:50:20.418Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/brendan-smith-on-the-pitfalls-of-traditional-pen-tests-and-the-need-for-relationship-based-cyber-security/</loc>
<lastmod>2025-05-15T11:02:17.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/john-taylor-on-how-to-achieve-world-class-cyber-security/</loc>
<lastmod>2025-02-07T00:11:24.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/simon-hodgkinson-on-learning-to-speak-up-and-creating-a-culture-of-risk-management/</loc>
<lastmod>2025-02-27T10:44:13.568Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/have-we-lost-the-spark-sasha-biskup-unravels-the-evolution-of-cyber-security-through-his-growth-journey/</loc>
<lastmod>2025-02-07T00:16:34.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/al-ghouss-cyber-security-playbook-how-to-balance-competing-priorities-and-stay-calm-within-chaos/</loc>
<lastmod>2025-02-07T00:02:59.262Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/andrew-rose-on-the-accountability-responsibility-gap-and-strategies-for-coping-with-stress-in-cyber-security/</loc>
<lastmod>2025-02-07T00:09:01.289Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/trey-mujakporue-on-redefining-cybersecurity-success-beyond-compliance-part-2/</loc>
<lastmod>2025-01-16T05:34:32.525Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/trey-mujakporue-on-the-surprising-role-of-culture-and-creativity-in-cyber-security-part-1/</loc>
<lastmod>2025-01-14T08:36:07.864Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ted-heiman-on-rethinking-cybersecurity-strategies-for-cisos-part-2-building-resilience-and-a-zero-trust-approach/</loc>
<lastmod>2025-02-07T00:17:47.650Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/ted-heiman-on-rethinking-cybersecurity-strategies-for-cisos-part-1-why-point-solutions-arent-cutting-it-anymore/</loc>
<lastmod>2025-02-07T00:17:39.733Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/tony-gonzalez-on-navigating-a-global-cisos-challenges-part-2-adapting-to-new-technologies-and-the-evolving-threat-landscape/</loc>
<lastmod>2025-02-07T00:18:38.084Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/tony-gonzalez-on-navigating-a-global-cisos-challenges-part-1-managing-distraction-and-board-relations/</loc>
<lastmod>2025-02-07T00:18:43.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/matt-foster-cybersecurity-isnt-a-tick-box-exercise/</loc>
<lastmod>2025-02-07T05:37:05.319Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-art-of-systematic-security-assurance-part-3-fostering-dev-security-collaboration/</loc>
<lastmod>2025-02-10T13:15:08.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-art-of-systematic-security-assurance-part-2-bridging-gaps-through-shared-responsibility/</loc>
<lastmod>2025-02-10T13:14:47.007Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/the-art-of-systematic-security-assurance-part-1-redefining-cybersecurity-investments/</loc>
<lastmod>2025-02-10T13:14:20.643Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/defence-in-depth-security-control-assessment-indication-of-compromise-and-purple-teaming/</loc>
<lastmod>2025-01-14T08:34:47.014Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/moving-left-vs-devsecops/</loc>
<lastmod>2025-01-16T05:35:30.861Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/pen-testing-all-you-need-to-know-to-get-started/</loc>
<lastmod>2025-06-23T06:51:29.420Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/blog/pen-testing-20-a-new-approach-to-ethical-hacking/</loc>
<lastmod>2025-05-15T11:05:22.618Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/how-a-healthcare-innovator-achieved-security-compliance-for-fda-approval/</loc>
<lastmod>2025-02-10T12:45:57.673Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/securing-growth-unifying-global-retail-security/</loc>
<lastmod>2025-02-10T12:38:04.380Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/global-telecom-provider-finds-hidden-security-weaknesses-through-controls-validation/</loc>
<lastmod>2025-02-10T12:38:45.910Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/from-checkboxes-to-cultural-change-a-successful-grc-transformation/</loc>
<lastmod>2025-02-10T12:39:22.201Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/leading-law-firm-transforms-document-security-in-seven-days/</loc>
<lastmod>2025-01-14T08:25:28.593Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/major-organisation-transforms-recovery-strategy-through-strategic-resilience-planning/</loc>
<lastmod>2025-01-14T08:25:37.435Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/enterprise-secures-power-platform-for-collaborative-cloud/</loc>
<lastmod>2025-02-10T13:06:35.125Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/financial-giant-cuts-remediation-costs-by-50-percent/</loc>
<lastmod>2025-03-13T10:43:38.185Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/security-by-design-building-value-without-million-dollar-tools/</loc>
<lastmod>2025-01-16T05:37:02.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/zero-detection-for-days-a-technology-giants-security-wake-up-call/</loc>
<lastmod>2025-03-13T10:30:10.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/partnership-in-practice-how-trust-and-collaboration-transformed-a-manufacturing-clients-security-posture/</loc>
<lastmod>2025-01-17T03:43:32.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/how-a-global-energy-firm-enhanced-soc-effectiveness-through-purple-teaming/</loc>
<lastmod>2025-01-20T03:17:02.690Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/anti-slavery/</loc>
<lastmod>2025-02-24T05:26:46.822Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/terms/</loc>
<lastmod>2025-11-21T12:29:27.536Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/acceptable-use-policy/</loc>
<lastmod>2025-11-21T12:30:26.027Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/cookies/</loc>
<lastmod>2025-01-20T08:38:59.515Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/customer-stories/</loc>
<lastmod>2025-02-10T12:57:44.682Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/blog/</loc>
<lastmod>2025-11-17T09:01:56.051Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/privacy-policy/</loc>
<lastmod>2025-11-21T12:28:40.056Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/about/</loc>
<lastmod>2025-08-29T07:36:03.857Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security-health-check/</loc>
<lastmod>2025-04-14T13:21:29.755Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/contact/</loc>
<lastmod>2025-10-13T05:09:56.248Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/</loc>
<lastmod>2026-03-30T09:29:44.857Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/adversary-simulation/controls-validation/</loc>
<lastmod>2025-02-10T11:52:09.902Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/adversary-simulation/red-team/</loc>
<lastmod>2025-08-29T07:37:01.419Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/adversary-simulation/purple-team/</loc>
<lastmod>2025-08-29T07:37:17.788Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/governance-risk-compliance/</loc>
<lastmod>2025-08-29T07:37:39.011Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/devsecops/</loc>
<lastmod>2025-08-29T07:38:13.581Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/cloud/</loc>
<lastmod>2025-08-29T07:38:50.129Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/strategic-advisory/</loc>
<lastmod>2025-10-27T08:19:51.349Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/adversary-simulation/</loc>
<lastmod>2025-08-29T07:39:26.646Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/penetration-testing/</loc>
<lastmod>2025-11-24T08:31:47.248Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/cyber-security/</loc>
<lastmod>2025-12-01T09:06:12.808Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/retail/</loc>
<lastmod>2025-02-10T12:25:11.472Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/logistics-maritime/</loc>
<lastmod>2025-01-14T08:24:53.533Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/manufacturing/</loc>
<lastmod>2025-01-14T08:22:58.830Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/healthcare/</loc>
<lastmod>2025-02-10T12:42:44.081Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/utilities-resources/</loc>
<lastmod>2025-01-17T03:37:15.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/technology-communications/</loc>
<lastmod>2025-01-14T08:22:33.553Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/law-business-services/</loc>
<lastmod>2025-01-14T08:24:19.618Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://chaleit.com/about/financial-services/</loc>
<lastmod>2025-01-14T08:22:17.404Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
