<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersymbiosis.com/2018/05/14/information-value/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/artificial-intelligence-3382510_640.jpg</image:loc><image:title>artificial-intelligence-3382510_640</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/data-abstraction-layers.png</image:loc><image:title>data abstraction layers</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/information-map.png</image:loc><image:title>information map</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/info-abstraction.png</image:loc><image:title>info abstraction</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/800px-lord_kelvin_photograph.jpg</image:loc><image:title>800px-Lord_Kelvin_photograph</image:title></image:image><lastmod>2025-07-18T14:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2024/06/27/from-cybernetics-to-omniverses/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2024/06/metaverse-museum.webp</image:loc><image:title>metaverse museum</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-27T19:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2023/07/28/a-decade-after-heartbleed/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2023/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-07-28T06:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/03/13/about-viktor-polic/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/img_3401.jpg</image:loc><image:title>IMG_3401</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/can_9811-2.jpg</image:loc><image:title>CAN_9811 (2)</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/20180130_140035-1.jpg</image:loc><image:title>20180130_140035 (1)</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/uncc-servers.jpg</image:loc><image:title>UNCC servers</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/1103research01.jpg</image:loc><image:title>1103research01</image:title></image:image><lastmod>2023-05-12T12:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2021/06/25/did-artificial-intelligence-just-save-my-life/</loc><lastmod>2021-06-25T10:43:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2020/08/10/digital-transformation-challenges-risks-governance-opportunities-and-game-changers/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/uncc-claim-payment-system.png</image:loc><image:title>UNCC claim payment system</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/rsa-secureid.jpg</image:loc><image:title>RSA SecureID</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/1200px-aldrin_looks_back_at_tranquility_base_-_gpn-2000-001102.jpg</image:loc><image:title>1200px-Aldrin_Looks_Back_at_Tranquility_Base_-_GPN-2000-001102</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/mh-in-apollo-11.jpg</image:loc><image:title>MH in Apollo 11</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/apolloguidancecomputerwithdsky.dwt_.jpg</image:loc><image:title>ApolloGuidanceComputerwithDSKY.dwt</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/08/margaret-hamilton.jpg</image:loc><image:title>Margaret Hamilton</image:title></image:image><lastmod>2020-08-09T23:41:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2020/07/21/what-have-we-learned-about-humanity-over-the-last-century/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/office-in-swiss-alps.jpg</image:loc><image:title>Office in Swiss Alps</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/balcony-office.jpg</image:loc><image:title>Balcony office</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/dsc04734.jpg</image:loc><image:title>DSC04734</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/dsc04647.jpg</image:loc><image:title>DSC04647</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/dsc04620.jpg</image:loc><image:title>DSC04620</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/dsc04737.jpg</image:loc><image:title>DSC04737</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2020/07/dsc04729.jpg</image:loc><image:title>DSC04729</image:title></image:image><lastmod>2020-08-06T05:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2019/03/11/digital-transformation-challenges/</loc><lastmod>2019-03-11T07:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2019/02/09/5g-mobile-networks-become-digital-transformation-enablers-in-2019/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2019/02/radio-tower-2495325_640.jpg</image:loc><image:title>radio-tower-2495325_640</image:title></image:image><lastmod>2019-02-09T09:33:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/09/23/risks-and-benefits-of-security-operations-center-soc-in-the-cloud/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/network-782707_1280.png</image:loc><image:title>network-782707_1280</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/digitization-2118531_12801.jpg</image:loc><image:title>digitization-2118531_1280</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/cloud-3843352_1920.jpg</image:loc><image:title>cloud-3843352_1920</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/cloud-3843352_1280.jpg</image:loc><image:title>cloud-3843352_1280</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/digitization-2118531_1280-e1544514491186.jpg</image:loc><image:title>digitization-2118531_1280</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/img_20180924_143328.jpg</image:loc><image:title>IMG_20180924_143328</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/digitization-2118531_640.jpg</image:loc><image:title>digitization-2118531_640</image:title></image:image><lastmod>2018-12-11T07:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/05/27/teaching-at-webster-university-cosc-3410-computer-security-since-2003/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/cyber-security-2296269_640.jpg</image:loc><image:title>cyber-security-2296269_640</image:title></image:image><lastmod>2018-10-28T07:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/08/29/what-is-the-right-balance-between-continuous-monitoring-and-periodic-audits-of-it-asset-management/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/08/arg2018.png</image:loc><image:title>ARG2018</image:title></image:image><lastmod>2018-09-04T15:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/09/04/cybersecurity-incident-response-guidelines-for-those-who-think-they-are-not-targets/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/09/security-2972105_640.jpg</image:loc><image:title>security-2972105_640</image:title></image:image><lastmod>2018-09-04T05:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/08/20/is-privacy-by-design-feasible/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/08/electrician-499799_640.jpg</image:loc><image:title>electrician-499799_640</image:title></image:image><lastmod>2018-08-20T06:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/07/10/will-eu-gdpr-enforce-proactive-security-in-the-post-heartbleed-shell-shock-world/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/07/heartbleed-378010_640.png</image:loc><image:title>heartbleed-378010_640</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/07/crypto-risk-analysis.jpg</image:loc><image:title>crypto risk analysis</image:title></image:image><lastmod>2018-07-10T06:28:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/07/03/presentation-on-vulnerability-assessment-latest-generation-of-hybrid-vulnerability-scanners-ciso-summit-middle-east-dubai-2014/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/07/computer-1245714_640.jpg</image:loc><image:title>computer-1245714_640</image:title></image:image><lastmod>2018-07-03T05:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/07/01/talk-on-data-owners-cloud-survival-and-exit-strategies-cloud-security-alliance-emea-congress-edinburgh-2013/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/07/cloud-computing-2001090_640.jpg</image:loc><image:title>cloud-computing-2001090_640</image:title></image:image><lastmod>2018-07-01T22:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/06/26/talk-on-creating-a-security-coordination-center-at-ciso-360-congress-in-lisbon/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/06/7eab2636-9056-407b-b41c-283e7eb23804.jpeg</image:loc><image:title>7EAB2636-9056-407B-B41C-283E7EB23804</image:title></image:image><lastmod>2018-06-26T06:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/06/03/my-talk-on-internet-of-things-iot-security-at-webster-university-geneva/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/06/iot-conference-webster.jpg</image:loc><image:title>IoT conference Webster</image:title></image:image><lastmod>2018-06-02T23:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/05/30/teaching-at-university-csss-2510-cyber-attacks-and-defense-2018/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/cyber-3324202_640.jpg</image:loc><image:title>cyber-3324202_640</image:title></image:image><lastmod>2018-05-30T05:46:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/05/29/teaching-at-university-csss-2410-cybersecurity-and-internet-architecture-since-2017/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/security-2337429_640.png</image:loc><image:title>security-2337429_640</image:title></image:image><lastmod>2018-05-29T15:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/05/24/talking-about-privacy-and-the-internet-of-things-at-webster-university-geneva/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/05/network-782707_640.png</image:loc><image:title>network-782707_640</image:title></image:image><lastmod>2018-05-25T08:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/03/22/the-first-100-days-of-the-next-generation-ciso/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/cybereye.jpg</image:loc><image:title>cybereye</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/isms100d-timeline.png</image:loc><image:title>ISMS100d timeline</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/communication.jpg</image:loc><image:title>communication</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/air-show.jpg</image:loc><image:title>air show</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/pdca-act.png</image:loc><image:title>PDCA Act</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/wwwwhw.png</image:loc><image:title>wwwwhw</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/ciso-role.png</image:loc><image:title>CISO role</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/pdca-plan1.png</image:loc><image:title>PDCA plan</image:title></image:image><lastmod>2018-03-22T16:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/03/17/legacy-of-invaders/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/fantasy-2861815_640.jpg</image:loc><image:title>fantasy-2861815_640</image:title></image:image><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/invader-42007_640.png</image:loc><image:title>invader-42007_640</image:title></image:image><lastmod>2018-03-17T13:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/03/15/importance-of-imagination/</loc><image:image><image:loc>https://cybersymbiosis.com/wp-content/uploads/2018/03/fractal-art-3206739_640.jpg</image:loc><image:title>fractal-art-3206739_640</image:title></image:image><lastmod>2018-03-15T12:26:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/2018/03/12/the-journey-begins/</loc><lastmod>2018-03-12T22:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersymbiosis.com/contact/</loc><lastmod>2018-03-12T22:35:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersymbiosis.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-07-18T14:10:30+00:00</lastmod></url></urlset>
