<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://kordon.app/</loc></url><url><loc>https://kordon.app/5-categories-of-risk-modern-companies-need-to-consider/</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/19-essential-kpis-to-track-your-ismss-effectiveness/</loc><lastmod>2025-04-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/25-essential-operational-risks-practical-examples-for-modern-organisations/</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/140-example-assets-for-iso-27001-nis-2-dora-compliance/</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/317-example-vendors-for-iso-27001-nis-2-and-dora-compliance-free-csv-template-download/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/access-follows-responsibility/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/agentic-grc/</loc></url><url><loc>https://kordon.app/asset-inventory-management-guide/</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/asset-management/</loc></url><url><loc>https://kordon.app/author/jaana-metsamaa/</loc></url><url><loc>https://kordon.app/author/kordon/</loc></url><url><loc>https://kordon.app/author/martin-ojala/</loc></url><url><loc>https://kordon.app/blog/</loc></url><url><loc>https://kordon.app/business-process-management/</loc></url><url><loc>https://kordon.app/case-studies/</loc></url><url><loc>https://kordon.app/case-studies/case-study-esgrid-soc2/</loc><lastmod>2025-03-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/case-studies/case-study-migrating-from-vanta-with-qminder/</loc><lastmod>2025-09-05T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/choosing-the-right-risk-matrix-hidden-biases-and-how-to-overcome-them/</loc><lastmod>2025-03-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/contact-us/</loc></url><url><loc>https://kordon.app/control-management/</loc></url><url><loc>https://kordon.app/cybersecurity-news/</loc></url><url><loc>https://kordon.app/cybersecurity-news/8-cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-01/</loc><lastmod>2025-09-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/9-cybersecurity-news-from-this-week-worth-your-attention-june-2025/</loc><lastmod>2025-06-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/10-cybersecurity-news-you-should-know-from-3rd-week-of-may-2025/</loc><lastmod>2025-05-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/11-cybersecurity-news-worth-your-attention-this-week-summarised-11-08-2025/</loc><lastmod>2025-08-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/11-cybersecurity-news-worth-your-attention-this-week-summarised-18-08-2025/</loc><lastmod>2025-08-18T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/12-cybersecurity-news-worth-your-attention-this-week-summarised-2025-08-25/</loc><lastmod>2025-08-25T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/13-cybersecurity-news-summarised-14-07-2025/</loc><lastmod>2025-07-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/13-cybersecurity-news-worth-your-attention-1st-week-of-june-2025/</loc><lastmod>2025-06-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/13-cybersecurity-news-worth-your-attention-this-week-2-4-may-2025/</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/14-cyber-security-news-worth-your-attention-from-last-week-of-april/</loc><lastmod>2025-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/15-cyber-security-news-from-june-worth-your-attention/</loc><lastmod>2025-06-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/17-cyber-security-news-worth-your-attention-this-week/</loc><lastmod>2025-04-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/17-cybersecurity-news-worth-your-attention-this-week-summarised-04-08-2025/</loc><lastmod>2025-08-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/18-cyber-security-news-worth-your-attention-in-first-week-of-may/</loc><lastmod>2025-05-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/18-cybersecurity-news-summarised-21-07-2025/</loc><lastmod>2025-07-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-2025-10-06/</loc><lastmod>2025-10-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-2025-10-20/</loc><lastmod>2025-10-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-26-01-2026/</loc><lastmod>2026-01-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-08/</loc><lastmod>2025-09-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-15/</loc><lastmod>2025-09-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-10-27/</loc><lastmod>2025-10-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-01-12-2025/</loc><lastmod>2025-12-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-07-12-2025/</loc><lastmod>2025-12-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-15-12-2025/</loc><lastmod>2025-12-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-22-12-2025/</loc><lastmod>2025-12-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-03/</loc><lastmod>2025-11-03T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-10/</loc><lastmod>2025-11-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-24/</loc><lastmod>2025-11-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-17-11/</loc><lastmod>2025-11-17T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-cybersecurity-news-28-july-2025/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-01-03-2026/</loc><lastmod>2026-03-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-09-03-2026/</loc><lastmod>2026-03-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-16-03-2026/</loc><lastmod>2026-03-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-23-02-2026/</loc><lastmod>2026-02-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-23-03-2026/</loc><lastmod>2026-03-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-03-30/</loc><lastmod>2026-03-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-04-05/</loc><lastmod>2026-05-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-06-04/</loc><lastmod>2026-04-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-13-04/</loc><lastmod>2026-04-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-20-04/</loc><lastmod>2026-04-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-2026-26-04/</loc><lastmod>2026-04-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-02-02-2026/</loc><lastmod>2026-02-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-05-01-2026/</loc><lastmod>2026-01-05T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-09-02-2026/</loc><lastmod>2026-02-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-16-02-2026/</loc><lastmod>2026-02-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-19-01-2026/</loc><lastmod>2026-01-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-29-12-2025/</loc><lastmod>2025-12-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/security-news-roundup-from-last-week-that-we-found-interesting-14-04-2025/</loc><lastmod>2025-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-05-10/</loc><lastmod>2025-10-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-09-22/</loc><lastmod>2025-09-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-09-29/</loc><lastmod>2025-09-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/this-week-in-cybersecurity-news-12-01-2026/</loc><lastmod>2026-01-12T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/cybersecurity-news/top-cybsersecurity-news-summarised-1st-week-of-july-2025/</loc><lastmod>2025-07-07T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/detailne-juhend-kuidas-luua-e-its-varade-ja-teenusepakkujate-register/</loc><lastmod>2026-01-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/detailne-juhend-kuidas-maaratleda-e-its-ariprotsesse/</loc><lastmod>2026-01-07T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/download-asset-management-book/</loc></url><url><loc>https://kordon.app/e-its-implementation/</loc></url><url><loc>https://kordon.app/et/</loc></url><url><loc>https://kordon.app/et/5-categories-of-risk-modern-companies-need-to-consider/</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/19-essential-kpis-to-track-your-ismss-effectiveness/</loc><lastmod>2025-04-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/25-essential-operational-risks-practical-examples-for-modern-organisations/</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/140-example-assets-for-iso-27001-nis-2-dora-compliance/</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/317-example-vendors-for-iso-27001-nis-2-and-dora-compliance-free-csv-template-download/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/access-follows-responsibility/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/agentne-grc/</loc></url><url><loc>https://kordon.app/et/asset-inventory-management-guide/</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/author/jaana-metsamaa/</loc></url><url><loc>https://kordon.app/et/author/kordon/</loc></url><url><loc>https://kordon.app/et/author/martin-ojala/</loc></url><url><loc>https://kordon.app/et/blog/</loc></url><url><loc>https://kordon.app/et/business-process-management/</loc></url><url><loc>https://kordon.app/et/case-studies/</loc></url><url><loc>https://kordon.app/et/case-studies/case-study-esgrid-soc2/</loc><lastmod>2025-03-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/case-studies/case-study-migrating-from-vanta-with-qminder/</loc><lastmod>2025-09-05T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/choosing-the-right-risk-matrix-hidden-biases-and-how-to-overcome-them/</loc><lastmod>2025-03-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/</loc></url><url><loc>https://kordon.app/et/cybersecurity-news/8-cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-01/</loc><lastmod>2025-09-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/9-cybersecurity-news-from-this-week-worth-your-attention-june-2025/</loc><lastmod>2025-06-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/10-cybersecurity-news-you-should-know-from-3rd-week-of-may-2025/</loc><lastmod>2025-05-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/11-cybersecurity-news-worth-your-attention-this-week-summarised-11-08-2025/</loc><lastmod>2025-08-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/11-cybersecurity-news-worth-your-attention-this-week-summarised-18-08-2025/</loc><lastmod>2025-08-18T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/12-cybersecurity-news-worth-your-attention-this-week-summarised-2025-08-25/</loc><lastmod>2025-08-25T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/13-cybersecurity-news-summarised-14-07-2025/</loc><lastmod>2025-07-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/13-cybersecurity-news-worth-your-attention-1st-week-of-june-2025/</loc><lastmod>2025-06-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/13-cybersecurity-news-worth-your-attention-this-week-2-4-may-2025/</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/14-cyber-security-news-worth-your-attention-from-last-week-of-april/</loc><lastmod>2025-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/15-cyber-security-news-from-june-worth-your-attention/</loc><lastmod>2025-06-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/17-cyber-security-news-worth-your-attention-this-week/</loc><lastmod>2025-04-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/17-cybersecurity-news-worth-your-attention-this-week-summarised-04-08-2025/</loc><lastmod>2025-08-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/18-cyber-security-news-worth-your-attention-in-first-week-of-may/</loc><lastmod>2025-05-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/18-cybersecurity-news-summarised-21-07-2025/</loc><lastmod>2025-07-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-2025-10-06/</loc><lastmod>2025-10-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-2025-10-20/</loc><lastmod>2025-10-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-26-01-2026/</loc><lastmod>2026-01-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-08/</loc><lastmod>2025-09-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-09-15/</loc><lastmod>2025-09-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/cybersecurity-news-worth-your-attention-this-week-summarised-2025-10-27/</loc><lastmod>2025-10-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-01-12-2025/</loc><lastmod>2025-12-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-07-12-2025/</loc><lastmod>2025-12-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-15-12-2025/</loc><lastmod>2025-12-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-22-12-2025/</loc><lastmod>2025-12-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-03/</loc><lastmod>2025-11-03T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-10/</loc><lastmod>2025-11-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-11-24/</loc><lastmod>2025-11-24T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/interesting-cybersecurity-news-of-the-week-summarised-2025-17-11/</loc><lastmod>2025-11-17T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-cybersecurity-news-28-july-2025/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-01-03-2026/</loc><lastmod>2026-03-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-09-03-2026/</loc><lastmod>2026-03-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-16-03-2026/</loc><lastmod>2026-03-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-23-02-2026/</loc><lastmod>2026-02-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-23-03-2026/</loc><lastmod>2026-03-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-03-30/</loc><lastmod>2026-03-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-04-05/</loc><lastmod>2026-05-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-06-04/</loc><lastmod>2026-04-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-13-04/</loc><lastmod>2026-04-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-20-04/</loc><lastmod>2026-04-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-2026-26-04/</loc><lastmod>2026-04-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-02-02-2026/</loc><lastmod>2026-02-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-05-01-2026/</loc><lastmod>2026-01-05T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-09-02-2026/</loc><lastmod>2026-02-09T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-16-02-2026/</loc><lastmod>2026-02-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-19-01-2026/</loc><lastmod>2026-01-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/latest-interesting-cybersecurity-news-of-the-week-summarised-29-12-2025/</loc><lastmod>2025-12-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/security-news-roundup-from-last-week-that-we-found-interesting-14-04-2025/</loc><lastmod>2025-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-05-10/</loc><lastmod>2025-10-06T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-09-22/</loc><lastmod>2025-09-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/summaries-of-cybersecurity-news-worth-your-attention-this-week-2025-09-29/</loc><lastmod>2025-09-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/this-week-in-cybersecurity-news-12-01-2026/</loc><lastmod>2026-01-12T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/cybersecurity-news/top-cybsersecurity-news-summarised-1st-week-of-july-2025/</loc><lastmod>2025-07-07T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/detailne-juhend-kuidas-luua-e-its-varade-ja-teenusepakkujate-register/</loc><lastmod>2026-01-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/detailne-juhend-kuidas-maaratleda-e-its-ariprotsesse/</loc><lastmod>2026-01-07T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/e-its/</loc></url><url><loc>https://kordon.app/et/findings-management/</loc></url><url><loc>https://kordon.app/et/grc-inseneritoo/</loc></url><url><loc>https://kordon.app/et/grc-metrics-kpis-checklist-with-example-kpis/</loc><lastmod>2026-01-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/hind/</loc></url><url><loc>https://kordon.app/et/how-an-attacker-used-spam-bombing-to-gain-remote-access/</loc><lastmod>2025-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/how-to-build-a-vendor-risk-management-framework/</loc><lastmod>2025-05-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/how-to-choose-a-risk-management-tool/</loc><lastmod>2025-03-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/how-to-do-policy-training-better/</loc><lastmod>2025-04-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/how-to-effectively-collaborate-within-the-organisation-to-capture-all-assets/</loc><lastmod>2025-03-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/infoturbe-dokumendimallid/</loc></url><url><loc>https://kordon.app/et/is-we-dont-use-your-data-for-ai-training-enough/</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/iso-27001-asset-inventory-best-practices/</loc><lastmod>2025-02-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/join-kordons-partnership-program/</loc></url><url><loc>https://kordon.app/et/kontakt/</loc></url><url><loc>https://kordon.app/et/kordade-haldus/</loc></url><url><loc>https://kordon.app/et/kordon-turvalisus/</loc></url><url><loc>https://kordon.app/et/kordon-vs-cybsis/</loc></url><url><loc>https://kordon.app/et/mapping-assets-to-business-processes/</loc><lastmod>2025-03-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/naidisregistrid/</loc></url><url><loc>https://kordon.app/et/nis-2-just-came-out-but-we-already-know-what-nis-3-will-bring/</loc><lastmod>2025-04-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/no-warrant-no-problem-how-governments-are-building-the-surveillance-super-app/</loc><lastmod>2025-05-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/on-premises-grc-platform-pros-cons-and-when-it-makes-sense/</loc><lastmod>2025-04-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/on-premises-grc-platform/</loc></url><url><loc>https://kordon.app/et/partnerlusprogramm/</loc></url><url><loc>https://kordon.app/et/policy-templates/acceptable-use-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/access-control-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/ai-use-policy/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/asset-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/backup-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/business-continuity-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/change-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/code-of-conduct-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/compliance-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/data-classification-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/data-protection-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/data-retention-disposal-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/disaster-recovery-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/endpoint-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/incident-response-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/information-security-policy-template-free-download/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/infrastructure-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/logging-and-monitoring-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/physical-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/records-of-processing-activities-ropa-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/risk-management-policy-template-free-download/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/secure-software-development-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/vendor-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/policy-templates/vulnerability-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/privacy-notice/</loc></url><url><loc>https://kordon.app/et/product-updates/</loc></url><url><loc>https://kordon.app/et/product-updates/kordon-1-2-0-release-notes/</loc><lastmod>2024-04-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-3-1-release-notes/</loc><lastmod>2024-05-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-4-1-release-notes/</loc><lastmod>2024-06-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-4-2-release-notes/</loc><lastmod>2024-07-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-4-3-release-notes/</loc><lastmod>2024-07-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-5-0-release-notes/</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-6-0-release-notes/</loc><lastmod>2024-10-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-6-1-release-notes/</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-6-2-release-notes/</loc><lastmod>2024-10-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-6-3-release-notes/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-6-4-release-notes/</loc><lastmod>2024-11-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-7-0-release-notes/</loc><lastmod>2025-02-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-7-1-release-notes/</loc><lastmod>2025-03-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-8-0-release-notes/</loc><lastmod>2025-06-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-8-1-release-notes/</loc><lastmod>2025-06-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-8-2-release-notes/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-9-1-release-notes/</loc><lastmod>2025-10-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-9-2-release-notes/</loc><lastmod>2025-10-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-10-0-release-notes/</loc><lastmod>2025-11-17T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-11-0-release-notes/</loc><lastmod>2026-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/product-updates/kordon-1-12-0-release-notes/</loc><lastmod>2026-04-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/raamistike-haldus/</loc></url><url><loc>https://kordon.app/et/risk-management-fail-mixing-causes-with-the-risk-itself/</loc><lastmod>2025-04-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/riskijuhtimine/</loc></url><url><loc>https://kordon.app/et/the-highest-vendor-risk-happens-after-onboarding-vendor-drift/</loc><lastmod>2025-03-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/top-information-security-risks-in-2025/</loc><lastmod>2025-02-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/turvameetmete-haldus/</loc></url><url><loc>https://kordon.app/et/varade-haldus/</loc></url><url><loc>https://kordon.app/et/vendor-management-vs-vendor-risk-management-whats-the-difference/</loc><lastmod>2025-05-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/vendor-management/</loc></url><url><loc>https://kordon.app/et/vendor-tiering-in-practice-how-to-calibrate-vendor-levels-without-overkill/</loc><lastmod>2025-05-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/why-business-process-management-is-the-missing-link-in-grc/</loc><lastmod>2026-04-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/et/youre-an-infosec-professional-not-a-kinderkarten-teacher/</loc><lastmod>2025-04-11T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/example-inventories/</loc></url><url><loc>https://kordon.app/findings-management/</loc></url><url><loc>https://kordon.app/frameworks/</loc></url><url><loc>https://kordon.app/grc-engineering/</loc></url><url><loc>https://kordon.app/grc-metrics-kpis-checklist-with-example-kpis/</loc><lastmod>2026-01-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/how-an-attacker-used-spam-bombing-to-gain-remote-access/</loc><lastmod>2025-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/how-to-build-a-vendor-risk-management-framework/</loc><lastmod>2025-05-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/how-to-choose-a-risk-management-tool/</loc><lastmod>2025-03-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/how-to-do-policy-training-better/</loc><lastmod>2025-04-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/how-to-effectively-collaborate-within-the-organisation-to-capture-all-assets/</loc><lastmod>2025-03-23T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/is-we-dont-use-your-data-for-ai-training-enough/</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/iso-27001-asset-inventory-best-practices/</loc><lastmod>2025-02-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/join-kordons-partnership-program/</loc></url><url><loc>https://kordon.app/kordon-security/</loc></url><url><loc>https://kordon.app/kordon-vs-cybsis/</loc></url><url><loc>https://kordon.app/mapping-assets-to-business-processes/</loc><lastmod>2025-03-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/nis-2-just-came-out-but-we-already-know-what-nis-3-will-bring/</loc><lastmod>2025-04-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/no-warrant-no-problem-how-governments-are-building-the-surveillance-super-app/</loc><lastmod>2025-05-26T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/on-premises-grc-platform-pros-cons-and-when-it-makes-sense/</loc><lastmod>2025-04-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/on-premises-grc-platform/</loc></url><url><loc>https://kordon.app/partnerships/</loc></url><url><loc>https://kordon.app/policy-management/</loc></url><url><loc>https://kordon.app/policy-templates/</loc></url><url><loc>https://kordon.app/policy-templates/acceptable-use-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/access-control-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/ai-use-policy/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/asset-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/backup-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/business-continuity-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/change-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/code-of-conduct-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/compliance-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/data-classification-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/data-protection-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/data-retention-disposal-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/disaster-recovery-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/endpoint-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/incident-response-plan-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/information-security-policy-template-free-download/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/infrastructure-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/logging-and-monitoring-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/physical-security-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/records-of-processing-activities-ropa-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/risk-management-policy-template-free-download/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/secure-software-development-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/vendor-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/policy-templates/vulnerability-management-policy-template/</loc><lastmod>2026-05-01T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/pricing/</loc></url><url><loc>https://kordon.app/privacy-notice/</loc></url><url><loc>https://kordon.app/product-updates/</loc></url><url><loc>https://kordon.app/product-updates/kordon-1-2-0-release-notes/</loc><lastmod>2024-04-15T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-3-1-release-notes/</loc><lastmod>2024-05-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-4-1-release-notes/</loc><lastmod>2024-06-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-4-2-release-notes/</loc><lastmod>2024-07-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-4-3-release-notes/</loc><lastmod>2024-07-16T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-5-0-release-notes/</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-6-0-release-notes/</loc><lastmod>2024-10-10T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-6-1-release-notes/</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-6-2-release-notes/</loc><lastmod>2024-10-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-6-3-release-notes/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-6-4-release-notes/</loc><lastmod>2024-11-19T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-7-0-release-notes/</loc><lastmod>2025-02-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-7-1-release-notes/</loc><lastmod>2025-03-13T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-8-0-release-notes/</loc><lastmod>2025-06-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-8-1-release-notes/</loc><lastmod>2025-06-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-8-2-release-notes/</loc><lastmod>2025-07-28T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-9-1-release-notes/</loc><lastmod>2025-10-21T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-9-2-release-notes/</loc><lastmod>2025-10-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-10-0-release-notes/</loc><lastmod>2025-11-17T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-11-0-release-notes/</loc><lastmod>2026-04-14T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/product-updates/kordon-1-12-0-release-notes/</loc><lastmod>2026-04-27T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/risk-management-fail-mixing-causes-with-the-risk-itself/</loc><lastmod>2025-04-02T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/risk-management/</loc></url><url><loc>https://kordon.app/the-highest-vendor-risk-happens-after-onboarding-vendor-drift/</loc><lastmod>2025-03-29T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/top-information-security-risks-in-2025/</loc><lastmod>2025-02-04T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/vendor-management-vs-vendor-risk-management-whats-the-difference/</loc><lastmod>2025-05-08T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/vendor-management/</loc></url><url><loc>https://kordon.app/vendor-tiering-in-practice-how-to-calibrate-vendor-levels-without-overkill/</loc><lastmod>2025-05-20T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/why-business-process-management-is-the-missing-link-in-grc/</loc><lastmod>2026-04-30T00:00:00.000Z</lastmod></url><url><loc>https://kordon.app/youre-an-infosec-professional-not-a-kinderkarten-teacher/</loc><lastmod>2025-04-11T00:00:00.000Z</lastmod></url></urlset>