<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://dev.shadowsight.io/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://dev.shadowsight.io/insider-risk-what-gets-measured-gets-managed-the-imperative-of-implementing-an-insider-risk-management-program/</loc><lastmod>2023-10-18T04:27:49+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-imperative-of-the-australian-security-of-critical-infrastructure-soci-act-2018-emphasising-the-importance-of-insider-threat-management/</loc><lastmod>2023-10-16T04:08:16+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-hidden-peril-of-employee-disengagement-dont-get-even-get-lazy/</loc><lastmod>2023-10-16T03:49:03+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-hesitant-path-to-insider-risk-management-understanding-ciso-concerns/</loc><lastmod>2023-10-16T03:49:31+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-underestimated-threat-insider-risks-in-financial-institutions/</loc><lastmod>2023-10-16T03:49:49+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-evolution-of-security-culture-insider-risk-management-vs-data-leakage-prevention-platforms/</loc><lastmod>2023-10-16T03:50:08+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/unveiling-the-distinctions-data-leakage-protection-dlp-vs-insider-risk-management-irm-tools/</loc><lastmod>2023-10-16T03:50:30+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/proactive-insider-risk-detection-programs-everything-you-ever-wanted-to-know-and-probably-some-things-you-didnt/</loc><lastmod>2023-10-16T03:50:49+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/your-insider-risk-program-shopping-list/</loc><lastmod>2023-10-16T03:51:11+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/proactive-staff-monitoring-a-vital-instrument-for-enhancing-data-governance-and-privacy-of-customers/</loc><lastmod>2023-10-16T03:51:28+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/which-lever-will-the-ciso-pull-a-comprehensive-and-strategic-approach-to-enhancing-information-security-controls/</loc><lastmod>2023-10-16T03:56:08+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/dont-be-blindsided-why-visibility-of-staff-activity-is-so-critical-and-how-proactive-staff-monitoring-helps/</loc><lastmod>2023-10-16T03:58:18+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-importance-of-utilising-and-integrating-employee-monitoring-capabilities-with-existing-systems/</loc><lastmod>2023-10-16T04:13:36+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/ensuring-the-success-of-employee-activity-monitoring-communication-compliance-and-care/</loc><lastmod>2023-10-16T04:15:56+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-insider-risk-associated-with-employees-working-from-home-a-comprehensive-overview/</loc><lastmod>2023-10-17T04:29:23+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-effectiveness-of-staff-monitoring-in-enhancing-security-culture-across-small-medium-and-large-organisations/</loc><lastmod>2023-10-17T04:33:38+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-risk-associated-with-junior-staff-access-to-sensitive-customer-information/</loc><lastmod>2023-10-17T04:34:02+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/managing-the-insider-risk-associated-with-exiting-or-terminated-employees/</loc><lastmod>2023-10-17T04:34:21+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/raising-the-bar-australian-privacy-legislation-introduces-stricter-rules-and-harsher-penalties/</loc><lastmod>2023-10-17T04:36:30+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/unmasking-the-beelsebub-of-insider-threats-a-lord-of-the-flies-perspective-on-organisational-risk/</loc><lastmod>2023-10-17T04:38:34+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-hairpin-turns-the-dangers-of-neglecting-staff-monitoring-in-organisations-and-the-insider-risk-pitfalls/</loc><lastmod>2023-10-17T22:10:08+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-hidden-danger-inside-threats-in-organisations-and-the-need-for-behavioural-monitoring/</loc><lastmod>2023-10-17T22:16:01+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-insider-risk-sword-of-damocles-which-of-your-departments-if-your-biggest-risk-why-and-what-do-you-do-about-it/</loc><lastmod>2023-10-17T22:21:09+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-ciso-superhero-equipping-organisations-with-the-ultimate-security-arsenal/</loc><lastmod>2023-10-17T22:23:46+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-insider-risk-posed-to-organisations-by-database-administrators/</loc><lastmod>2023-10-17T22:26:07+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-psychological-impact-of-unmonitored-employees-understanding-compliance-data-leakage-and-fraud-risks-in-organisations/</loc><lastmod>2023-10-17T22:28:04+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/mitigating-insider-risk-the-growing-challenge-for-ciso-and-cio-executives-in-meeting-internal-audit-requirements/</loc><lastmod>2023-10-17T22:30:36+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/what-are-the-legal-and-ethical-considerations-related-to-insider-risk/</loc><lastmod>2023-10-17T22:35:47+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-challenges-for-a-ciso-in-detecting-insider-threat/</loc><lastmod>2023-10-17T22:37:47+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-challenges-for-cisos-in-changing-the-culture-of-an-organisation-as-a-mitigation-strategy-against-insider-threat/</loc><lastmod>2023-10-17T22:43:10+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/what-are-the-challenges-in-implementing-ai-for-insider-threat-detection/</loc><lastmod>2023-10-18T03:46:45+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/what-are-the-dangers-of-insider-risk-in-the-finance-industry/</loc><lastmod>2023-10-18T03:50:23+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/what-are-the-differences-in-insider-risk-per-industry/</loc><lastmod>2023-10-18T04:04:28+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-use-of-artificial-intelligence-to-detect-the-malicious-insider/</loc><lastmod>2023-10-18T04:08:04+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-use-of-artificial-intelligence-to-detect-insider-threat/</loc><lastmod>2023-10-18T04:14:22+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/negligent-behaviour-by-employees-fuelling-the-insider-threat/</loc><lastmod>2023-10-18T04:16:31+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/what-gets-measured-gets-managed-the-imperative-of-implementing-an-insider-risk-management-program/</loc><lastmod>2023-10-18T04:29:46+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-psychology-of-insider-threat/</loc><lastmod>2023-10-18T04:33:25+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/information-theft-the-employee-risk/</loc><lastmod>2023-10-18T05:11:17+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-threat-the-clown-in-your-cyber-circus/</loc><lastmod>2023-10-18T05:14:35+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/mitigating-the-risk-of-social-engineering-on-insiders-through-monitoring-activity/</loc><lastmod>2023-10-18T05:16:44+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-threat-people-your-most-valuable-and-destructive-asset/</loc><lastmod>2023-10-18T05:19:03+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-challenges-of-monitoring-large-volumes-of-security-alerts-a-focus-on-internal-information-security-teams/</loc><lastmod>2023-10-18T05:22:36+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/how-do-i-protect-my-organisation-from-data-loss-by-employees/</loc><lastmod>2023-10-18T05:24:47+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-threat-challenges-in-the-manufacturing-industry/</loc><lastmod>2023-10-18T05:27:33+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/healthcare-industry-what-are-the-insider-threat-challenges/</loc><lastmod>2023-10-18T05:29:29+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/digital-data-hoarding-the-risks-of-accumulating-too-much-data-in-the-cloud/</loc><lastmod>2023-10-18T21:51:46+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/does-your-company-operate-with-inaccurate-or-incomplete-data-of-course-it-does-most-do-this-article-explores-how-it-is-holding-your-company-back-and-what-you-should-do-about-it/</loc><lastmod>2023-10-18T21:53:37+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/enhancing-regulatory-compliance-through-effective-data-governance/</loc><lastmod>2023-10-18T21:55:27+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/microsoft-sharepoint-the-risks-of-uncontrolled-data-storage/</loc><lastmod>2023-10-18T21:56:57+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/poor-data-governance-a-house-of-cards-that-puts-sensitive-data-at-risk/</loc><lastmod>2023-10-18T21:59:04+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-coming-overhaul-of-australian-privacy-laws-why-businesses-must-take-note-and-act-now/</loc><lastmod>2023-10-18T22:00:27+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-peril-of-poor-data-governance-in-law-firms-impacts-on-sensitive-information-and-firm-reputation/</loc><lastmod>2023-10-18T22:01:58+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-power-of-improved-data-governance-mitigating-the-impact-of-data-breaches/</loc><lastmod>2023-10-18T22:03:49+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-risks-of-manual-data-classification/</loc><lastmod>2023-10-18T22:05:41+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-risks-of-staff-using-email-as-file-and-document-storage-in-organisations/</loc><lastmod>2023-10-18T22:07:18+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/unpacking-the-complexities-legal-discovery-of-vast-data-repositories/</loc><lastmod>2023-10-18T22:08:59+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-hidden-dangers-why-insider-risks-are-the-titanic-icebergs-of-organisations/</loc><lastmod>2023-10-23T01:16:54+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-abc-of-implementing-an-insider-risk-program/</loc><lastmod>2023-10-23T04:19:32+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-looming-threat-state-sponsored-attacks-and-insider-risks-across-industries/</loc><lastmod>2023-10-23T05:57:55+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/mitigating-insider-threats-in-the-university-sector-safeguarding-against-international-student-risks/</loc><lastmod>2023-10-25T00:00:34+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/safeguarding-customer-sensitive-information-the-imperative-of-data-mapping/</loc><lastmod>2023-10-27T00:00:33+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/a-case-study-in-data-breach-a-lesson-in-insider-risk-management/</loc><lastmod>2023-10-31T04:18:50+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-risks-of-using-chatgpt-safeguarding-your-data-in-the-digital-age/</loc><lastmod>2023-10-31T23:59:18+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-spy-who-cost-billions-a-case-study-on-corporate-espionage-and-the-value-of-vigilance/</loc><lastmod>2023-11-13T03:22:54+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/mitigating-insider-risks-a-deeper-dive-into-the-cash-app-data-breach/</loc><lastmod>2023-11-13T03:24:55+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/analysing-the-twilio-data-breach-of-2023-a-case-study-in-insider-risk-and-social-engineering/</loc><lastmod>2023-12-05T02:27:39+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-pentagon-leak-case-of-2023-a-lesson-in-insider-risk-management/</loc><lastmod>2023-12-05T02:27:59+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-ubiquiti-data-theft-a-case-study-in-insider-risk-and-the-necessity-of-vigilant-monitoring/</loc><lastmod>2023-12-05T02:27:17+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/nhs-data-breach-a-case-for-strengthening-insider-risk-monitoring-with-shadowsight/</loc><lastmod>2023-12-05T03:50:35+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-imperative-of-insider-risk-management-in-the-manufacturing-industry/</loc><lastmod>2023-12-06T00:30:16+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/in-depth-analysis-of-insider-risks-in-defence-and-intelligence-industries/</loc><lastmod>2023-12-06T03:53:13+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-mase-of-insider-risk-a-strategic-approach-for-cisos/</loc><lastmod>2023-12-07T03:00:15+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/redefining-cybersecurity-training-how-insider-risk-detection-is-revolutionising-employee-awareness/</loc><lastmod>2023-12-07T02:57:09+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/redefining-cybersecurity-training-how-insider-risk-detection-is-revolutionising-employee-awareness-2/</loc><lastmod>2024-04-19T01:12:35+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-maze-of-insider-risk-a-strategic-approach-for-cisos/</loc><lastmod>2024-04-19T01:08:01+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-precarious-terrain-of-insider-risks-in-pharmaceuticals-and-biotechnology/</loc><lastmod>2024-04-19T01:11:59+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/safeguarding-the-vaults-of-national-security-the-case-of-joshua-schulte-the-ex-cia-software-engineer/</loc><lastmod>2024-04-19T01:15:43+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-integral-role-of-dashboards-in-mitigating-insider-threats/</loc><lastmod>2024-04-19T01:20:23+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/embracing-insider-risk-management-the-blueprint-for-a-secure-future/</loc><lastmod>2024-04-19T01:24:48+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/cloud-computing-and-data-sovereignty-navigating-the-complex-landscape-under-australian-privacy-laws/</loc><lastmod>2024-04-19T01:30:04+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/inside-out-the-stark-warning-from-googles-ai-secrets-heist/</loc><lastmod>2024-04-19T02:58:26+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/understanding-insider-risk-a-comprehensive-overview/</loc><lastmod>2024-04-19T03:00:42+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-psychology-behind-insider-threats-understanding-the-mindset/</loc><lastmod>2024-04-19T03:02:53+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-risk-in-the-remote-work-era-adapting-management-practices-for-the-new-normal/</loc><lastmod>2024-04-19T03:12:59+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/training-employees-to-recognize-and-report-insider-threats/</loc><lastmod>2024-04-19T03:06:39+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-impact-of-insider-threats-on-large-businesses/</loc><lastmod>2024-04-19T03:11:38+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/navigating-the-insider-risk-management-challenge-the-shadowsight-solution/</loc><lastmod>2024-04-19T03:15:17+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/insider-risk-case-study-data-leakage-hidden-behind-a-family-recipe/</loc><lastmod>2024-04-19T03:17:34+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-role-of-leadership-in-mitigating-insider-risks/</loc><lastmod>2024-04-19T03:19:44+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/prepare-early-for-the-cyber-threat-landscape-during-holiday-periods/</loc><lastmod>2024-05-02T05:04:00+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/future-changes-to-the-australian-privacy-act-a-guide-for-ceos/</loc><lastmod>2024-06-06T00:56:55+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/understanding-the-multifaceted-threats-of-data-breaches-a-ceos-perspective/</loc><lastmod>2024-06-12T04:07:53+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/case-study-effective-digital-forensics-and-litigation-support-in-a-business-dispute/</loc><lastmod>2024-06-15T03:08:46+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/your-car-is-monitoring-you-how-do-you-protect-yourself/</loc><lastmod>2024-06-18T23:07:23+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/ai-and-data-governance-navigating-the-challenges-and-strategies-for-ethical-bias-free-and-compliant-ai-generated-data-in-finance-and-healthcare/</loc><lastmod>2024-06-16T22:16:57+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/an-interview-with-data-governance-expert-nicholas-gontscharow-protecting-your-data-innovative-strategies-in-the-modern-world/</loc><lastmod>2024-06-18T23:10:25+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/bridging-the-gap-how-data-governance-unites-business-and-it/</loc><lastmod>2024-06-18T23:14:15+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/choosing-the-future-of-data-security-a-comprehensive-guide-for-cisos-on-selecting-the-ideal-data-governance-platform/</loc><lastmod>2024-06-19T06:16:32+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/classifying-data-the-first-step-to-a-secure-digital-future/</loc><lastmod>2024-06-24T00:32:48+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/gdpr-a-comparative-analysis-between-australian-privacy-regulations-and-the-european-unions-general-data-protection-regulation/</loc><lastmod>2024-06-25T02:46:05+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/compliance-with-the-australian-privacy-principles-apps-navigating-the-legal-landscape/</loc><lastmod>2024-06-25T02:45:46+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/cross-border-data-flows-navigating-challenges-and-regulatory-requirements-for-australian-organisations/</loc><lastmod>2024-06-25T02:45:24+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/understanding-insider-risk-the-key-motivators-behind-insider-threats/</loc><lastmod>2024-06-25T03:19:51+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/data-leakage-prevention-dlp-tools-the-issues-around-blocking-staff-activity/</loc><lastmod>2024-06-26T03:05:55+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/culture-beats-policy-rethinking-data-leakage-prevention-in-modern-organisations/</loc><lastmod>2024-08-13T05:40:04+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-pitfalls-of-technologist-designed-data-leakage-prevention-and-insider-risk-platforms/</loc><lastmod>2024-08-13T06:21:51+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/the-problems-with-data-leakage-prevention-dlp-platforms-when-technology-outpaces-user-experience/</loc><lastmod>2024-08-14T02:47:26+00:00</lastmod></url><url><loc>https://dev.shadowsight.io/data-leakage-and-insider-risk-in-growing-organisations-a-growing-concern/</loc><lastmod>2024-08-19T23:15:33+00:00</lastmod></url></urlset>
