<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.securitycentric.com.au/managed-services</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-25</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/sme-evolving-threat-landscape</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SME.png</image:loc><image:caption>SME</image:caption><image:title>SME</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2022-01-06</lastmod></url><url><loc>https://www.securitycentric.com.au/services/iso-27001-compliance-services</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/pci-dss-logo.webp</image:loc><image:caption>pcidsslogo</image:caption><image:title>pcidsslogo</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/IRAP-Logo-300x200.png</image:loc><image:caption>IRAPLogo300x200</image:caption><image:title>IRAPLogo300x200</image:title></image:image><lastmod>2022-07-26</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-risk-rankings-executives</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screen%20Shot%202022-01-12%20at%203.42.47%20pm.png</image:loc><image:caption>ScreenShot20220112at34247pm</image:caption><image:title>ScreenShot20220112at34247pm</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screen%20Shot%202022-01-12%20at%203.42.31%20pm.png</image:loc><image:caption>ScreenShot20220112at34231pm</image:caption><image:title>ScreenShot20220112at34231pm</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Risk%20Management%20-%20Highway%20Signpost%20on%20Sky%20Background..jpeg</image:loc><image:caption>RiskManagementHighwaySignpostonSkyBackground</image:caption><image:title>RiskManagementHighwaySignpostonSkyBackground</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/updates-observations-2021</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/2021.png</image:loc><image:caption>2021</image:caption><image:title>2021</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2021-12-21</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/msp-vs-mssp</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/regulating-ransomware-payment-reporting</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Untitled%20design.png</image:loc><image:caption>Untitleddesign</image:caption><image:title>Untitleddesign</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/values</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-16</lastmod></url><url><loc>https://www.securitycentric.com.au/ransomware-protection</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/CryptoLocker.jpg</image:loc><image:caption>CryptoLocker</image:caption><image:title>CryptoLocker</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/critical-importance-of-information-asset-audits</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Information%20Asset%20Audit.png</image:loc><image:caption>InformationAssetAudit</image:caption><image:title>InformationAssetAudit</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/responding-to-common-vulnerability-exposure-cve-2024-3094</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Praveen%20John235.jpg</image:loc><image:caption>PraveenJohn235</image:caption><image:title>PraveenJohn235</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-png-Apr-23-2024-06-16-52-0568-AM.png</image:loc><image:caption>imagepngApr2320240616520568AM</image:caption><image:title>imagepngApr2320240616520568AM</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-png-Apr-23-2024-06-26-48-6526-AM.png</image:loc><image:caption>imagepngApr2320240626486526AM</image:caption><image:title>imagepngApr2320240626486526AM</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-png-Apr-23-2024-06-36-32-0658-AM.png</image:loc><image:caption>imagepngApr2320240636320658AM</image:caption><image:title>imagepngApr2320240636320658AM</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screenshot%202024-04-24%20at%2010.07.11%20AM.png</image:loc><image:caption>Screenshot20240424at100711AM</image:caption><image:title>Screenshot20240424at100711AM</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screenshot%202024-01-17%20111539.png</image:loc><image:caption>Screenshot20240117111539</image:caption><image:title>Screenshot20240117111539</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-security-year-in-review-2023</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Vulnerability%20-%20Worrying%20Trends.png</image:loc><image:caption>VulnerabilityWorryingTrends</image:caption><image:title>VulnerabilityWorryingTrends</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Total%20Incidents%20Reported%20to%20ASD%202022%20-%202023.png</image:loc><image:caption>TotalIncidentsReportedtoASD20222023</image:caption><image:title>TotalIncidentsReportedtoASD20222023</image:title></image:image><lastmod>2024-01-17</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/there-is-no-magic-bullet-for-your-cyber-security-risks</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Technician%20using%20visual%20reality%20headset%20in%20server%20room-1.jpeg</image:loc><image:caption>Technicianusingvisualrealityheadsetinserverroom1</image:caption><image:title>Technicianusingvisualrealityheadsetinserverroom1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Colleagues%20in%20a%20data%20center%20standing%20in%20front%20of%20drawings%20of%20a%20planet%20with%20other%20sketches.jpeg</image:loc><image:caption>Colleaguesinadatacenterstandinginfrontofdrawingsofaplanetwithothersketches</image:caption><image:title>Colleaguesinadatacenterstandinginfrontofdrawingsofaplanetwithothersketches</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-03-13</lastmod></url><url><loc>https://www.securitycentric.com.au/privacy-policy</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-29</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-centric-joins-pci-qsa-program-but-for-different-reasons</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/payment-cards.png</image:loc><image:caption>paymentcards</image:caption><image:title>paymentcards</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2018-10-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-security-learnings-2020-tips</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/element5-digital-OyCl7Y4y0Bk-unsplash.jpg</image:loc><image:caption>element5digitalOyCl7Y4y0Bkunsplash</image:caption><image:title>element5digitalOyCl7Y4y0Bkunsplash</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-12-23</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-fundamentals-part-3-controlling-admin-privileges</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Technician%20using%20visual%20reality%20headset%20in%20server%20room.jpeg</image:loc><image:caption>Technicianusingvisualrealityheadsetinserverroom</image:caption><image:title>Technicianusingvisualrealityheadsetinserverroom</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/services/security-information-and-event-management-siem-services</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/threat-detection-infographic.png</image:loc><image:caption>threatdetectioninfographic</image:caption><image:title>threatdetectioninfographic</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-24</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/know-when-to-uplift-your-cybersecurity</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Sash_Vasilevski_csc_840x420.jpg.jpeg</image:loc><image:caption>SashVasilevskicsc840x420jpg</image:caption><image:title>SashVasilevskicsc840x420jpg</image:title></image:image><lastmod>2022-01-04</lastmod></url><url><loc>https://www.securitycentric.com.au/services/cloud-technical-security-assessment</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/azure-logo.png</image:loc><image:caption>azurelogo</image:caption><image:title>azurelogo</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/office365-logo.png</image:loc><image:caption>office365logo</image:caption><image:title>office365logo</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/aws-logo.png</image:loc><image:caption>awslogo</image:caption><image:title>awslogo</image:title></image:image><lastmod>2020-11-15</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/six-reasons-why-australian-businesses-should-use-a-managed-security-services-provider</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/MSSP.png</image:loc><image:caption>MSSP</image:caption><image:title>MSSP</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2021-12-30</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-basics-part-2-managing-hardware-and-software-assets</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Businessman%20hand%20working%20with%20a%20Cloud%20Computing%20diagram%20on%20the%20new%20computer%20interface%20as%20concept.jpeg</image:loc><image:caption>BusinessmanhandworkingwithaCloudComputingdiagramonthenewcomputerinterfaceasconcept</image:caption><image:title>BusinessmanhandworkingwithaCloudComputingdiagramonthenewcomputerinterfaceasconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/what-does-the-ebay-hack-and-jeremy-clarkson-have-in-common</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/clarkebay.png</image:loc><image:caption>clarkebay</image:caption><image:title>clarkebay</image:title></image:image><lastmod>2018-10-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/asds-annual-cyber-threat-report-2023-2024</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/ASD%20Annual%20Cyber%20Thread%20Report%202023-2024.png</image:loc><image:caption>ASDAnnualCyberThreadReport20232024</image:caption><image:title>ASDAnnualCyberThreadReport20232024</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://www.securitycentric.com.au/services/engineering</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_February2019%20Theme/Images/data-security.jpg</image:loc><image:caption>datasecurity</image:caption><image:title>datasecurity</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Network%20security%2c%20firewall%20segmentation%20and%20configuration%2c%20VPN%20security%2c%20MFA.png</image:loc><image:caption>NetworksecurityfirewallsegmentationandconfigurationVPNsecurityMFA</image:caption><image:title>NetworksecurityfirewallsegmentationandconfigurationVPNsecurityMFA</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/all-about-the-new-cyber-security-legislative-package-2024</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/AI-Generated%20Media/Images/The%20image%20features%20a%20sleek%20modern%20conference%20room%20with%20a%20large%20glass%20table%20at%20its%20center%20Surrounding%20the%20table%20are%20highbacked%20ergonomic%20chairs%20each%20accompanied%20by%20digital%20tablets%20A%20large%20screen%20on%20one%20wall%20displays%20the%20title%20Cyber%20Security%20Legislatio-3.png</image:loc><image:caption>TheimagefeaturesasleekmodernconferenceroomwithalargeglasstableatitscenterSurroundingthetablearehighbackedergonomicchairseachaccompaniedbydigitaltabletsAlargescreenononewalldisplaysthetitleCyberSecurityLegislatio3</image:caption><image:title>TheimagefeaturesasleekmodernconferenceroomwithalargeglasstableatitscenterSurroundingthetablearehighbackedergonomicchairseachaccompaniedbydigitaltabletsAlargescreenononewalldisplaysthetitleCyberSecurityLegislatio3</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2025-09-25</lastmod></url><url><loc>https://www.securitycentric.com.au/services/threat-detection-siem</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/adam-nowakowski-MFms-wkv3Ow-unsplash.jpg</image:loc><image:caption>adamnowakowskiMFmswkv3Owunsplash</image:caption><image:title>adamnowakowskiMFmswkv3Owunsplash</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-25</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/business-pentest</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Should%20You%20Get%20a%20Pentest.jpg</image:loc><image:caption>ShouldYouGetaPentest</image:caption><image:title>ShouldYouGetaPentest</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-13</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/threat-advisory-office-365-windows-10</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Threat%20advisory%20cve-2021-40444%20v2.png</image:loc><image:caption>Threatadvisorycve202140444v2</image:caption><image:title>Threatadvisorycve202140444v2</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/careers-main</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SV1-1.png</image:loc><image:caption>SV11</image:caption><image:title>SV11</image:title></image:image><lastmod>2024-01-17</lastmod></url><url><loc>https://www.securitycentric.com.au</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-15.png</image:loc><image:caption>greyscalelogohomepage15</image:caption><image:title>greyscalelogohomepage15</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-5-1.png</image:loc><image:caption>greyscalelogo51</image:caption><image:title>greyscalelogo51</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-7-1.png</image:loc><image:caption>greyscalelogo71</image:caption><image:title>greyscalelogo71</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-6-1.png</image:loc><image:caption>greyscalelogo61</image:caption><image:title>greyscalelogo61</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-16.png</image:loc><image:caption>greyscalelogohomepage16</image:caption><image:title>greyscalelogohomepage16</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-12.png</image:loc><image:caption>greyscalelogohomepage12</image:caption><image:title>greyscalelogohomepage12</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-7.png</image:loc><image:caption>greyscalelogohomepage7</image:caption><image:title>greyscalelogohomepage7</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-4.png</image:loc><image:caption>greyscalelogohomepage4</image:caption><image:title>greyscalelogohomepage4</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Security_Centric27_white.png</image:loc><image:caption>SecurityCentric27white</image:caption><image:title>SecurityCentric27white</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-14.png</image:loc><image:caption>greyscalelogohomepage14</image:caption><image:title>greyscalelogohomepage14</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Security_Centric23_72dpi.png</image:loc><image:caption>SecurityCentric2372dpi</image:caption><image:title>SecurityCentric2372dpi</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/mjbale-logo-grey.png</image:loc><image:caption>mjbalelogogrey</image:caption><image:title>mjbalelogogrey</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-11.png</image:loc><image:caption>greyscalelogohomepage11</image:caption><image:title>greyscalelogohomepage11</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-8-1.png</image:loc><image:caption>greyscalelogo81</image:caption><image:title>greyscalelogo81</image:title></image:image><lastmod>2025-11-03</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/how-inappropriate-use-of-office-365-is-increasing-ndb-exposure</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/wooden%20balls%20with%20technology%20icons%20and%20diagram%20media%20on%20computer%20as%20cloud%20network%20concept.jpeg</image:loc><image:caption>woodenballswithtechnologyiconsanddiagrammediaoncomputerascloudnetworkconcept</image:caption><image:title>woodenballswithtechnologyiconsanddiagrammediaoncomputerascloudnetworkconcept</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/contact-us</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/about-us</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/pci-logo-cirlc.png</image:loc><image:caption>pcilogocirlc</image:caption><image:title>pcilogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/oscp-logo-cirlc.png</image:loc><image:caption>oscplogocirlc</image:caption><image:title>oscplogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/iso-logo-cirlc.png</image:loc><image:caption>isologocirlc</image:caption><image:title>isologocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/cissp-logo-cirlc.png</image:loc><image:caption>cissplogocirlc</image:caption><image:title>cissplogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/2.png</image:loc><image:caption>2</image:caption><image:title>2</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/cism-logo-cirlc.png</image:loc><image:caption>cismlogocirlc</image:caption><image:title>cismlogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/dod-logo-cirlc.png</image:loc><image:caption>dodlogocirlc</image:caption><image:title>dodlogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/3.png</image:loc><image:caption>3</image:caption><image:title>3</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/sabsa-logo-cirlc.png</image:loc><image:caption>sabsalogocirlc</image:caption><image:title>sabsalogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/crest-logo-cirlc.png</image:loc><image:caption>crestlogocirlc</image:caption><image:title>crestlogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/irap-logo-cirlc.png</image:loc><image:caption>iraplogocirlc</image:caption><image:title>iraplogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/1.png</image:loc><image:caption>1</image:caption><image:title>1</image:title></image:image><lastmod>2024-02-29</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/2k-to-avoid-being-another-optus</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/rembefflt.jpg</image:loc><image:caption>rembefflt</image:caption><image:title>rembefflt</image:title></image:image><lastmod>2022-09-30</lastmod></url><url><loc>https://www.securitycentric.com.au/cloud-security-services</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/irap-logo-cirlc.png</image:loc><image:caption>iraplogocirlc</image:caption><image:title>iraplogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/pci-logo-cirlc.png</image:loc><image:caption>pcilogocirlc</image:caption><image:title>pcilogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Abstract%20blue%20text%20background.jpeg</image:loc><image:caption>Abstractbluetextbackground</image:caption><image:title>Abstractbluetextbackground</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/oswe-logo.png</image:loc><image:caption>oswelogo</image:caption><image:title>oswelogo</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Checklist%20mockup%20Cropped.png</image:loc><image:caption>ChecklistmockupCropped</image:caption><image:title>ChecklistmockupCropped</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/iso-logo-cirlc.png</image:loc><image:caption>isologocirlc</image:caption><image:title>isologocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/dod-logo-cirlc.png</image:loc><image:caption>dodlogocirlc</image:caption><image:title>dodlogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/oscp-logo-1.png</image:loc><image:caption>oscplogo1</image:caption><image:title>oscplogo1</image:title></image:image><lastmod>2024-08-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-centric-boosts-operational-and-compliance-maturity-with-cloud-siem</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecCentric_Quote_1920x1080_2%5B66%5D.png</image:loc><image:caption>SecCentricQuote1920x1080266</image:caption><image:title>SecCentricQuote1920x1080266</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-analytics-repurposed-for-covid-19-monitoring</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-20.png</image:loc><image:caption>image20</image:caption><image:title>image20</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/essential-eight-protect-against-cyber-supply-chain-attacks</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Essential%20Eight.png</image:loc><image:caption>EssentialEight</image:caption><image:title>EssentialEight</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2022-03-21</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/bits-of-entropy-the-importance-of-complex-passwords</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Math%20equation%20background.jpeg</image:loc><image:caption>Mathequationbackground</image:caption><image:title>Mathequationbackground</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-10-19</lastmod></url><url><loc>https://www.securitycentric.com.au/careers/cyber-security-lead</loc><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4/medium.jpg</video:thumbnail_loc><video:title>Working at Security Centric</video:title><video:description>What's it like working at Security Centric? Hear about it from the team. </video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4</video:content_loc><video:duration>117</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Learns to Make Cocktails and Dumplings</video:title><video:description>Security Centric learns how to make cocktails and dumplings</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4</video:content_loc><video:duration>50</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes Lawn Bowling</video:title><video:description>Security Centric Goes Lawn Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4</video:content_loc><video:duration>52</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes 10 Pin Bowling</video:title><video:description>Security Centric Goes 10 Pin Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4</video:content_loc><video:duration>61</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Security_Centric27_white.png</image:loc><image:caption>SecurityCentric27white</image:caption><image:title>SecurityCentric27white</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Business%20person%20with%20umbrella%20and%20colorful%20stock%20market%20arrows%20concept.jpeg</image:loc><image:caption>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:caption><image:title>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Young%20design%20team%20having%20a%20meeting%20together%20in%20creative%20office.jpeg</image:loc><image:caption>Youngdesignteamhavingameetingtogetherincreativeoffice</image:caption><image:title>Youngdesignteamhavingameetingtogetherincreativeoffice</image:title></image:image><lastmod>2022-12-29</lastmod></url><url><loc>https://www.securitycentric.com.au/services</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Businessman%20hand%20working%20with%20a%20Cloud%20Computing%20diagram%20on%20the%20new%20computer%20interface%20as%20concept.jpeg</image:loc><image:caption>BusinessmanhandworkingwithaCloudComputingdiagramonthenewcomputerinterfaceasconcept</image:caption><image:title>BusinessmanhandworkingwithaCloudComputingdiagramonthenewcomputerinterfaceasconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_February2019%20Theme/Images/data-security.jpg</image:loc><image:caption>datasecurity</image:caption><image:title>datasecurity</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Close-up%20of%20a%20black%20keyboard.jpeg</image:loc><image:caption>Closeupofablackkeyboard</image:caption><image:title>Closeupofablackkeyboard</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Technician%20walking%20in%20hallway%20of%20server%20room.jpeg</image:loc><image:caption>Technicianwalkinginhallwayofserverroom</image:caption><image:title>Technicianwalkinginhallwayofserverroom</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Business%20team%20having%20video%20conference%20in%20the%20conference%20room.jpeg</image:loc><image:caption>Businessteamhavingvideoconferenceintheconferenceroom</image:caption><image:title>Businessteamhavingvideoconferenceintheconferenceroom</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/hiding-in-plain-sight-preventing-data-exfiltration-via-dns-tunnelling</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Interior%20of%20an%20old%20covered%20bridge%20in%20Watson%20Mill%20State%20Park%2c%20Georgia%2c%20USA..jpeg</image:loc><image:caption>InteriorofanoldcoveredbridgeinWatsonMillStateParkGeorgiaUSA</image:caption><image:title>InteriorofanoldcoveredbridgeinWatsonMillStateParkGeorgiaUSA</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/top-5-risks-a-penetration-test-might-uncover</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/3D%20men%20jumping%20a%20brick%20wall%20isolated%20over%20a%20white%20background.jpeg</image:loc><image:caption>3Dmenjumpingabrickwallisolatedoverawhitebackground</image:caption><image:title>3Dmenjumpingabrickwallisolatedoverawhitebackground</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2018-10-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/the-pspf-and-ism-undergo-major-revisions</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/New%20Instructions%20Concept%20on%20Folder%20Register%20in%20Multicolor%20Card%20Index.%20Closeup%20View.%20Selective%20Focus.-1.jpeg</image:loc><image:caption>NewInstructionsConceptonFolderRegisterinMulticolorCardIndexCloseupViewSelectiveFocus1</image:caption><image:title>NewInstructionsConceptonFolderRegisterinMulticolorCardIndexCloseupViewSelectiveFocus1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/New%20Instructions%20Concept%20on%20Folder%20Register%20in%20Multicolor%20Card%20Index.%20Closeup%20View.%20Selective%20Focus..jpeg</image:loc><image:caption>NewInstructionsConceptonFolderRegisterinMulticolorCardIndexCloseupViewSelectiveFocus</image:caption><image:title>NewInstructionsConceptonFolderRegisterinMulticolorCardIndexCloseupViewSelectiveFocus</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/management-buy-in-part-1-why-you-need-it</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Smiling%20handsome%20businessman%20with%20his%20team%20in%20a%20modern%20office.jpeg</image:loc><image:caption>Smilinghandsomebusinessmanwithhisteaminamodernoffice</image:caption><image:title>Smilinghandsomebusinessmanwithhisteaminamodernoffice</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/careers/solutions-lead-2212</loc><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Learns to Make Cocktails and Dumplings</video:title><video:description>Security Centric learns how to make cocktails and dumplings</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4</video:content_loc><video:duration>50</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes 10 Pin Bowling</video:title><video:description>Security Centric Goes 10 Pin Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4</video:content_loc><video:duration>61</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4/medium.jpg</video:thumbnail_loc><video:title>Working at Security Centric</video:title><video:description>What's it like working at Security Centric? Hear about it from the team. </video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4</video:content_loc><video:duration>117</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes Lawn Bowling</video:title><video:description>Security Centric Goes Lawn Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4</video:content_loc><video:duration>52</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Security_Centric27_white.png</image:loc><image:caption>SecurityCentric27white</image:caption><image:title>SecurityCentric27white</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Young%20design%20team%20having%20a%20meeting%20together%20in%20creative%20office.jpeg</image:loc><image:caption>Youngdesignteamhavingameetingtogetherincreativeoffice</image:caption><image:title>Youngdesignteamhavingameetingtogetherincreativeoffice</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Business%20person%20with%20umbrella%20and%20colorful%20stock%20market%20arrows%20concept.jpeg</image:loc><image:caption>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:caption><image:title>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2022-12-20</lastmod></url><url><loc>https://www.securitycentric.com.au/blog</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/AI-Generated%20Media/Images/An%20image%20of%20the%20Australian%20Government%20introducing%20the%20Cyber%20Security%20Legislative%20Package%202024%20to%20strengthen%20national%20cyber%20security%20posture.jpeg</image:loc><image:caption>AnimageoftheAustralianGovernmentintroducingtheCyberSecurityLegislativePackage2024tostrengthennationalcybersecurityposture</image:caption><image:title>AnimageoftheAustralianGovernmentintroducingtheCyberSecurityLegislativePackage2024tostrengthennationalcybersecurityposture</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Cyber%20Security%20Legislation%20Package%20Review%20.png</image:loc><image:caption>CyberSecurityLegislationPackageReview</image:caption><image:title>CyberSecurityLegislationPackageReview</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Zero%20Trust%20Featured%20Image%201.png</image:loc><image:caption>ZeroTrustFeaturedImage1</image:caption><image:title>ZeroTrustFeaturedImage1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Sash_Vasilevski_csc_840x420.jpg.jpeg</image:loc><image:caption>SashVasilevskicsc840x420jpg</image:caption><image:title>SashVasilevskicsc840x420jpg</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screen%20Shot%202022-03-18%20at%2011.42.29%20am.png</image:loc><image:caption>ScreenShot20220318at114229am</image:caption><image:title>ScreenShot20220318at114229am</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/iso27001.png</image:loc><image:caption>iso27001</image:caption><image:title>iso27001</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/ASD%20Annual%20Cyber%20Thread%20Report%202023-2024.png</image:loc><image:caption>ASDAnnualCyberThreadReport20232024</image:caption><image:title>ASDAnnualCyberThreadReport20232024</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Risk%20Management%20-%20Highway%20Signpost%20on%20Sky%20Background..jpeg</image:loc><image:caption>RiskManagementHighwaySignpostonSkyBackground</image:caption><image:title>RiskManagementHighwaySignpostonSkyBackground</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/MSSP.png</image:loc><image:caption>MSSP</image:caption><image:title>MSSP</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Information%20Asset%20Audit.png</image:loc><image:caption>InformationAssetAudit</image:caption><image:title>InformationAssetAudit</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SME.png</image:loc><image:caption>SME</image:caption><image:title>SME</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Total%20Incidents%20Reported%20to%20ASD%202022%20-%202023.png</image:loc><image:caption>TotalIncidentsReportedtoASD20222023</image:caption><image:title>TotalIncidentsReportedtoASD20222023</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Essential%20Eight.png</image:loc><image:caption>EssentialEight</image:caption><image:title>EssentialEight</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/rembefflt.jpg</image:loc><image:caption>rembefflt</image:caption><image:title>rembefflt</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Critical%20Infrastructure.png</image:loc><image:caption>CriticalInfrastructure</image:caption><image:title>CriticalInfrastructure</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-png-Apr-23-2024-06-16-52-0568-AM.png</image:loc><image:caption>imagepngApr2320240616520568AM</image:caption><image:title>imagepngApr2320240616520568AM</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Threat%20advisory%20-%20Okta.png</image:loc><image:caption>ThreatadvisoryOkta</image:caption><image:title>ThreatadvisoryOkta</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/2021.png</image:loc><image:caption>2021</image:caption><image:title>2021</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecCentric_Quote_1920x1080_2%5B66%5D.png</image:loc><image:caption>SecCentricQuote1920x1080266</image:caption><image:title>SecCentricQuote1920x1080266</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/documentation-provides-security-value</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Benefits%20-%20Business%20Concept.%20Button%20on%20Modern%20Computer%20Keyboard.%203D%20Render..jpeg</image:loc><image:caption>BenefitsBusinessConceptButtononModernComputerKeyboard3DRender</image:caption><image:title>BenefitsBusinessConceptButtononModernComputerKeyboard3DRender</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/threat-advisory-okta-compromise</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Threat%20advisory%20-%20Okta.png</image:loc><image:caption>ThreatadvisoryOkta</image:caption><image:title>ThreatadvisoryOkta</image:title></image:image><lastmod>2022-03-28</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/give-cyber-security-the-attention-it-deserves</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/cyber-security.jpg</image:loc><image:caption>cybersecurity</image:caption><image:title>cybersecurity</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/security.jpg</image:loc><image:caption>security</image:caption><image:title>security</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/wannacry-nothing-new-here-apart-from-a-catchy-name</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/keithurban.png</image:loc><image:caption>keithurban</image:caption><image:title>keithurban</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/wannacry.jpg</image:loc><image:caption>wannacry</image:caption><image:title>wannacry</image:title></image:image><lastmod>2018-10-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/the-bones-of-the-twitter-hack-apply-equally-to-enterprise-systems</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Rich%20Text%20Pasting/unknown-1594881948049.jpeg</image:loc><image:caption>unknown1594881948049</image:caption><image:title>unknown1594881948049</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-07-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/zooms-true-security-posture</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Business%20team%20having%20video%20conference%20in%20the%20conference%20room.jpeg</image:loc><image:caption>Businessteamhavingvideoconferenceintheconferenceroom</image:caption><image:title>Businessteamhavingvideoconferenceintheconferenceroom</image:title></image:image><lastmod>2020-11-13</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/a-security-conscious-cohort-part-1-defining-a-new-norm</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Corporate%20army%20against%20grey%20background.jpeg</image:loc><image:caption>Corporatearmyagainstgreybackground</image:caption><image:title>Corporatearmyagainstgreybackground</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/updates-to-the-iso-27001-certification-standard</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/iso27001.png</image:loc><image:caption>iso27001</image:caption><image:title>iso27001</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/complete-heartbleed-protection-in-under-36-hours-from-discovery</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/heartbleed.png</image:loc><image:caption>heartbleed</image:caption><image:title>heartbleed</image:title></image:image><lastmod>2018-10-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/a-primer-on-single-sign-on</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/wooden%20balls%20with%20technology%20icons%20and%20diagram%20media%20on%20computer%20as%20cloud%20network%20concept.jpeg</image:loc><image:caption>woodenballswithtechnologyiconsanddiagrammediaoncomputerascloudnetworkconcept</image:caption><image:title>woodenballswithtechnologyiconsanddiagrammediaoncomputerascloudnetworkconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-13</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/in-europe-for-gdpr-impressions-comparing-it-to-lessons-from-australias-privacy-act-ndb</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/gdpr-homer.jpg</image:loc><image:caption>gdprhomer</image:caption><image:title>gdprhomer</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/security-basics-do-this-before-buying-the-next-security-product</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/network%20server%20room%20with%20computers%20for%20digital%20tv%20ip%20communications%20and%20internet.jpeg</image:loc><image:caption>networkserverroomwithcomputersfordigitaltvipcommunicationsandinternet</image:caption><image:title>networkserverroomwithcomputersfordigitaltvipcommunicationsandinternet</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/careers</loc><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4/medium.jpg</video:thumbnail_loc><video:title>Working at Security Centric</video:title><video:description>What's it like working at Security Centric? Hear about it from the team. </video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Working%20at%20Security%20Centric.mp4</video:content_loc><video:duration>117</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes 10 Pin Bowling</video:title><video:description>Security Centric Goes 10 Pin Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%2010%20Pin%20Bowling.mp4</video:content_loc><video:duration>61</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Learns to Make Cocktails and Dumplings</video:title><video:description>Security Centric learns how to make cocktails and dumplings</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Cocktails%20&amp;%20Dumplings.mp4</video:content_loc><video:duration>50</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4/medium.jpg</video:thumbnail_loc><video:title>Security Centric Goes Lawn Bowling</video:title><video:description>Security Centric Goes Lawn Bowling</video:description><video:content_loc>https://www.securitycentric.com.au/hubfs/Security%20Centric%20Goes%20Lawn%20Bowling.mp4</video:content_loc><video:duration>52</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Business%20person%20with%20umbrella%20and%20colorful%20stock%20market%20arrows%20concept.jpeg</image:loc><image:caption>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:caption><image:title>Businesspersonwithumbrellaandcolorfulstockmarketarrowsconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2021-11-07</lastmod></url><url><loc>https://www.securitycentric.com.au/services/vciso</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/ciso-as-a-service%20Security%20Centric.jpg</image:loc><image:caption>cisoasaserviceSecurityCentric</image:caption><image:title>cisoasaserviceSecurityCentric</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://www.securitycentric.com.au/protect/people</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-12-10</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/microsoft-365-breaches-as-preventable-as-they-are-common</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-06-07</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/log4shell-java-logging-library-exploited</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Close%20up%20of%20blue%20Printed%20Circuit%20Board.jpeg</image:loc><image:caption>CloseupofbluePrintedCircuitBoard</image:caption><image:title>CloseupofbluePrintedCircuitBoard</image:title></image:image><lastmod>2021-12-15</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/christmas-turkeys-and-cyber-security-arent-that-dissimilar</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Adult%20male%20(foreground)%20and%20female%20(background)%20wild%20turkeys%20(binomial%20name%20Meleagris%20gallopavo)%20crossing%20a%20grassy%20area%20in%20opposite%20directions%2c%20Warrenville%2c%20Illinois%2c%20in%20spring%20(foreground%20focus).jpeg</image:loc><image:caption>AdultmaleforegroundandfemalebackgroundwildturkeysbinomialnameMeleagrisgallopavocrossingagrassyareainoppositedirectionsWarrenvilleIllinoisinspringforegroundfocus</image:caption><image:title>AdultmaleforegroundandfemalebackgroundwildturkeysbinomialnameMeleagrisgallopavocrossingagrassyareainoppositedirectionsWarrenvilleIllinoisinspringforegroundfocus</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Receding%20pattern%20of%20chain-link%20fence%20(shallow%20depth%20of%20field)%2c%20for%20themes%20of%20dependability%2c%20safety%2c%20protection%2c%20and%20transparency.jpeg</image:loc><image:caption>Recedingpatternofchainlinkfenceshallowdepthoffieldforthemesofdependabilitysafetyprotectionandtransparency</image:caption><image:title>Recedingpatternofchainlinkfenceshallowdepthoffieldforthemesofdependabilitysafetyprotectionandtransparency</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/services/managed-soc</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/MDR%2020220928m.png</image:loc><image:caption>MDR20220928m</image:caption><image:title>MDR20220928m</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/adam-nowakowski-MFms-wkv3Ow-unsplash.jpg</image:loc><image:caption>adamnowakowskiMFmswkv3Owunsplash</image:caption><image:title>adamnowakowskiMFmswkv3Owunsplash</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/Security_Centric21_450.png</image:loc><image:caption>SecurityCentric21450</image:caption><image:title>SecurityCentric21450</image:title></image:image><lastmod>2025-01-08</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-updates-to-the-critical-infrastructure-bill</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Critical%20Infrastructure.png</image:loc><image:caption>CriticalInfrastructure</image:caption><image:title>CriticalInfrastructure</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/formula-1-cyber-vendors-and-selling-fences</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/1.jpg</image:loc><image:caption>1</image:caption><image:title>1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/4.jpg</image:loc><image:caption>4</image:caption><image:title>4</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/F21EBEBC-D32D-41A1-B196-DDA14DE537D7.jpeg</image:loc><image:caption>F21EBEBCD32D41A1B196DDA14DE537D7</image:caption><image:title>F21EBEBCD32D41A1B196DDA14DE537D7</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/95E517A1-BF82-46D9-A207-827D7101B6C4.jpeg</image:loc><image:caption>95E517A1BF8246D9A207827D7101B6C4</image:caption><image:title>95E517A1BF8246D9A207827D7101B6C4</image:title></image:image><lastmod>2019-03-15</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/why-cyber-insurance-cannot-replace-a-mature-security-posture</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Man%20drinking%20beer%20while%20driving%20in%20his%20car.jpeg</image:loc><image:caption>Mandrinkingbeerwhiledrivinginhiscar</image:caption><image:title>Mandrinkingbeerwhiledrivinginhiscar</image:title></image:image><lastmod>2024-03-04</lastmod></url><url><loc>https://www.securitycentric.com.au/services/vulnerability-management</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-25</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/ransomware-2020-costs-risks-realities</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Screen%20Shot%202020-12-02%20at%201.18.10%20pm.png</image:loc><image:caption>ScreenShot20201202at11810pm</image:caption><image:title>ScreenShot20201202at11810pm</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/services/infosec-risk-maturity-assessment</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_February2019%20Theme/Images/data-security.jpg</image:loc><image:caption>datasecurity</image:caption><image:title>datasecurity</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/maturity-process.png</image:loc><image:caption>maturityprocess</image:caption><image:title>maturityprocess</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-15</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/report-2022-state-email-security</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/AI-Generated%20Media/Images/The%20image%20depicts%20a%20modern%20office%20environment%20with%20a%20sleek%20hightech%20aesthetic%20In%20the%20foreground%20a%20diverse%20group%20of%20IT%20professionals%20is%20engaged%20in%20a%20discussion%20around%20a%20large%20digital%20screen%20displaying%20statistics%20and%20graphs%20related%20to%20cybersecurity%20thr.png</image:loc><image:caption>TheimagedepictsamodernofficeenvironmentwithasleekhightechaestheticIntheforegroundadiversegroupofITprofessionalsisengagedinadiscussionaroundalargedigitalscreendisplayingstatisticsandgraphsrelatedtocybersecuritythr</image:caption><image:title>TheimagedepictsamodernofficeenvironmentwithasleekhightechaestheticIntheforegroundadiversegroupofITprofessionalsisengagedinadiscussionaroundalargedigitalscreendisplayingstatisticsandgraphsrelatedtocybersecuritythr</image:title></image:image><lastmod>2025-09-25</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/secure-remote-work</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Cisco%20Secure%20Remote%20Work%20-%20Industries%202.png</image:loc><image:caption>CiscoSecureRemoteWorkIndustries2</image:caption><image:title>CiscoSecureRemoteWorkIndustries2</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/claudio-schwarz-purzlbaum-bRejy-aKxv8-unsplash.jpg</image:loc><image:caption>claudioschwarzpurzlbaumbRejyaKxv8unsplash</image:caption><image:title>claudioschwarzpurzlbaumbRejyaKxv8unsplash</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Cisco%20Secure%20Remote%20Work%20-%20Industries%201.png</image:loc><image:caption>CiscoSecureRemoteWorkIndustries1</image:caption><image:title>CiscoSecureRemoteWorkIndustries1</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/acsc-essential-eight</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Close-up%20dark%20keyboard%20with%20cyber%20security%20concept.jpeg</image:loc><image:caption>Closeupdarkkeyboardwithcybersecurityconcept</image:caption><image:title>Closeupdarkkeyboardwithcybersecurityconcept</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2024-10-14</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/the-dangers-of-outsourced-development-and-the-antihack-function</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/image-8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/why-multi-factor-authentication-is-worthwhile</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/pressing%20the%20code%20on%20a%20house%20alarm.jpeg</image:loc><image:caption>pressingthecodeonahousealarm</image:caption><image:title>pressingthecodeonahousealarm</image:title></image:image><lastmod>2018-10-16</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-security-legislation-package-review</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Cyber%20Security%20Legislation%20Package%20Review%20.png</image:loc><image:caption>CyberSecurityLegislationPackageReview</image:caption><image:title>CyberSecurityLegislationPackageReview</image:title></image:image><lastmod>2025-02-24</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/in-the-news-why-zero-trust-is-critical-in-the-modern-hybrid-workplace</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Zero%20Trust%20Featured%20Image%201.png</image:loc><image:caption>ZeroTrustFeaturedImage1</image:caption><image:title>ZeroTrustFeaturedImage1</image:title></image:image><lastmod>2021-12-28</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/cyber-strategy-2021</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/threats%20in%2060%20minutes.jpg</image:loc><image:caption>threatsin60minutes</image:caption><image:title>threatsin60minutes</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/2021.png</image:loc><image:caption>2021</image:caption><image:title>2021</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/knowing-your-current-risk-profile</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/cyber%20security%20camera.jpg</image:loc><image:caption>cybersecuritycamera</image:caption><image:title>cybersecuritycamera</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/cyber%20protection.jpg</image:loc><image:caption>cyberprotection</image:caption><image:title>cyberprotection</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><lastmod>2018-11-22</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/dbir-2021</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/DBIR%20Image.png</image:loc><image:caption>DBIRImage</image:caption><image:title>DBIRImage</image:title></image:image><lastmod>2024-02-12</lastmod></url><url><loc>https://www.securitycentric.com.au/penetration-testing</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-4.png</image:loc><image:caption>greyscalelogohomepage4</image:caption><image:title>greyscalelogohomepage4</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-15.png</image:loc><image:caption>greyscalelogohomepage15</image:caption><image:title>greyscalelogohomepage15</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/CREST%20Member%20Badge%202025%20Solid%20Background%20(1).png</image:loc><image:caption>CRESTMemberBadge2025SolidBackground1</image:caption><image:title>CRESTMemberBadge2025SolidBackground1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/mjbale-logo-grey.png</image:loc><image:caption>mjbalelogogrey</image:caption><image:title>mjbalelogogrey</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-12.png</image:loc><image:caption>greyscalelogohomepage12</image:caption><image:title>greyscalelogohomepage12</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-7-1.png</image:loc><image:caption>greyscalelogo71</image:caption><image:title>greyscalelogo71</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-7.png</image:loc><image:caption>greyscalelogohomepage7</image:caption><image:title>greyscalelogohomepage7</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Checklist%20mockup%20Cropped.png</image:loc><image:caption>ChecklistmockupCropped</image:caption><image:title>ChecklistmockupCropped</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-6-1.png</image:loc><image:caption>greyscalelogo61</image:caption><image:title>greyscalelogo61</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/dod-logo-cirlc.png</image:loc><image:caption>dodlogocirlc</image:caption><image:title>dodlogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/custom-video-thumbnails/Working%20at%20Security%20Centric-thumb-1.jpeg</image:loc><image:caption>WorkingatSecurityCentricthumb1</image:caption><image:title>WorkingatSecurityCentricthumb1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-14.png</image:loc><image:caption>greyscalelogohomepage14</image:caption><image:title>greyscalelogohomepage14</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-5-1.png</image:loc><image:caption>greyscalelogo51</image:caption><image:title>greyscalelogo51</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/pci-logo-cirlc.png</image:loc><image:caption>pcilogocirlc</image:caption><image:title>pcilogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-16.png</image:loc><image:caption>greyscalelogohomepage16</image:caption><image:title>greyscalelogohomepage16</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/greyscale-logo-8-1.png</image:loc><image:caption>greyscalelogo81</image:caption><image:title>greyscalelogo81</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/irap-logo-cirlc.png</image:loc><image:caption>iraplogocirlc</image:caption><image:title>iraplogocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Homepage%20Logos/greyscale-logo-homepage-11.png</image:loc><image:caption>greyscalelogohomepage11</image:caption><image:title>greyscalelogohomepage11</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/oswe-logo.png</image:loc><image:caption>oswelogo</image:caption><image:title>oswelogo</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/oscp-logo-1.png</image:loc><image:caption>oscplogo1</image:caption><image:title>oscplogo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/iso-logo-cirlc.png</image:loc><image:caption>isologocirlc</image:caption><image:title>isologocirlc</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Cyber%20Security%20Analyst%20v2.png</image:loc><image:caption>CyberSecurityAnalystv2</image:caption><image:title>CyberSecurityAnalystv2</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Abstract%20blue%20text%20background.jpeg</image:loc><image:caption>Abstractbluetextbackground</image:caption><image:title>Abstractbluetextbackground</image:title></image:image><lastmod>2026-02-13</lastmod></url><url><loc>https://www.securitycentric.com.au/blog/intro-to-injection-vulnerabilities-and-the-owasp-top-10</loc><image:image><image:loc>https://www.securitycentric.com.au/hubfs/SecurityCentric_August2018/Images/logo%20(1).png</image:loc><image:caption>logo1</image:caption><image:title>logo1</image:title></image:image><image:image><image:loc>https://www.securitycentric.com.au/hubfs/Stock%20images/Abstract%20blue%20text%20background.jpeg</image:loc><image:caption>Abstractbluetextbackground</image:caption><image:title>Abstractbluetextbackground</image:title></image:image><lastmod>2024-03-04</lastmod></url></urlset>