<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://info.thirdpartytrust.com/blog/how-is-cyber-shaping-the-insurance-industry</loc><lastmod>2018-04-23</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/tptinterviewrociobaeza</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/Untitled.png</image:loc><image:caption>Untitled</image:caption><image:title>Untitled</image:title></image:image><lastmod>2018-03-27</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/who-will-be-in-charge-of-iot-security</loc><lastmod>2017-06-19</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/creating-an-industry-standard-a-collaborative-approach-to-vendor-risk</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/eventblog1%20(1).png</image:loc><image:caption>eventblog11</image:caption><image:title>eventblog11</image:title></image:image><lastmod>2019-10-09</lastmod></url><url><loc>https://info.thirdpartytrust.com/pressreleases/global-resilience-federation-and-thirdpartytrust-establish-partnership-allowing-members-to-peer-source-vendor-risk-assessments</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/GRFandOthers.png</image:loc><image:caption>GRFandOthers</image:caption><image:title>GRFandOthers</image:title></image:image><lastmod>2018-10-23</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/at-morningstar-cybersecurity-summit-experts-discuss-best-practices-in-vendor-management</loc><lastmod>2017-07-27</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/guest-blog-by-todd-tressler-tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week</loc><lastmod>2018-05-23</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/7-risks-to-data-in-the-third-party-eco-system</loc><lastmod>2017-08-21</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/experts-share-their-most-important-metrics-for-assessing-vendor-risk</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/Dashboard-%20Heat%20Map.jpeg</image:loc><image:caption>DashboardHeatMap</image:caption><image:title>DashboardHeatMap</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/changing-landscape-of-cybersecurity-regulation</loc><lastmod>2017-07-21</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog</loc><lastmod>2021-12-10</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/new-yorks-dfs-cybersecurity-regulations-in-a-nutshell</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/MySignature.png</image:loc><image:caption>MySignature</image:caption><image:title>MySignature</image:title></image:image><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/NYDSF.png</image:loc><image:caption>NYDSF</image:caption><image:title>NYDSF</image:title></image:image><lastmod>2017-03-21</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/panel-cybersecurity-manufacturing-in-the-digital-era</loc><lastmod>2017-09-11</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/whats-going-to-be-hard-about-moving-cyber-initiatives</loc><lastmod>2018-05-29</lastmod></url><url><loc>https://info.thirdpartytrust.com/pressreleases/shared-assessments-and-thirdpartytrust-brings-the-sig-to-the-masses</loc><lastmod>2018-07-31</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/essential-security-software-for-businesses</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/Figure%203.jpg</image:loc><image:caption>Figure3</image:caption><image:title>Figure3</image:title></image:image><lastmod>2017-10-02</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/vendor_risk_and_the_regaulatory_response</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/20160704PHT35022_original.jpg</image:loc><image:caption>20160704PHT35022original</image:caption><image:title>20160704PHT35022original</image:title></image:image><lastmod>2017-07-18</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/data-breaches-in-2017-how-is-this-affecting-your-security/risk-strategy</loc><lastmod>2017-06-28</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/key-essential-designing-the-process-around-tprm</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/computer%2Bhands2sm.png</image:loc><image:caption>computerhands2sm</image:caption><image:title>computerhands2sm</image:title></image:image><lastmod>2019-12-13</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/evolvesecurityevent</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/3PT.png</image:loc><image:caption>3PT</image:caption><image:title>3PT</image:title></image:image><lastmod>2017-07-31</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/data-is-the-new-oil-and-breaches-are-the-new-spills-so-where-is-the-leak</loc><lastmod>2018-07-06</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/keynote-panel-rethinking-how-to-build-trust-in-the-vendor-eco-system</loc><lastmod>2018-02-09</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/guest-blog-by-mike-baier-on-gdpr</loc><lastmod>2018-04-05</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/emerging-technology-unknown-risks-depaul-universitys-fourth-annual-cyber-risk-conference-part-one</loc><lastmod>2017-12-04</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/2017-vendor-risk-management-benchmark-study-protiviti-shared-assessments</loc><lastmod>2017-11-21</lastmod></url><url><loc>https://info.thirdpartytrust.com/pressreleases/thirdpartytrustandargosrisk</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/ArgosRisk.png</image:loc><image:caption>ArgosRisk</image:caption><image:title>ArgosRisk</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/emerging-technology-unknown-risks-depaul-universitys-fourth-annual-cyber-risk-conference-part-two</loc><lastmod>2017-12-20</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/bits-sig-pdf-reports-available-on-thirdpartytrust</loc><lastmod>2017-06-02</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/owasp-chicago-february-meetup-summary-and-presentations</loc><lastmod>2018-03-05</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/ponemoninstitutepart1</loc><lastmod>2017-10-24</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/argos-risk-and-thirdpartytrust-partnership</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/third_party_trust_320wide.png</image:loc><image:caption>thirdpartytrust320wide</image:caption><image:title>thirdpartytrust320wide</image:title></image:image><lastmod>2017-04-11</lastmod></url><url><loc>https://info.thirdpartytrust.com/pressreleases</loc><lastmod>2021-12-10</lastmod></url><url><loc>https://info.thirdpartytrust.com/blog/whpolicy_digital_supply_chain</loc><image:image><image:loc>https://2575983.fs1.hubspotusercontent-na1.net/hubfs/2575983/JSMiniDeckImages.png</image:loc><image:caption>JSMiniDeckImages</image:caption><image:title>JSMiniDeckImages</image:title></image:image><lastmod>2017-05-19</lastmod></url></urlset>