<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://madsecurity.com/cmmc-2.0-audit-process</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Pre-Audit%20Self-Attestation.png</image:loc><image:caption>CMMCAuditProcessPreAuditSelfAttestation</image:caption><image:title>CMMCAuditProcessPreAuditSelfAttestation</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Black%20Yellow%20and%20Blue%20Bold%20Modern%20Logistics%20Presentation(2).png</image:loc><image:caption>BlackYellowandBlueBoldModernLogisticsPresentation2</image:caption><image:title>BlackYellowandBlueBoldModernLogisticsPresentation2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(3).png</image:loc><image:caption>CMMCWebPageSectionGraphics3</image:caption><image:title>CMMCWebPageSectionGraphics3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Third-Party%20Assessment.png</image:loc><image:caption>CMMCAuditProcessThirdPartyAssessment</image:caption><image:title>CMMCAuditProcessThirdPartyAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Evidence-Based%20Assessment.png</image:loc><image:caption>CMMCAuditProcessEvidenceBasedAssessment</image:caption><image:title>CMMCAuditProcessEvidenceBasedAssessment</image:title></image:image><lastmod>2026-03-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/navigating-the-waters-of-maritime-cybersecurity-regulation</loc><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(3)-3.png</image:loc><image:caption>Untitleddesign33</image:caption><image:title>Untitleddesign33</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-Jun-24-2024-03-44-37-7362-PM.png</image:loc><image:caption>Untitleddesign2Jun2420240344377362PM</image:caption><image:title>Untitleddesign2Jun2420240344377362PM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Navigating%20the%20Waters%20of%20Maritime%20Cybersecurity%20Regulation:%20Overcoming%20Challenges%20for%20a%20Secure%20Future%20Featured%20Image.png</image:loc><image:caption>NavigatingtheWatersofMaritimeCybersecurityRegulationOvercomingChallengesforaSecureFuture</image:caption><image:title>NavigatingtheWatersofMaritimeCybersecurityRegulationOvercomingChallengesforaSecureFutureFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(1)-Jun-17-2024-06-00-08-7779-AM.png</image:loc><image:caption>Untitleddesign1Jun1720240600087779AM</image:caption><image:title>Untitleddesign1Jun1720240600087779AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(1)-Jun-24-2024-03-38-34-5813-PM.png</image:loc><image:caption>Untitleddesign1Jun2420240338345813PM</image:caption><image:title>Untitleddesign1Jun2420240338345813PM</image:title></image:image><lastmod>2025-09-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/common-confusion-between-patch-and-vulnerability-management</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Common%20Confusion%20between%20Patch%20and%20Vulnerability%20Management%20in%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>CommonConfusionbetweenPatchandVulnerabilityManagementinCMMCCompliancenbsp</image:caption><image:title>CommonConfusionbetweenPatchandVulnerabilityManagementinCMMCComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cmmc2-levels-stv2.png</image:loc><image:caption>cmmc2levelsstv2</image:caption><image:title>cmmc2levelsstv2</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-data-flow-diagrams-for-cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1hh-768x509-1.jpg</image:loc><image:caption>MADSECBlogImages1hh768x5091</image:caption><image:title>MADSECBlogImages1hh768x5091</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Sample%20CUI%20Data%20Flow%20Diagram.png</image:loc><image:caption>SampleCUIDataFlowDiagram</image:caption><image:title>SampleCUIDataFlowDiagram</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Data%20Flow%20Diagram%20DFD.jpg</image:loc><image:caption>DataFlowDiagramDFD</image:caption><image:title>DataFlowDiagramDFD</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Example%20CUI%20Data%20Flow.jpg</image:loc><image:caption>ExampleCUIDataFlow</image:caption><image:title>ExampleCUIDataFlow</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Example%20Network%20Diagram.jpg</image:loc><image:caption>ExampleNetworkDiagram</image:caption><image:title>ExampleNetworkDiagram</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20Data%20Flow%20Diagrams%20for%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>UnderstandingDataFlowDiagramsforCMMCCompliance</image:caption><image:title>UnderstandingDataFlowDiagramsforCMMCComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Data%20Flow.jpg</image:loc><image:caption>DataFlow</image:caption><image:title>DataFlow</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Challenges.jpg</image:loc><image:caption>Challenges</image:caption><image:title>Challenges</image:title></image:image><lastmod>2025-12-02</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/who-is-responsible-for-protecting-controlled-unclassified-information</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(4).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget4</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(1).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO1</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(18)-3.png</image:loc><image:caption>MADSECWebsiteImages183</image:caption><image:title>MADSECWebsiteImages183</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Who%20Is%20Responsible%20for%20Protecting%20Controlled%20Unclassified%20Information.png</image:loc><image:caption>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:caption><image:title>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:title></image:image><lastmod>2026-03-03</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-scoping-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images.png</image:loc><image:caption>MADSECHubSpotBlogImages</image:caption><image:title>MADSECHubSpotBlogImages</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1).png</image:loc><image:caption>MADSECHubSpotBlogImages1</image:caption><image:title>MADSECHubSpotBlogImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Scoping%20Made%20Simple%20%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20July%202025%20Featured%20Image.png</image:loc><image:caption>CMMCScopingMadeSimpleMADSecurityTownHallRecapJuly2025</image:caption><image:title>CMMCScopingMadeSimpleMADSecurityTownHallRecapJuly2025FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2026-02-09</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/prioritizing-cybersecurity-vulnerabilities-nist-dfars-cmmc</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Prioritizing%20Cybersecurity%20Vulnerabilities%20A%20Comprehensive%20Guide%20for%20Staying%20Compliant%20with%20NIST%2c%20DFARS%2c%20and%20CMMC%20%20%20(3).png</image:loc><image:caption>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC3</image:caption><image:title>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Prioritizing%20Cybersecurity%20Vulnerabilities:%20A%20Comprehensive%20Guide%20for%20Staying%20Compliant%20Featured%20Image.png</image:loc><image:caption>PrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliant</image:caption><image:title>PrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Prioritizing%20Cybersecurity%20Vulnerabilities%20A%20Comprehensive%20Guide%20for%20Staying%20Compliant%20with%20NIST%2c%20DFARS%2c%20and%20CMMC%20%20%20(4).png</image:loc><image:caption>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC4</image:caption><image:title>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Prioritizing%20Cybersecurity%20Vulnerabilities%20A%20Comprehensive%20Guide%20for%20Staying%20Compliant%20with%20NIST%2c%20DFARS%2c%20and%20CMMC%20%20%20(5).png</image:loc><image:caption>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC5</image:caption><image:title>MADSECFTIMAGEPrioritizingCybersecurityVulnerabilitiesAComprehensiveGuideforStayingCompliantwithNISTDFARSandCMMC5</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-nist-800-171-ssp-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(1).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP1</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(2).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(4).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP4</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(5).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP5</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(2).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP2</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20-1.png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP1</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(6).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP6</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Building%20an%20Effective%20System%20Security%20Plan%20(SSP)%20MAD%20Security.png</image:loc><image:caption>BuildinganEffectiveSystemSecurityPlanSSPMADSecurity</image:caption><image:title>BuildinganEffectiveSystemSecurityPlanSSPMADSecurity</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(7).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP7</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Building%20an%20Effective%20CMMCNIST%20SP%20800-171%20System%20Security%20Plan%20(SSP)%20%20(8).png</image:loc><image:caption>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP8</image:caption><image:title>MADSECFTIMAGEBuildinganEffectiveCMMCNISTSP800171SystemSecurityPlanSSP8</image:title></image:image><lastmod>2025-07-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/insider-threats-cmmc-compliance-dod-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Insider%20Threats%20and%20CMMC%20-%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant%20(1).png</image:loc><image:caption>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:caption><image:title>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Insider%20Threats%20and%20CMMC%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant.png</image:loc><image:caption>InsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliantMADSecurity</image:caption><image:title>InsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/best-practices-for-managing-software-vulnerabilities</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Best%20Practices%20for%20Managing%20Software%20Vulnerabilities%20Featured%20Image.png</image:loc><image:caption>BestPracticesforManagingSoftwareVulnerabilities</image:caption><image:title>BestPracticesforManagingSoftwareVulnerabilitiesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/case-study/design-interactive</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-assessment-preparation-using-soc-data</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(3).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence3</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20Featured%20Image.png</image:loc><image:caption>CMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidenceFeaturedImage</image:caption><image:title>CMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidenceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(2).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(1).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence1</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(4).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence4</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence4</image:title></image:image><lastmod>2025-09-02</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/recognizing-controlled-unclassified-information-cui-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%204.jpg</image:loc><image:caption>MadSecBlog4</image:caption><image:title>MadSecBlog4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%209.jpg</image:loc><image:caption>MadSecBlog9</image:caption><image:title>MadSecBlog9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%208.jpg</image:loc><image:caption>MadSecBlog8</image:caption><image:title>MadSecBlog8</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%202.jpg</image:loc><image:caption>MadSecBlog2</image:caption><image:title>MadSecBlog2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20to%20Recognize%20Controlled%20Unclassified%20Information%20(CUI):%20A%20Guide%20for%20Government%20Contractors%20Featured%20Image.png</image:loc><image:caption>HowtoRecognizeControlledUnclassifiedInformationCUIAGuideforGovernmentContractors</image:caption><image:title>HowtoRecognizeControlledUnclassifiedInformationCUIAGuideforGovernmentContractorsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%205.jpg</image:loc><image:caption>MadSecBlog5</image:caption><image:title>MadSecBlog5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%201.jpg</image:loc><image:caption>MadSecBlog1</image:caption><image:title>MadSecBlog1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%206.jpg</image:loc><image:caption>MadSecBlog6</image:caption><image:title>MadSecBlog6</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/overcome-lack-of-cybersecurity-expertise</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Overcome%20Lack%20of%20Cybersecurity%20Expertise%20by%20Partnering%20with%20an%20MSSP%20Featured%20Image.png</image:loc><image:caption>OvercomeLackofCybersecurityExpertisebyPartneringwithanMSSP</image:caption><image:title>OvercomeLackofCybersecurityExpertisebyPartneringwithanMSSPFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-enclaves-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Enclaves:%20A%20Comprehensive%20Overview%20Featured%20Image.png</image:loc><image:caption>CMMCEnclavesAComprehensiveOverview</image:caption><image:title>CMMCEnclavesAComprehensiveOverviewFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-8-qibhyd15zwxf0hweennham2u6tp848ioxjqn24b0kg-1.png</image:loc><image:caption>MADSECBlogImages8qibhyd15zwxf0hweennham2u6tp848ioxjqn24b0kg1</image:caption><image:title>MADSECBlogImages8qibhyd15zwxf0hweennham2u6tp848ioxjqn24b0kg1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-9-qibhxolcgalqtmt15wnlfqto84xv887t8ahfi82n1o-1.png</image:loc><image:caption>MADSECBlogImages9qibhxolcgalqtmt15wnlfqto84xv887t8ahfi82n1o1</image:caption><image:title>MADSECBlogImages9qibhxolcgalqtmt15wnlfqto84xv887t8ahfi82n1o1</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/choosing-right-cyso-maritime-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Designating%20Your%20Cybersecurity%20Officer%20(CySO)%20Why%20Choosing%20the%20Right%20Leader%20Matters%20for%20Maritime%20Compliance%20Featured%20Image.png</image:loc><image:caption>DesignatingYourCybersecurityOfficerCySOWhyChoosingtheRightLeaderMattersforMaritimeCompliance</image:caption><image:title>DesignatingYourCybersecurityOfficerCySOWhyChoosingtheRightLeaderMattersforMaritimeComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(2)-2.png</image:loc><image:caption>MADSECHubSpotBlogImages22</image:caption><image:title>MADSECHubSpotBlogImages22</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-4.png</image:loc><image:caption>MADSECHubSpotBlogImages14</image:caption><image:title>MADSECHubSpotBlogImages14</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-4.png</image:loc><image:caption>MADSECHubSpotBlogImages4</image:caption><image:title>MADSECHubSpotBlogImages4</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://madsecurity.com/cmmc-mad-security</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics1</image:caption><image:title>CMMCWebPageSectionGraphics1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(2)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics21</image:caption><image:title>CMMCWebPageSectionGraphics21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(4)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics41</image:caption><image:title>CMMCWebPageSectionGraphics41</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(3)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics31</image:caption><image:title>CMMCWebPageSectionGraphics31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/What%20is%20CMMC.png</image:loc><image:caption>WhatisCMMC</image:caption><image:title>WhatisCMMC</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/expertise%20you%20can%20trust.png</image:loc><image:caption>expertiseyoucantrust</image:caption><image:title>expertiseyoucantrust</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/partner%20with%20MAD%20Security%20CMMC%20MSP%20MSSP.png</image:loc><image:caption>partnerwithMADSecurityCMMCMSPMSSP</image:caption><image:title>partnerwithMADSecurityCMMCMSPMSSP</image:title></image:image><lastmod>2026-03-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/hot-button-cybersecurity-issues-2018</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Hot%20Button%20Cybersecurity%20Issues%202018%20Featured%20Image.png</image:loc><image:caption>HotButtonCybersecurityIssues2018</image:caption><image:title>HotButtonCybersecurityIssues2018FeaturedImage</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-compliance-key-controls-best-practices</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/sigmund-Im_cQ6hQo10-unsplash.jpg</image:loc><image:caption>sigmundImcQ6hQo10unsplash</image:caption><image:title>sigmundImcQ6hQo10unsplash</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Why%20Historical%20Tracking%20is%20Critical%20for%20CMMC%20Compliance.jpg</image:loc><image:caption>WhyHistoricalTrackingisCriticalforCMMCCompliance</image:caption><image:title>WhyHistoricalTrackingisCriticalforCMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Critical%20CMMC%20Control%20Evidence%20Auditors%20Always%20Request%20Ensuring%20Historical%20Evidence%20for%20Compliance%20Featured%20Image.png</image:loc><image:caption>CriticalCMMCControlEvidenceAuditorsAlwaysRequestEnsuringHistoricalEvidenceforCompliance</image:caption><image:title>CriticalCMMCControlEvidenceAuditorsAlwaysRequestEnsuringHistoricalEvidenceforComplianceFeaturedImage</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/phishing-protections</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Phishing%20Protections%20Featured%20Image.png</image:loc><image:caption>PhishingProtections</image:caption><image:title>PhishingProtectionsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/comprehensive-cybersecurity-defense-contracting-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/6-300x300.png</image:loc><image:caption>6300x300</image:caption><image:title>6300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/4-300x300.png</image:loc><image:caption>4300x300</image:caption><image:title>4300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/2-2-300x300.png</image:loc><image:caption>22300x300</image:caption><image:title>22300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/5-300x300.png</image:loc><image:caption>5300x300</image:caption><image:title>5300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/National-Nurses-Day-2-1024x533.png</image:loc><image:caption>NationalNursesDay21024x533</image:caption><image:title>NationalNursesDay21024x533</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/1-1-300x300.png</image:loc><image:caption>11300x300</image:caption><image:title>11300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/7-300x300.png</image:loc><image:caption>7300x300</image:caption><image:title>7300x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/Photo-3-e1684396929520.png</image:loc><image:caption>Photo3e1684396929520</image:caption><image:title>Photo3e1684396929520</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/3-300x300.png</image:loc><image:caption>3300x300</image:caption><image:title>3300x300</image:title></image:image><lastmod>2024-11-06</lastmod></url><url><loc>https://madsecurity.com/case-study/kuder</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/dod-memo-cmmc-level-2-certification-requirements</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/DoD%20Memo%20Clarifies%20CMMC%20Level%202%20Requirements%20What%20Defense%20Contractors%20Need%20to%20Know%20Featured%20Image.png</image:loc><image:caption>DoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow</image:caption><image:title>DoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnowFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20DoD%20Memo%20Clarifies%20CMMC%20Level%202%20Requirements%20What%20Defense%20Contractors%20Need%20to%20Know%20(3).png</image:loc><image:caption>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow3</image:caption><image:title>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20DoD%20Memo%20Clarifies%20CMMC%20Level%202%20Requirements%20What%20Defense%20Contractors%20Need%20to%20Know%20(2).png</image:loc><image:caption>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow2</image:caption><image:title>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(23).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages23</image:caption><image:title>MADSECCMMCAssessmentGuideImages23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20DoD%20Memo%20Clarifies%20CMMC%20Level%202%20Requirements%20What%20Defense%20Contractors%20Need%20to%20Know%20(1).png</image:loc><image:caption>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow1</image:caption><image:title>MADSECFTIMAGEDoDMemoClarifiesCMMCLevel2RequirementsWhatDefenseContractorsNeedtoKnow1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/data-sheets</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_565722295.jpg</image:loc><image:caption>shutterstock565722295</image:caption><image:title>shutterstock565722295</image:title></image:image><lastmod>2025-10-11</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/dfars-clause-renumbering-under-the-cmmc-deviation-what-contractors-need-to-know</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/DFARS%20Clause%20Renumbering%20Under%20the%20CMMC%20Deviation%20What%20Contractors%20Need%20to%20Know.webp</image:loc><image:caption>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:caption><image:title>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(1)-3.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation13</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(5).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO5</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-incident-response-lifecycle</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Incident%20Response-%20An%20Integral%20Part%20of%20the%20CMMC%202.0%20Lifecycle%20%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>IncidentResponseAnIntegralPartoftheCMMC20Lifecycle</image:caption><image:title>IncidentResponseAnIntegralPartoftheCMMC20LifecycleBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/3-3.png</image:loc><image:caption>33</image:caption><image:title>33</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://madsecurity.com/case-study/iowa-solutions</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/nist-800-171-leveraging-an-mssp-for-compliance-frameworks</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/NIST%20800-171%20Leveraging%20an%20MSSP%20for%20Compliance%20Frameworks%20Featured%20Image.png</image:loc><image:caption>NIST800171LeveraginganMSSPforComplianceFrameworks</image:caption><image:title>NIST800171LeveraginganMSSPforComplianceFrameworksFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/LinkedIn-Phis-2-1.png</image:loc><image:caption>LinkedInPhis21</image:caption><image:title>LinkedInPhis21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/LinkedIN-Phish-1.png</image:loc><image:caption>LinkedINPhish1</image:caption><image:title>LinkedINPhish1</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/the-cmmc-countdown-preparing-for-2026-requirements-mad-security-town-hall-recap-january-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(2).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget2</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(2).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO2</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/The%20CMMC%20Countdown%20Preparing%20for%202026%20Requirements%20%E2%80%93%20January%202026-1.png</image:loc><image:caption>TheCMMCCountdownPreparingfor2026RequirementsJanuary20261</image:caption><image:title>TheCMMCCountdownPreparingfor2026RequirementsJanuary20261</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><lastmod>2026-01-22</lastmod></url><url><loc>https://madsecurity.com/webinars</loc><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%20%20Scoping%20Your%20CMMC%20Environment%20How%20to%20Define%20Your%20Boundary%2c%20Protect%20CUI%2c%20and%20Simplify%20Compliance-20250717_193009-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>Cybersecurity Town Hall  Scoping Your CMMC Environment How to Define Your Boundary, Protect CUI, and Simplify Compliance-20250717_193009-Meeting Recording</video:title><video:description>Cybersecurity Town Hall  Scoping Your CMMC Environment How to Define Your Boundary, Protect CUI, and Simplify Compliance-20250717_193009-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%20%20Scoping%20Your%20CMMC%20Environment%20How%20to%20Define%20Your%20Boundary%2c%20Protect%20CUI%2c%20and%20Simplify%20Compliance-20250717_193009-Meeting%20Recording.mp4</video:content_loc><video:duration>1792</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/From%20Policy%20to%20Pier%20Implementing%20Cyber%20Risk%20Management%20Without%20Disrupting%20Operations-20260311_170007UTC-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>From Policy to Pier Implementing Cyber Risk Management Without Disrupting Operations-20260311_170007UTC-Meeting Recording</video:title><video:description>From Policy to Pier Implementing Cyber Risk Management Without Disrupting Operations-20260311_170007UTC-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/From%20Policy%20to%20Pier%20Implementing%20Cyber%20Risk%20Management%20Without%20Disrupting%20Operations-20260311_170007UTC-Meeting%20Recording.mp4</video:content_loc><video:duration>1176</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Dry%20Runs%20and%20Mock%20Assessments%20%E2%80%93%20What%20are%20they%20What%20is%20the%20difference%20Why%20might%20you%20need%20one%20or%20both-20250918_193536UTC-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>Dry Runs and Mock Assessments – What are they What is the difference Why might you need one or both-20250918_193536UTC-Meeting Recording</video:title><video:description>Dry Runs and Mock Assessments – What are they What is the difference Why might you need one or both-20250918_193536UTC-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Dry%20Runs%20and%20Mock%20Assessments%20%E2%80%93%20What%20are%20they%20What%20is%20the%20difference%20Why%20might%20you%20need%20one%20or%20both-20250918_193536UTC-Meeting%20Recording.mp4</video:content_loc><video:duration>2094</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/New%20Year%20Compliance%20Kickstart%20Developing%20Your%20Coast%20Guard%20Cybersecurity%20Plan%20in%2090%20Days-20260121_180008UTC-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>New Year Compliance Kickstart Developing Your Coast Guard Cybersecurity Plan in 90 Days-20260121_180008UTC-Meeting Recording</video:title><video:description>New Year Compliance Kickstart Developing Your Coast Guard Cybersecurity Plan in 90 Days-20260121_180008UTC-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/New%20Year%20Compliance%20Kickstart%20Developing%20Your%20Coast%20Guard%20Cybersecurity%20Plan%20in%2090%20Days-20260121_180008UTC-Meeting%20Recording.mp4</video:content_loc><video:duration>2050</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%202025%20Readiness%20CMMC%20Compliance%20Trends%20&amp;%20Lessons%20Learned-20251218_200019UTC-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>Cybersecurity Town Hall 2025 Readiness CMMC Compliance Trends &amp; Lessons Learned-20251218_200019UTC-Meeting Recording</video:title><video:description>Cybersecurity Town Hall 2025 Readiness CMMC Compliance Trends &amp; Lessons Learned-20251218_200019UTC-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%202025%20Readiness%20CMMC%20Compliance%20Trends%20&amp;%20Lessons%20Learned-20251218_200019UTC-Meeting%20Recording.mp4</video:content_loc><video:duration>2821</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Townhall-20250619_193302-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>Cybersecurity Townhall-20250619_193302-Meeting Recording</video:title><video:description>Cybersecurity Townhall-20250619_193302-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Townhall-20250619_193302-Meeting%20Recording.mp4</video:content_loc><video:duration>1946</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%2048%20CFR%20Update%20What%20the%20Final%20Rule%20Means%20for%20Your%20Contracts.mp4/medium.jpg</video:thumbnail_loc><video:title>Cybersecurity Town Hall 48 CFR Update What the Final Rule Means for Your Contracts</video:title><video:description>Cybersecurity Town Hall 48 CFR Update What the Final Rule Means for Your Contracts</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%2048%20CFR%20Update%20What%20the%20Final%20Rule%20Means%20for%20Your%20Contracts.mp4</video:content_loc><video:duration>2568</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%20The%20CMMC%20Countdown%20Preparing%20for%202026%20Requirements%20&amp;%20What%E2%80%99s%20Changing%20Now%E2%80%9D-20260115_200017UTC-Meeting%20Recording.mp4/medium.jpg</video:thumbnail_loc><video:title>Cybersecurity Town Hall The CMMC Countdown Preparing for 2026 Requirements &amp; What’s Changing Now”-20260115_200017UTC-Meeting Recording</video:title><video:description>Cybersecurity Town Hall The CMMC Countdown Preparing for 2026 Requirements &amp; What’s Changing Now”-20260115_200017UTC-Meeting Recording</video:description><video:content_loc>https://madsecurity.com/hubfs/webinars/Town%20Hall%20Webinar%20Video%20Recordings/Cybersecurity%20Town%20Hall%20The%20CMMC%20Countdown%20Preparing%20for%202026%20Requirements%20&amp;%20What%E2%80%99s%20Changing%20Now%E2%80%9D-20260115_200017UTC-Meeting%20Recording.mp4</video:content_loc><video:duration>2724</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://madsecurity.com/hubfs/webinars/How%20to%20Improve%20Your%20DFARS%20Score.png</image:loc><image:caption>HowtoImproveYourDFARSScoreWebinarSeries</image:caption><image:title>HowtoImproveYourDFARSScore</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/Good%20Day%20for%20Ransomware.png</image:loc><image:caption>GoodDayforRansomwareWebinarSeries</image:caption><image:title>GoodDayforRansomware</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/PreVeil%20Compliance%20in%20Action%20Webinar%20Series%20YouTube%20Thumbnail.png</image:loc><image:caption>MADSecurityPreVeilComplianceinActionWebinarSeries</image:caption><image:title>PreVeilComplianceinActionWebinarSeriesYouTubeThumbnail</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/How%20to%20Build%20a%20Winning%20Cybersecurity%20Program.png</image:loc><image:caption>HowtoBuildaWinningCybersecurityProgramWebinarSeries</image:caption><image:title>HowtoBuildaWinningCybersecurityProgram</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/Navigating%20Maritime%20Facility%20Cybersecurity%20Future%20Strategies.png</image:loc><image:caption>NavigatingMaritimeFacilityCybersecurityWebinarSeries</image:caption><image:title>NavigatingMaritimeFacilityCybersecurityFutureStrategies</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/DEFCON%20Hack%20the%20Sea.png</image:loc><image:caption>DEFCONHacktheSeaWebinarSeries</image:caption><image:title>DEFCONHacktheSea</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/Cybercrime%20and%20Threat%20Mitigation.png</image:loc><image:caption>CybercrimeandThreatMitigationWebinarSeries</image:caption><image:title>CybercrimeandThreatMitigation</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/CMMC%20Bringing%20Security%20to%20Compliance.png</image:loc><image:caption>CMMCBringingSecuritytoComplianceWebinarSeries</image:caption><image:title>CMMCBringingSecuritytoCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1694685169.jpg</image:loc><image:caption>shutterstock1694685169</image:caption><image:title>shutterstock1694685169</image:title></image:image><lastmod>2025-08-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-achieves-cmmc-level-2-certification</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20achieves%20CMMC%20Level%202%20Certification%20hero%20image.png</image:loc><image:caption>MADSecurityachievesCMMCLevel2Certificationheroimage</image:caption><image:title>MADSecurityachievesCMMCLevel2Certificationheroimage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Level%202.0%20CEO%20Jeremy%20Conway%20quote.png</image:loc><image:caption>CMMCLevel20CEOJeremyConwayquote</image:caption><image:title>CMMCLevel20CEOJeremyConwayquote</image:title></image:image><lastmod>2025-08-11</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/continuous-monitoring-vs.-annual-review-why-ongoing-cybersecurity-oversight-matters</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(8)%20(1).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Continuous%20Monitoring%20vs.%20Annual%20Review%20Why%20Ongoing%20Cybersecurity%20Oversight%20Matters.png</image:loc><image:caption>ContinuousMonitoringvsAnnualReviewWhyOngoingCybersecurityOversightMatters</image:caption><image:title>ContinuousMonitoringvsAnnualReviewWhyOngoingCybersecurityOversightMatters</image:title></image:image><lastmod>2025-12-23</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-sdvosb-certification</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/1-1024x1024-3.png</image:loc><image:caption>11024x10243</image:caption><image:title>11024x10243</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/2-600x600-2.png</image:loc><image:caption>2600x6002</image:caption><image:title>2600x6002</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Achieves%20Certification%20as%20a%20Service-Disabled%20Veteran-Owned%20Small%20Business%20(SDVOSB)%C2%A0Featured%20Image.png</image:loc><image:caption>MADSecurityAchievesCertificationasaServiceDisabledVeteranOwnedSmallBusinessSDVOSBnbsp</image:caption><image:title>MADSecurityAchievesCertificationasaServiceDisabledVeteranOwnedSmallBusinessSDVOSBFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/monitors-key-windows-event-ids</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cyber%20continous%20monitoring.jpg</image:loc><image:caption>cybercontinousmonitoring</image:caption><image:title>cybercontinousmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/windows%20event%20ID%20monitoring.png</image:loc><image:caption>windowseventIDmonitoring</image:caption><image:title>windowseventIDmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20MAD%20Security%20Monitors%20Key%20Windows%20Event%20IDs%20to%20Keep%20Your%20Business%20Safe%20Featured%20Image.png</image:loc><image:caption>HowMADSecurityMonitorsKeyWindowsEventIDstoKeepYourBusinessSafe</image:caption><image:title>HowMADSecurityMonitorsKeyWindowsEventIDstoKeepYourBusinessSafeFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-ranked-top-100-mssp-alert-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Press%20Release%20-%20MAD%20Security%20Named%20%2395%20on%20MSSP%20Alert%E2%80%99s%20Top%20250%20MSSPs%20for%202025.png</image:loc><image:caption>PressReleaseMADSecurityNamed95onMSSPAlertsTop250MSSPsfor2025</image:caption><image:title>PressReleaseMADSecurityNamed95onMSSPAlertsTop250MSSPsfor2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Brad%20Proctor%20Quoted%20Image.png</image:loc><image:caption>BradProctorQuotedImage</image:caption><image:title>BradProctorQuotedImage</image:title></image:image><lastmod>2026-01-08</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/complete-guide-nist-800-171</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Navigating%20the%20Updates%20in%20NIST%20SP%20800-171%20Revision%203%C2%A0Featured%20Image.png</image:loc><image:caption>NavigatingtheUpdatesinNISTSP800171Revision3nbsp</image:caption><image:title>NavigatingtheUpdatesinNISTSP800171Revision3FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/your-blog-post-titlewhy-mad-security-achieved-cmmc-level-2-certification-and-what-it-means-for-defense-contractors-here</loc><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(7).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation7</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cybersecurity%20for%20Smart%20Ports(1).png</image:loc><image:caption>CybersecurityforSmartPorts1</image:caption><image:title>CybersecurityforSmartPorts1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(5).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation5</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-compliance-strategy-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/true-agency-o4UhdLv5jbQ-unsplash-scaled-qgyayidi6jz23atxsu7us6hrji6erc7hbdqi0bqqhs-1.jpg</image:loc><image:caption>trueagencyo4UhdLv5jbQunsplashscaledqgyayidi6jz23atxsu7us6hrji6erc7hbdqi0bqqhs1</image:caption><image:title>trueagencyo4UhdLv5jbQunsplashscaledqgyayidi6jz23atxsu7us6hrji6erc7hbdqi0bqqhs1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/marvin-meyer-SYTO3xs06fU-unsplash-2-scaled-qgya834u27svpx7o3f1eoujadkeydnb4clj4cax5eo-1.jpg</image:loc><image:caption>marvinmeyerSYTO3xs06fUunsplash2scaledqgya834u27svpx7o3f1eoujadkeydnb4clj4cax5eo1</image:caption><image:title>marvinmeyerSYTO3xs06fUunsplash2scaledqgya834u27svpx7o3f1eoujadkeydnb4clj4cax5eo1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Misconception%20of%20Software-Only%20Solutions%20in%20Achieving%20CMMC%20Compliance:%20A%20Comprehensive%20Guide%20Featured%20Image.png</image:loc><image:caption>TheMisconceptionofSoftwareOnlySolutionsinAchievingCMMCComplianceAComprehensiveGuide</image:caption><image:title>TheMisconceptionofSoftwareOnlySolutionsinAchievingCMMCComplianceAComprehensiveGuideFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Blog-Post-Image-1-scaled-qgybwx8se72z5cueupq52hvahck6ketpdpkgj0puow-1.jpg</image:loc><image:caption>BlogPostImage1scaledqgybwx8se72z5cueupq52hvahck6ketpdpkgj0puow1</image:caption><image:title>BlogPostImage1scaledqgybwx8se72z5cueupq52hvahck6ketpdpkgj0puow1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/john-schnobrich-FlPc9_VocJ4-unsplash-scaled-qgyaywh312icxg9giib9bkxoga8wysrgdbis7h5twg-1.jpg</image:loc><image:caption>johnschnobrichFlPc9VocJ4unsplashscaledqgyaywh312icxg9giib9bkxoga8wysrgdbis7h5twg1</image:caption><image:title>johnschnobrichFlPc9VocJ4unsplashscaledqgyaywh312icxg9giib9bkxoga8wysrgdbis7h5twg1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/arnold-francisca-FBNxmwEVpAc-unsplash-scaled-qgycikgzrupoi3ejgkjuzj8exrvgthr6oudzdemheo-1.jpg</image:loc><image:caption>arnoldfranciscaFBNxmwEVpAcunsplashscaledqgycikgzrupoi3ejgkjuzj8exrvgthr6oudzdemheo1</image:caption><image:title>arnoldfranciscaFBNxmwEVpAcunsplashscaledqgycikgzrupoi3ejgkjuzj8exrvgthr6oudzdemheo1</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-mock-assessment-readiness-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Cybersecurity%20for%20Smart%20Ports-2.png</image:loc><image:caption>CybersecurityforSmartPorts2</image:caption><image:title>CybersecurityforSmartPorts2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/blog%20images.png</image:loc><image:caption>blogimages</image:caption><image:title>blogimages</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/blog%20images(1).png</image:loc><image:caption>blogimages1</image:caption><image:title>blogimages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/blog%20images(2).png</image:loc><image:caption>blogimages2</image:caption><image:title>blogimages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Mock%20Assessment%20Infographic.png</image:loc><image:caption>BlogMockAssessmentInfographic</image:caption><image:title>BlogMockAssessmentInfographic</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/blog%20images-1.png</image:loc><image:caption>blogimages1</image:caption><image:title>blogimages1</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/strengthening-cybersecurity-in-the-defense-industry</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-1024x576.png</image:loc><image:caption>MADSEC1024x576</image:caption><image:title>MADSEC1024x576</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-1-1024x576-1.png</image:loc><image:caption>MADSEC11024x5761</image:caption><image:title>MADSEC11024x5761</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-2-1024x576-1.png</image:loc><image:caption>MADSEC21024x5761</image:caption><image:title>MADSEC21024x5761</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Strengthening%20Cybersecurity%20in%20the%20Defense%20Industry%20Featured%20Image.png</image:loc><image:caption>StrengtheningCybersecurityintheDefenseIndustry</image:caption><image:title>StrengtheningCybersecurityintheDefenseIndustryFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-nominated-for-small-business-award-2024</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20Small%20Business%20Award%202024.png</image:loc><image:caption>MADSecuritySmallBusinessAward2024</image:caption><image:title>MADSecuritySmallBusinessAward2024</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-readiness-panel-recap</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Readiness%20in%202025%20Key%20Lessons%20from%20the%20MAD%20Security%20%2B%20Sentar%20Panel%20Featured%20Image.png</image:loc><image:caption>CMMCReadinessin2025KeyLessonsfromtheMADSecuritySentarPanel</image:caption><image:title>CMMCReadinessin2025KeyLessonsfromtheMADSecuritySentarPanelFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-10-14</lastmod></url><url><loc>https://madsecurity.com/cmmc-requirements</loc><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(9).png</image:loc><image:caption>WebsiteImages9</image:caption><image:title>WebsiteImages9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/REVISED%20FROM%20CMMC%20Web%20Page%20CTA.png</image:loc><image:caption>REVISEDFROMCMMCWebPageCTA</image:caption><image:title>REVISEDFROMCMMCWebPageCTA</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(9).png</image:loc><image:caption>Madsec9</image:caption><image:title>Madsec9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(8).png</image:loc><image:caption>WebsiteImages8</image:caption><image:title>WebsiteImages8</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance%20Web%20Page%20CTA.png</image:loc><image:caption>CMMCComplianceWebPageCTA</image:caption><image:title>CMMCComplianceWebPageCTA</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(7).png</image:loc><image:caption>WebsiteImages7</image:caption><image:title>WebsiteImages7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/NEW%20CMMC%20Web%20Page%20CTA%20-%20Services%20(2).png</image:loc><image:caption>NEWCMMCWebPageCTAServices2</image:caption><image:title>NEWCMMCWebPageCTAServices2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(6).png</image:loc><image:caption>WebsiteImages6</image:caption><image:title>WebsiteImages6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(1).png</image:loc><image:caption>WebsiteImages1</image:caption><image:title>WebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/CMMC%20Requirements.png</image:loc><image:caption>CMMCRequirements</image:caption><image:title>CMMCRequirements</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(4).png</image:loc><image:caption>WebsiteImages4</image:caption><image:title>WebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(10).png</image:loc><image:caption>WebsiteImages10</image:caption><image:title>WebsiteImages10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(3).png</image:loc><image:caption>WebsiteImages3</image:caption><image:title>WebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(5).png</image:loc><image:caption>WebsiteImages5</image:caption><image:title>WebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/NEW%20CMMC%20Web%20Page%20CTA%20-%20Event.png</image:loc><image:caption>NEWCMMCWebPageCTAEvent</image:caption><image:title>NEWCMMCWebPageCTAEvent</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(2).png</image:loc><image:caption>WebsiteImages2</image:caption><image:title>WebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images.png</image:loc><image:caption>WebsiteImages</image:caption><image:title>WebsiteImages</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/top-cybersecurity-challenges-cisos-defense-industrial-base</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1ff-1024x576-1.jpg</image:loc><image:caption>MADSECBlogImages1ff1024x5761</image:caption><image:title>MADSECBlogImages1ff1024x5761</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Top%205%20Cybersecurity%20Challenges%20Facing%20CISOs%20in%20the%20Defense%20Industrial%20Base%20Featured%20Image.png</image:loc><image:caption>TheTop5CybersecurityChallengesFacingCISOsintheDefenseIndustrialBase</image:caption><image:title>TheTop5CybersecurityChallengesFacingCISOsintheDefenseIndustrialBaseFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1aa-1024x684-1.jpg</image:loc><image:caption>MADSECBlogImages1aa1024x6841</image:caption><image:title>MADSECBlogImages1aa1024x6841</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/system-security-plan-ssp-cmmc-nist-800-171-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20What%20Is%20a%20System%20Security%20Plan%20(SSP)%20A%20Practical%20Guide%20for%20CMMC%20and%20NIST%20800-171%20Compliance%20(1).png</image:loc><image:caption>MADSECFTIMAGEWhatIsaSystemSecurityPlanSSPAPracticalGuideforCMMCandNIST800171Compliance1</image:caption><image:title>MADSECFTIMAGEWhatIsaSystemSecurityPlanSSPAPracticalGuideforCMMCandNIST800171Compliance1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20What%20Is%20a%20System%20Security%20Plan%20(SSP)%20A%20Practical%20Guide%20for%20CMMC%20and%20NIST%20800-171%20Compliance%20(2).png</image:loc><image:caption>MADSECFTIMAGEWhatIsaSystemSecurityPlanSSPAPracticalGuideforCMMCandNIST800171Compliance2</image:caption><image:title>MADSECFTIMAGEWhatIsaSystemSecurityPlanSSPAPracticalGuideforCMMCandNIST800171Compliance2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20is%20a%20System%20Security%20Plan%20A%20Practical%20Guide%20for%20CMMC%20and%20NIST%20800-171%20Compliance.png</image:loc><image:caption>WhatisaSystemSecurityPlanAPracticalGuideforCMMCandNIST800171Compliance</image:caption><image:title>WhatisaSystemSecurityPlanAPracticalGuideforCMMCandNIST800171Compliance</image:title></image:image><lastmod>2025-12-05</lastmod></url><url><loc>https://madsecurity.com/cmmc-authorized-rpo</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(15).png</image:loc><image:caption>CMMCCONSULTINGPAGE15</image:caption><image:title>CMMCCONSULTINGPAGE15</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20RPO%20PAGE%20(3).png</image:loc><image:caption>CMMCRPOPAGE3</image:caption><image:title>CMMCRPOPAGE3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/C.png</image:loc><image:caption>C</image:caption><image:title>C</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(2)-1.png</image:loc><image:caption>WebsiteImages21</image:caption><image:title>WebsiteImages21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/wp2044697.webp</image:loc><image:caption>wp2044697</image:caption><image:title>wp2044697</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Network-Operation-Centers.png</image:loc><image:caption>NetworkOperationCenters</image:caption><image:title>NetworkOperationCenters</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images.png</image:loc><image:caption>MADSECWebsiteImages</image:caption><image:title>MADSECWebsiteImages</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(4)-1.png</image:loc><image:caption>WebsiteImages41</image:caption><image:title>WebsiteImages41</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/B.png</image:loc><image:caption>B</image:caption><image:title>B</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20RPO%20PAGE.png</image:loc><image:caption>CMMCRPOPAGE</image:caption><image:title>CMMCRPOPAGE</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(6)-1.png</image:loc><image:caption>WebsiteImages61</image:caption><image:title>WebsiteImages61</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(8)-1.png</image:loc><image:caption>WebsiteImages81</image:caption><image:title>WebsiteImages81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/CMMC%20Authorized%20RPO.png</image:loc><image:caption>CMMCAuthorizedRPO</image:caption><image:title>CMMCAuthorizedRPO</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Top%20250%20MSSP%202024.png</image:loc><image:caption>2024Top250MSSP</image:caption><image:title>Top250MSSP2024</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/E.png</image:loc><image:caption>E</image:caption><image:title>E</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(5)-1.png</image:loc><image:caption>WebsiteImages51</image:caption><image:title>WebsiteImages51</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(1)-1.png</image:loc><image:caption>WebsiteImages11</image:caption><image:title>WebsiteImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(9)-1.png</image:loc><image:caption>WebsiteImages91</image:caption><image:title>WebsiteImages91</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Puzzle.png</image:loc><image:caption>Puzzle</image:caption><image:title>Puzzle</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Roadmap-to-Compliance-1.png</image:loc><image:caption>RoadmaptoCompliance1</image:caption><image:title>RoadmaptoCompliance1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(3)-1.png</image:loc><image:caption>WebsiteImages31</image:caption><image:title>WebsiteImages31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20RPO%20PAGE%20(1).png</image:loc><image:caption>CMMCRPOPAGE1</image:caption><image:title>CMMCRPOPAGE1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(7)-1.png</image:loc><image:caption>WebsiteImages71</image:caption><image:title>WebsiteImages71</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20RPO%20PAGE%20(2).png</image:loc><image:caption>CMMCRPOPAGE2</image:caption><image:title>CMMCRPOPAGE2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/D.png</image:loc><image:caption>D</image:caption><image:title>D</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(10)-1.png</image:loc><image:caption>WebsiteImages101</image:caption><image:title>WebsiteImages101</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://madsecurity.com/cmmc-2.0-framework-levels</loc><image:image><image:loc>https://madsecurity.com/hubfs/Black%20Yellow%20and%20Blue%20Bold%20Modern%20Logistics%20Presentation(3).png</image:loc><image:caption>BlackYellowandBlueBoldModernLogisticsPresentation3</image:caption><image:title>BlackYellowandBlueBoldModernLogisticsPresentation3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(1).png</image:loc><image:caption>CMMCWebPageSectionGraphics1</image:caption><image:title>CMMCWebPageSectionGraphics1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-03-04</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/ciso-guide-dod-cybersecurity-strategy-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/A%20CISO%E2%80%99s%20Guide%20to%20DoD%20Cybersecurity%20Strategy%20and%20Compliance%20Featured%20Image.png</image:loc><image:caption>ACISOsGuidetoDoDCybersecurityStrategyandCompliance</image:caption><image:title>ACISOsGuidetoDoDCybersecurityStrategyandComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Insider%20Threats%20and%20CMMC%20-%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant%20(1).png</image:loc><image:caption>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:caption><image:title>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20A%20CISO%E2%80%99s%20Guide%20to%20DoD%20Cybersecurity%20Strategy%20and%20Compliance%20%20(1).png</image:loc><image:caption>MADSECFTIMAGEACISOsGuidetoDoDCybersecurityStrategyandCompliance1</image:caption><image:title>MADSECFTIMAGEACISOsGuidetoDoDCybersecurityStrategyandCompliance1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Insider%20Threats%20and%20CMMC%20-%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant%20(2).png</image:loc><image:caption>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant2</image:caption><image:title>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2025-12-02</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/dod-parameters-nist-800-171-rev3-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Examples%20of%20Critical%20New%20Parameters%20Contractors%20Must%20Implement.png</image:loc><image:caption>ExamplesofCriticalNewParametersContractorsMustImplement</image:caption><image:title>ExamplesofCriticalNewParametersContractorsMustImplement</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20Are%20Organizationally%20Defined%20Parameters%20(ODPs).png</image:loc><image:caption>WhatAreOrganizationallyDefinedParametersODPs</image:caption><image:title>WhatAreOrganizationallyDefinedParametersODPs</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Future-Proof%20Your%20Compliance.png</image:loc><image:caption>FutureProofYourCompliance</image:caption><image:title>FutureProofYourCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(2).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence2</image:title></image:image><lastmod>2025-12-19</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/smart-port-cybersecurity-mad-security</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Cybersecurity%20for%20Smart%20Ports%20Safeguarding%20the%20Maritime%20Future%20with%20MAD%20Security%20%20(3).png</image:loc><image:caption>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity3</image:caption><image:title>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Cybersecurity%20for%20Smart%20Ports%20Safeguarding%20the%20Maritime%20Future%20with%20MAD%20Security%20%20(1).png</image:loc><image:caption>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity1</image:caption><image:title>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Cybersecurity%20for%20Smart%20Ports%20Safeguarding%20the%20Maritime%20Future%20with%20MAD%20Security%20%20(2).png</image:loc><image:caption>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity2</image:caption><image:title>MADSECFTIMAGECybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cybersecurity%20for%20Smart%20Ports%20Safeguarding%20the%20Maritime%20Future%20with%20MAD%20Security.png</image:loc><image:caption>CybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity</image:caption><image:title>CybersecurityforSmartPortsSafeguardingtheMaritimeFuturewithMADSecurity</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/case-study/flat-river</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/maritime-cybersecurity-compliance-defense-mad-security-elastic</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(1)-2.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation12</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Maritime%20Cybersecurity%20Compliance%20and%20Defense%20with%20MAD%20Security%20and%20Elastic.png</image:loc><image:caption>MaritimeCybersecurityComplianceandDefensewithMADSecurityandElastic</image:caption><image:title>MaritimeCybersecurityComplianceandDefensewithMADSecurityandElastic</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(2)-2.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation22</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation22</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-3.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation3</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation3</image:title></image:image><lastmod>2026-01-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/critical-data-in-the-defense-industry</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Protecting%20Critical%20Data%20in%20the%20Defense%20Industry:%20A%20Comprehensive%205-Step%20Guide%20for%20DIB%20Companies%20Featured%20Image.png</image:loc><image:caption>ProtectingCriticalDataintheDefenseIndustryAComprehensive5StepGuideforDIBCompanies</image:caption><image:title>ProtectingCriticalDataintheDefenseIndustryAComprehensive5StepGuideforDIBCompaniesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-5-1-1024x512-1.png</image:loc><image:caption>MADSECBlogImages511024x5121</image:caption><image:title>MADSECBlogImages511024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1-2-1024x512-1.png</image:loc><image:caption>MADSECBlogImages121024x5121</image:caption><image:title>MADSECBlogImages121024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-4-1-1024x512-1.png</image:loc><image:caption>MADSECBlogImages411024x5121</image:caption><image:title>MADSECBlogImages411024x5121</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/quick-cyber-wins-mfa-passwords-and-access-controls</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20images%20design(4).png</image:loc><image:caption>Blogimagesdesign4</image:caption><image:title>Blogimagesdesign4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20images%20design(5).png</image:loc><image:caption>Blogimagesdesign5</image:caption><image:title>Blogimagesdesign5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Quick%20Cyber%20Wins%20MFA%2c%20Passwords%20and%20Access%20Controls%20Featured%20Image.png</image:loc><image:caption>QuickCyberWinsMFAPasswordsandAccessControls</image:caption><image:title>QuickCyberWinsMFAPasswordsandAccessControlsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-2.png</image:loc><image:caption>MADSECHubSpotBlogImages12</image:caption><image:title>MADSECHubSpotBlogImages12</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/security-protection-assets-spas-cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Section%20Images%20(2).png</image:loc><image:caption>BlogSectionImages2</image:caption><image:title>BlogSectionImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20Security%20Protection%20Assets%20(SPAs)%20for%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>UnderstandingSecurityProtectionAssetsSPAsforCMMCCompliance</image:caption><image:title>UnderstandingSecurityProtectionAssetsSPAsforCMMCComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/1%20(1).png</image:loc><image:caption>11</image:caption><image:title>11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Section%20Images%20(1).png</image:loc><image:caption>BlogSectionImages1</image:caption><image:title>BlogSectionImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Section%20Images.png</image:loc><image:caption>BlogSectionImages</image:caption><image:title>BlogSectionImages</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/1-3.png</image:loc><image:caption>13</image:caption><image:title>13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/3-1.png</image:loc><image:caption>31</image:caption><image:title>31</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mobile-security-defenses</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Mobile%20Security%20Defenses%20Featured%20Image.png</image:loc><image:caption>MobileSecurityDefenses</image:caption><image:title>MobileSecurityDefensesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/operationalizing-cmmc-2.0-mad-security-town-hall-webinar-recap-october-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Operationalizing%20CMMC%202.0%20%20Town%20Hall%20Webinar%20Recap%20-%20October%202025%20Featured%20Image.png</image:loc><image:caption>OperationalizingCMMC20MADSecurityWebinarRecapOctober2025</image:caption><image:title>OperationalizingCMMC20TownHallWebinarRecapOctober2025FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-10-22</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/top-10-ssp-mistakes-cmmc-assessment</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(6).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment6</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(2).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment2</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment.png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5)-2.png</image:loc><image:caption>MADSECWebsiteImages52</image:caption><image:title>MADSECWebsiteImages52</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(3).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment3</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(7).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment7</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20Featured%20Image.png</image:loc><image:caption>Top10SSPMistakesThatWillDerailYourCMMCAssessmentMADSecurity</image:caption><image:title>Top10SSPMistakesThatWillDerailYourCMMCAssessmentFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(10).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment10</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(9).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment9</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(6).png</image:loc><image:caption>MADSECWebsiteImages6</image:caption><image:title>MADSECWebsiteImages6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(8).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment8</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment8</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(1).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment1</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(7).png</image:loc><image:caption>MADSECWebsiteImages7</image:caption><image:title>MADSECWebsiteImages7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(4).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment4</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(11).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment11</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(6)-1.png</image:loc><image:caption>MADSECWebsiteImages61</image:caption><image:title>MADSECWebsiteImages61</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(5).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment5</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5)-1.png</image:loc><image:caption>MADSECWebsiteImages51</image:caption><image:title>MADSECWebsiteImages51</image:title></image:image><lastmod>2025-10-28</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-cui-registry-safeguarding-dissemination-sanction-authorities</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Blog%20Image-Jul-01-2024-04-31-43-2807-AM.png</image:loc><image:caption>MADSECWebsiteBlogImageJul0120240431432807AM</image:caption><image:title>MADSECWebsiteBlogImageJul0120240431432807AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Blog%20Image%20(3).png</image:loc><image:caption>MADSECWebsiteBlogImage3</image:caption><image:title>MADSECWebsiteBlogImage3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Blog%20Image%20(2).png</image:loc><image:caption>MADSECWebsiteBlogImage2</image:caption><image:title>MADSECWebsiteBlogImage2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/undefined-4.png</image:loc><image:caption>undefined4</image:caption><image:title>undefined4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20the%20CUI%20Registry:%20Safeguarding%2c%20Dissemination%2c%20and%20Sanction%20Authorities%20Featured%20Image.png</image:loc><image:caption>UnderstandingtheCUIRegistrySafeguardingDisseminationandSanctionAuthorities</image:caption><image:title>UnderstandingtheCUIRegistrySafeguardingDisseminationandSanctionAuthoritiesFeaturedImage</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/cmmc-level-2-compliance-on-a-budget</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(11).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages11</image:caption><image:title>MADSECCMMCAssessmentGuideImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(2).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget2</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(22).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages22</image:caption><image:title>MADSECCMMCAssessmentGuideImages22</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(23).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages23</image:caption><image:title>MADSECCMMCAssessmentGuideImages23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(3).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget3</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(1).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget1</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images-2.png</image:loc><image:caption>WebsiteImages2</image:caption><image:title>WebsiteImages2</image:title></image:image><lastmod>2025-05-14</lastmod></url><url><loc>https://madsecurity.com/risk-and-compliance-services/virtual-compliance-manager</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_69852688.jpg</image:loc><image:caption>shutterstock69852688</image:caption><image:title>shutterstock69852688</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/app_computer_cellphone.jpg</image:loc><image:caption>appcomputercellphone</image:caption><image:title>appcomputercellphone</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-05-09</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/choosing-a-cybersecurity-service-provider</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20Do%20I%20Choose%20A%20Cybersecurity%20Service%20Provider%20Featured%20Image.png</image:loc><image:caption>HowDoIChooseACybersecurityServiceProvider</image:caption><image:title>HowDoIChooseACybersecurityServiceProviderFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/security%20operations%20center.png</image:loc><image:caption>securityoperationscenter</image:caption><image:title>securityoperationscenter</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/implementing-mfa-best-practices-cybersecurity-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Implementing%20MFA%20Across%20Diverse%20Environments:%20Best%20Practices%20for%20Cybersecurity%20Compliance%20Featured%20Image.png</image:loc><image:caption>ImplementingMFAAcrossDiverseEnvironmentsBestPracticesforCybersecurityCompliance</image:caption><image:title>ImplementingMFAAcrossDiverseEnvironmentsBestPracticesforCybersecurityComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20CMMC%202.0%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%20%20(2).png</image:loc><image:caption>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts2</image:caption><image:title>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20CMMC%202.0%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%202.png</image:loc><image:caption>BeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts</image:caption><image:title>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20CMMC%202.0%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%20%20(3).png</image:loc><image:caption>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts3</image:caption><image:title>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts3</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-named-to-mssp-alerts-top-250-mssps-list-for-2021</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%20Top%20250%20MSSPs%20List%20for%202021%20Featured%20Image.png</image:loc><image:caption>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2021</image:caption><image:title>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2021FeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cui-flow-down-cmmc-requirements-for-subcontractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/SOC-as-a-Service%20from%20MAD%20Security-1.png</image:loc><image:caption>SOCasaServicefromMADSecurity1</image:caption><image:title>SOCasaServicefromMADSecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/9-1.png</image:loc><image:caption>91</image:caption><image:title>91</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CUI%20Flow%20Down-%20What%20Prime%20Contractors%20Must%20Know%20About%20CMMC%20Requirements%20for%20Subcontractors%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>CUIFlowDownWhatPrimeContractorsMustKnowAboutCMMCRequirementsforSubcontractors</image:caption><image:title>CUIFlowDownWhatPrimeContractorsMustKnowAboutCMMCRequirementsforSubcontractorsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(4).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:title></image:image><lastmod>2026-01-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/the-future-of-dfars-maturity-and-accreditation</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Future%20of%20DFARs:%20Maturity%20and%20Accreditation%20Featured%20Image.png</image:loc><image:caption>TheFutureofDFARsMaturityandAccreditation</image:caption><image:title>TheFutureofDFARsMaturityandAccreditationFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/agnostic-cmmc-compliance-services</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Insider%20Threats%20and%20CMMC%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant.png</image:loc><image:caption>InsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant</image:caption><image:title>InsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/The%20Three%20Big%20Advantages%20of%20an%20Agnostic%20Approach.png</image:loc><image:caption>TheThreeBigAdvantagesofanAgnosticApproach</image:caption><image:title>TheThreeBigAdvantagesofanAgnosticApproach</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Agnostic%20CMMC%20Services%20Explained%20Flexibility%2c%20Cost%20Savings%2c%20and%20Better%20Compliance%20Outcomes%20%20(1)-1.png</image:loc><image:caption>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes11</image:caption><image:title>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20Does%20Agnostic%20Mean%20in%20CMMC%20Services.png</image:loc><image:caption>WhatDoesAgnosticMeaninCMMCServices</image:caption><image:title>WhatDoesAgnosticMeaninCMMCServices</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Agnostic%20CMMC%20Services%20Explained%20Flexibility%2c%20Cost%20Savings%2c%20and%20Better%20Compliance%20Outcomes%20.png</image:loc><image:caption>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes</image:caption><image:title>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Agnostic%20CMMC%20Services%20Explained%20Flexibility%2c%20Cost%20Savings%2c%20and%20Better%20Compliance%20Outcomes%20%20(2).png</image:loc><image:caption>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes2</image:caption><image:title>AgnosticCMMCServicesExplainedFlexibilityCostSavingsandBetterComplianceOutcomes2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/How%20MAD%20Security%20Delivers%20True%20Agnostic%20CMMC%20Compliance%20Support%20.png</image:loc><image:caption>HowMADSecurityDeliversTrueAgnosticCMMCComplianceSupport</image:caption><image:title>HowMADSecurityDeliversTrueAgnosticCMMCComplianceSupport</image:title></image:image><lastmod>2025-08-05</lastmod></url><url><loc>https://madsecurity.com/cmmc-assessment-guide-roadmap</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages21</image:caption><image:title>MADSECCMMCAssessmentGuideImages21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/CMMC%20Assessment%20Guide.png</image:loc><image:caption>CMMCAssessmentGuide</image:caption><image:title>CMMCAssessmentGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(23).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages23</image:caption><image:title>MADSECCMMCAssessmentGuideImages23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(7)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages71</image:caption><image:title>MADSECCMMCAssessmentGuideImages71</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Banner.png</image:loc><image:caption>MADSECCMMCAssessmentGuideBanner</image:caption><image:title>MADSECCMMCAssessmentGuideBanner</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages1</image:caption><image:title>MADSECCMMCAssessmentGuideImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Master%20Bundle.png</image:loc><image:caption>CMMCMasterBundle</image:caption><image:title>CMMCMasterBundle</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(4).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages4</image:caption><image:title>MADSECCMMCAssessmentGuideImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(24).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages24</image:caption><image:title>MADSECCMMCAssessmentGuideImages24</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(1).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages1</image:caption><image:title>MADSECCMMCAssessmentGuideImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Pre-Assessment.png</image:loc><image:caption>CMMCPreAssessment</image:caption><image:title>CMMCPreAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us.png</image:loc><image:caption>ContactUs</image:caption><image:title>ContactUs</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Assessment%20Guide.png</image:loc><image:caption>CMMCAssessmentGuide</image:caption><image:title>CMMCAssessmentGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog.png</image:loc><image:caption>Blog</image:caption><image:title>Blog</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(14).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages14</image:caption><image:title>MADSECCMMCAssessmentGuideImages14</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(5).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages5</image:caption><image:title>MADSECCMMCAssessmentGuideImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(1)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages11</image:caption><image:title>MADSECCMMCAssessmentGuideImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(4)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages41</image:caption><image:title>MADSECCMMCAssessmentGuideImages41</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(5)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages51</image:caption><image:title>MADSECCMMCAssessmentGuideImages51</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(13).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages13</image:caption><image:title>MADSECCMMCAssessmentGuideImages13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3)-1.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages31</image:caption><image:title>MADSECCMMCAssessmentGuideImages31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages</image:caption><image:title>MADSECCMMCAssessmentGuideImages</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-smarterd-strategic-partnership</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-Security-Blog-Image-1024x1024-1.png</image:loc><image:caption>MADSecurityBlogImage1024x10241</image:caption><image:title>MADSecurityBlogImage1024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-Security-Blog-Image-1-1024x1024-1.png</image:loc><image:caption>MADSecurityBlogImage11024x10241</image:caption><image:title>MADSecurityBlogImage11024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Building%20a%20Comprehensive%20Incident%20Response%20Plan%20for%20Defense%20Contractors%20Using%20NIST%20Guidelines.png</image:loc><image:caption>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelines</image:caption><image:title>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelines</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/prime-contractor-cmmc-subcontractor-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Prime%20Contractor%20CMMC%20Playbook%20Managing%20Subcontractor%20Compliance%20Risk%20and%20Flow-Down%20Requirements.png</image:loc><image:caption>PrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements</image:caption><image:title>PrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Prime%20Contractor%20CMMC%20Playbook%20Managing%20Subcontractor%20Compliance%20Risk%20and%20Flow-Down%20Requirements%20(2).png</image:loc><image:caption>MADSECFTIMAGEPrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements2</image:caption><image:title>MADSECFTIMAGEPrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Prime%20Contractor%20CMMC%20Playbook%20Managing%20Subcontractor%20Compliance%20Risk%20and%20Flow-Down%20Requirements%20(3).png</image:loc><image:caption>MADSECFTIMAGEPrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements3</image:caption><image:title>MADSECFTIMAGEPrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirements3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Prime%20Contractor%20CMMC%20Playbook%20Managing%20Subcontractor%20Compliance%20Risk%20and%20Flow-Down%20Requirements%20Compliance.png</image:loc><image:caption>PrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirementsCompliance</image:caption><image:title>PrimeContractorCMMCPlaybookManagingSubcontractorComplianceRiskandFlowDownRequirementsCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/optimizing-soc</loc><image:image><image:loc>https://madsecurity.com/hubfs/security%20operations%20center.png</image:loc><image:caption>securityoperationscenter</image:caption><image:title>securityoperationscenter</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Optimizing%20SOC%20to%20Meet%20CMMC%20Compliance%20and%20Strengthen%20Cybersecurity:%20A%20Case%20Study%20Featured%20Image.png</image:loc><image:caption>OptimizingSOCtoMeetCMMCComplianceandStrengthenCybersecurityACaseStudy</image:caption><image:title>OptimizingSOCtoMeetCMMCComplianceandStrengthenCybersecurityACaseStudyFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-audit-failure-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Untitled-design-4-1024x1024-1.png</image:loc><image:caption>Untitleddesign41024x10241</image:caption><image:title>Untitleddesign41024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Untitled-design-3-1024x1024-1.png</image:loc><image:caption>Untitleddesign31024x10241</image:caption><image:title>Untitleddesign31024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20to%20Ensure%20Failure%20in%20a%20CMMC%202.0%20Audit:%20A%20Guide%20to%20What%20Not%20to%20Do%C2%A0Featured%20Image.png</image:loc><image:caption>HowtoEnsureFailureinaCMMC20AuditAGuidetoWhatNottoDonbsp</image:caption><image:title>HowtoEnsureFailureinaCMMC20AuditAGuidetoWhatNottoDoFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/itar-vs-cmmc-2-0-compliance-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Key%20Similarities%20Between%20ITAR%20and%20CMMC%202.0.png</image:loc><image:caption>KeySimilaritiesBetweenITARandCMMC20</image:caption><image:title>KeySimilaritiesBetweenITARandCMMC20</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Call%20to%20Action%20(CTA)%20Graphics/Contact%20Us%20CTA.png</image:loc><image:caption>ContactUsCTA</image:caption><image:title>ContactUsCTA</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20is%20CMMC%202.0%20.png</image:loc><image:caption>WhatisCMMC20</image:caption><image:title>WhatisCMMC20</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/When%20Each%20is%20Applicable%20ITAR%20and%20CMMC%202.0%20.png</image:loc><image:caption>WhenEachisApplicableITARandCMMC20</image:caption><image:title>WhenEachisApplicableITARandCMMC20</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Critical%20Differences%20Between%20ITAR%20and%20CMMC%202.0.png</image:loc><image:caption>CriticalDifferencesBetweenITARandCMMC20</image:caption><image:title>CriticalDifferencesBetweenITARandCMMC20</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Navigating%20ITAR%20and%20CMMC%202.0%20Compliance%20with%20Confidence.png</image:loc><image:caption>NavigatingITARandCMMC20CompliancewithConfidence</image:caption><image:title>NavigatingITARandCMMC20CompliancewithConfidence</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Differences%20and%20Similarities%20Between%20ITAR%20and%20CMMC%202.0:%20What%20Defense%20Contractors%20Need%20to%20Know%20Featured%20Image.png</image:loc><image:caption>DifferencesandSimilaritiesBetweenITARandCMMC20WhatDefenseContractorsNeedtoKnow</image:caption><image:title>DifferencesandSimilaritiesBetweenITARandCMMC20WhatDefenseContractorsNeedtoKnowFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20is%20ITAR.png</image:loc><image:caption>WhatisITAR</image:caption><image:title>WhatisITAR</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Practical%20Steps%20for%20Defense%20Contractors%20to%20Achieve%20ITAR%20and%20CMMC%202.0%20Compliance%20.png</image:loc><image:caption>PracticalStepsforDefenseContractorstoAchieveITARandCMMC20Compliance</image:caption><image:title>PracticalStepsforDefenseContractorstoAchieveITARandCMMC20Compliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Benefits%20of%20Proactive%20Compliance%20with%20ITAR%20and%20CMMC%202.0.png</image:loc><image:caption>BenefitsofProactiveCompliancewithITARandCMMC20</image:caption><image:title>BenefitsofProactiveCompliancewithITARandCMMC20</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-a-cybersecurity-insurance-policy-covers</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/So%20You%20Have%20A%20Cyber%20Insurance%20Policy%20But%20Are%20You%20Really%20Covered%20Featured%20Image.png</image:loc><image:caption>SoYouHaveACyberInsurancePolicyButAreYouReallyCovered</image:caption><image:title>SoYouHaveACyberInsurancePolicyButAreYouReallyCoveredFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cybersecurity%20insurance.png</image:loc><image:caption>cybersecurityinsurance</image:caption><image:title>cybersecurityinsurance</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Business%20woman%20using%20tablet%20with%20financial%2c%20cloud%20connectivity%20concept.jpeg</image:loc><image:caption>WhyisCMMCComplianceImportant</image:caption><image:title>Businesswomanusingtabletwithfinancialcloudconnectivityconcept</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-assessment-objectives-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%203.jpg</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance3</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%202.jpg</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance2</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%201.jpg</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance1</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%204.jpg</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance4</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20CMMC%202.0%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%20%20(3).png</image:loc><image:caption>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts3</image:caption><image:title>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts3</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-webinar-recap-december-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-Dec-10-2025-03-59-30-5736-AM.png</image:loc><image:caption>MADSECHubSpotBlogImagesDec1020250359305736AM</image:caption><image:title>MADSECHubSpotBlogImagesDec1020250359305736AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Audit-Proofing%20CMMC%202.0%20Compliance%20%7C%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20December%202025%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>AuditProofingCMMC20ComplianceMADSecurityTownHallRecapDecember2025</image:caption><image:title>AuditProofingCMMC20ComplianceMADSecurityTownHallRecapDecember2025BlogPostFeaturedImage</image:title></image:image><lastmod>2025-12-30</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/vulnerability-management-asset-discovery</loc><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(11).png</image:loc><image:caption>Madsec11</image:caption><image:title>Madsec11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Enhancing%20Cybersecurity%20Through%20Effective%20Vulnerability%20Management%20and%20Asset%20Discovery%20Featured%20Image.png</image:loc><image:caption>EnhancingCybersecurityThroughEffectiveVulnerabilityManagementandAssetDiscovery</image:caption><image:title>EnhancingCybersecurityThroughEffectiveVulnerabilityManagementandAssetDiscoveryFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(13).png</image:loc><image:caption>Madsec13</image:caption><image:title>Madsec13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(12).png</image:loc><image:caption>Madsec12</image:caption><image:title>Madsec12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(9).png</image:loc><image:caption>Madsec9</image:caption><image:title>Madsec9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec%20(10).png</image:loc><image:caption>Madsec10</image:caption><image:title>Madsec10</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/assessment-prep-that-works-mad-security-town-hall-recap-september-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-1.png</image:loc><image:caption>MADSECHubSpotBlogImages11</image:caption><image:title>MADSECHubSpotBlogImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-1.png</image:loc><image:caption>MADSECHubSpotBlogImages1</image:caption><image:title>MADSECHubSpotBlogImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Assessment%20Prep%20That%20Works%20%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20September%202025%20Featured%20Image.png</image:loc><image:caption>AssessmentPrepThatWorksMADSecurityTownHallRecapSeptember2025</image:caption><image:title>AssessmentPrepThatWorksMADSecurityTownHallRecapSeptember2025FeaturedImage</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cybersecurity-awareness-training-for-cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/thisisengineering-lr5RHwBmrbs-unsplash.jpg</image:loc><image:caption>thisisengineeringlr5RHwBmrbsunsplash</image:caption><image:title>thisisengineeringlr5RHwBmrbsunsplash</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec3.jpg</image:loc><image:caption>Madsec3</image:caption><image:title>Madsec3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Ensuring%20Compliance%20with%20NIST%20and%20CMMC%20Comprehensive%20Cybersecurity%20Awareness%20Training%20Featured%20Image.png</image:loc><image:caption>EnsuringCompliancewithNISTandCMMCComprehensiveCybersecurityAwarenessTraining</image:caption><image:title>EnsuringCompliancewithNISTandCMMCComprehensiveCybersecurityAwarenessTrainingFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-Jul-01-2024-04-38-42-5903-AM.png</image:loc><image:caption>Untitleddesign2Jul0120240438425903AM</image:caption><image:title>Untitleddesign2Jul0120240438425903AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/danial-igdery-FCHlYvR5gJI-unsplash.jpg</image:loc><image:caption>danialigderyFCHlYvR5gJIunsplash</image:caption><image:title>danialigderyFCHlYvR5gJIunsplash</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec1.jpg</image:loc><image:caption>Madsec1</image:caption><image:title>Madsec1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec2.jpg</image:loc><image:caption>Madsec2</image:caption><image:title>Madsec2</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cybersecurity-government-contractors-2</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Untitled-design-2-1024x1024-1.png</image:loc><image:caption>Untitleddesign21024x10241</image:caption><image:title>Untitleddesign21024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Untitled-design-1-1024x1024-1.png</image:loc><image:caption>Untitleddesign11024x10241</image:caption><image:title>Untitleddesign11024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Government%20Contractors%2c%20Breathe%20Easy:%20How%20Managed%20Services%20Tackle%20Your%20Cybersecurity%20Headaches%20Featured%20Image.png</image:loc><image:caption>GovernmentContractorsBreatheEasyHowManagedServicesTackleYourCybersecurityHeadaches</image:caption><image:title>GovernmentContractorsBreatheEasyHowManagedServicesTackleYourCybersecurityHeadachesFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-the-coast-guards-maritime-cyber-rule-what-you-need-to-know-in-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Understanding%20the%20Coast%20Guards%20Maritime%20Cyber%20Rule%20What%20You%20Need%20to%20Know%20in%202025.png</image:loc><image:caption>BlogPostUnderstandingtheCoastGuardsMaritimeCyberRuleWhatYouNeedtoKnowin2025</image:caption><image:title>BlogPostUnderstandingtheCoastGuardsMaritimeCyberRuleWhatYouNeedtoKnowin2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20the%20U.S.%20Coast%20Guard%20Maritime%20Cyber%20Rule%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>UnderstandingtheUSCoastGuardMaritimeCyberRuleMADSecurity</image:caption><image:title>UnderstandingtheUSCoastGuardMaritimeCyberRuleBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Understanding%20the%20Coast%20Guards%20Maritime%20Cyber%20Rule%20What%20You%20Need%20to%20Know%20in%202025%20(2).png</image:loc><image:caption>BlogPostUnderstandingtheCoastGuardsMaritimeCyberRuleWhatYouNeedtoKnowin20252</image:caption><image:title>BlogPostUnderstandingtheCoastGuardsMaritimeCyberRuleWhatYouNeedtoKnowin20252</image:title></image:image><lastmod>2025-07-31</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-january-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Aligning%20Contract%20Commitments%20with%20CMMC%202.0%20Success%20Town%20Hall%20Webinar%20Recap%20-%20January%202025%20Featured%20Image.png</image:loc><image:caption>AligningContractCommitmentswithCMMC20SuccessTownHallWebinarRecapJanuary2025FeaturedImage</image:caption><image:title>AligningContractCommitmentswithCMMC20SuccessTownHallWebinarRecapJanuary2025FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/enhancing-cybersecurity-for-government-contractors-with-mad-security</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-1-1-1024x576-3.png</image:loc><image:caption>MADSECWebsiteBlogImage111024x5763</image:caption><image:title>MADSECWebsiteBlogImage111024x5763</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Unique%20Advantage%20of%20MAD%20Security%20for%20Government%20Contractors:%20Enhancing%20Cybersecurity%20Posture%20on%20a%20Budget%20Featured%20Image.png</image:loc><image:caption>TheUniqueAdvantageofMADSecurityforGovernmentContractorsEnhancingCybersecurityPostureonaBudget</image:caption><image:title>TheUniqueAdvantageofMADSecurityforGovernmentContractorsEnhancingCybersecurityPostureonaBudgetFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-3-1024x576-3.png</image:loc><image:caption>MADSECWebsiteBlogImage31024x5763</image:caption><image:title>MADSECWebsiteBlogImage31024x5763</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-february-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/4-1.png</image:loc><image:caption>41</image:caption><image:title>41</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_1_red.svg</image:loc><image:caption>number1red</image:caption><image:title>number1red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Double%20exposure%20of%20businessman%20hand%20points%20human%20resources%2c%20CRM%20and%20social%20media%20as%20concept.jpeg</image:loc><image:caption>DoubleexposureofbusinessmanhandpointshumanresourcesCRMandsocialmediaasconcept</image:caption><image:title>DoubleexposureofbusinessmanhandpointshumanresourcesCRMandsocialmediaasconcept</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Choosing%20the%20Righ%20C3PAO%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>ChoosingtheRightC3PAOMADSecurityTownHallRecapFebruary2025</image:caption><image:title>ChoosingtheRighC3PAOBlogPostFeaturedImage</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/far-cui-rule-impact-federal-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(3)-1.png</image:loc><image:caption>Untitleddesign31</image:caption><image:title>Untitleddesign31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(4)-3.png</image:loc><image:caption>Untitleddesign43</image:caption><image:title>Untitleddesign43</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20the%20FAR%20CUI%20Rule%20and%20Its%20Impact%20on%20All%20Federal%20Contractors%20Featured%20Image.png</image:loc><image:caption>UnderstandingtheFARCUIRuleandItsImpactonAllFederalContractors</image:caption><image:title>UnderstandingtheFARCUIRuleandItsImpactonAllFederalContractorsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/FAR%20CUI%20RULE%20(2).png</image:loc><image:caption>FARCUIRULE2</image:caption><image:title>FARCUIRULE2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-level-1-strategy-for-level-2-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success%20(3).png</image:loc><image:caption>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success3</image:caption><image:title>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success%20Featured%20Image.png</image:loc><image:caption>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2SuccessMADSecurity</image:caption><image:title>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2SuccessFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success%20(2).png</image:loc><image:caption>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success2</image:caption><image:title>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success%20(1).png</image:loc><image:caption>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success1</image:caption><image:title>MADSECFTIMAGEStartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://madsecurity.com/townhall-webinar</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Top-250-MSSP_Badge-2025.webp</image:loc><image:caption>Top250MSSPBadge2025</image:caption><image:title>Top250MSSPBadge2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Adam%20Starnes%20Town%20Hall%20AM.png</image:loc><image:caption>AdamStarnesTownHallAM</image:caption><image:title>AdamStarnesTownHallAM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-3-300x169-1.png</image:loc><image:caption>MADSECWebsiteBlogImage3300x1691</image:caption><image:title>MADSECWebsiteBlogImage3300x1691</image:title></image:image><lastmod>2026-03-27</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/why-a-cmmc-dry-run-is-essential-for-assessment-success</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20EC%20FT%20IMAGE%20-%20CMMC%20Assessments%20Simplified%20Using%20Your%20Operational%20SOC%20Data%20for%20Audit-Ready%20Evidence%20(1).png</image:loc><image:caption>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence1</image:caption><image:title>MADECFTIMAGECMMCAssessmentsSimplifiedUsingYourOperationalSOCDataforAuditReadyEvidence1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Why%20a%20CMMC%20Dry%20Run%20Is%20Essential%20for%20Assessment%20Success%20Featured%20Image.png</image:loc><image:caption>WhyaCMMCDryRunIsEssentialforAssessmentSuccess</image:caption><image:title>WhyaCMMCDryRunIsEssentialforAssessmentSuccessFeaturedImage</image:title></image:image><lastmod>2025-12-04</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-march-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20Recap%20%E2%80%93%20March%202025.png</image:loc><image:caption>TownHallWebinarRecapMarch2025</image:caption><image:title>TownHallWebinarRecapMarch2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Future-Proofing%20CMMC%20Compliance%20Blog%20Post%20Featured%20Image%20v2.png</image:loc><image:caption>FutureProofingCMMCCompliance</image:caption><image:title>FutureProofingCMMCComplianceBlogPostFeaturedImagev2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20Recap%20%E2%80%93%20March%202025%20(1).png</image:loc><image:caption>TownHallWebinarRecapMarch20251</image:caption><image:title>TownHallWebinarRecapMarch20251</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-10-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/affordable-steps-for-maritime-cybersecurity-compliance-mad-security-maritime-town-hall-recap-november-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20images%20design(2).png</image:loc><image:caption>Blogimagesdesign2</image:caption><image:title>Blogimagesdesign2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Maritime%20(3).png</image:loc><image:caption>Maritime3</image:caption><image:title>Maritime3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cybersecurity%20for%20Smart%20Ports(2).png</image:loc><image:caption>CybersecurityforSmartPorts2</image:caption><image:title>CybersecurityforSmartPorts2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><lastmod>2025-11-27</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/4-common-cybersecurity-threats</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/4%20Common%20Cybersecurity%20Threats%20Featured%20Image.png</image:loc><image:caption>4CommonCybersecurityThreats</image:caption><image:title>4CommonCybersecurityThreatsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-february-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Is%20More%20Than%20Cybersecurity%20Aligning%20Compliance%20with%20Business%2c%20Culture%2c%20and%20Contracts%20%7C%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20February%202026.png</image:loc><image:caption>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:caption><image:title>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://madsecurity.com/cmmc</loc><image:image><image:loc>https://madsecurity.com/hubfs/number_3_red.svg</image:loc><image:caption>number3red</image:caption><image:title>number3red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_5_red.svg</image:loc><image:caption>number5red</image:caption><image:title>number5red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_7_red.svg</image:loc><image:caption>number7red</image:caption><image:title>number7red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(1).png</image:loc><image:caption>CMMCWebPageSectionGraphics1</image:caption><image:title>CMMCWebPageSectionGraphics1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(4).png</image:loc><image:caption>CMMCWebPageSectionGraphics4</image:caption><image:title>CMMCWebPageSectionGraphics4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_6_red.svg</image:loc><image:caption>number6red</image:caption><image:title>number6red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(2).png</image:loc><image:caption>CMMCWebPageSectionGraphics2</image:caption><image:title>CMMCWebPageSectionGraphics2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(4)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics41</image:caption><image:title>CMMCWebPageSectionGraphics41</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/vulnerability%20management.png</image:loc><image:caption>CMMCRPOVulnerabilityManagement</image:caption><image:title>vulnerabilitymanagement</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics1</image:caption><image:title>CMMCWebPageSectionGraphics1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%2024X7%20Security%20Operations%20Center%20SOC%20services%20continuous%20monitoring%20compliance.png</image:loc><image:caption>MADSecurity24X7SecurityOperationsCenterSOCservicescontinuousmonitoringcompliance</image:caption><image:title>MADSecurity24X7SecurityOperationsCenterSOCservicescontinuousmonitoringcompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_4_red.svg</image:loc><image:caption>number4red</image:caption><image:title>number4red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/expertise%20you%20can%20trust.png</image:loc><image:caption>expertiseyoucantrust</image:caption><image:title>expertiseyoucantrust</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_8_red.svg</image:loc><image:caption>number8red</image:caption><image:title>number8red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(5).png</image:loc><image:caption>CMMCWebPageSectionGraphics5</image:caption><image:title>CMMCWebPageSectionGraphics5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/partner%20with%20MAD%20Security%20CMMC%20MSP%20MSSP.png</image:loc><image:caption>partnerwithMADSecurityCMMCMSPMSSP</image:caption><image:title>partnerwithMADSecurityCMMCMSPMSSP</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/business%20partners%2c%20partnership%20concept%20with%20two%20businessman%20handshake.jpeg</image:loc><image:caption>businesspartnerspartnershipconceptwithtwobusinessmanhandshake</image:caption><image:title>businesspartnerspartnershipconceptwithtwobusinessmanhandshake</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Third-Party%20Assessment.png</image:loc><image:caption>CMMCAuditProcessThirdPartyAssessment</image:caption><image:title>CMMCAuditProcessThirdPartyAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_9_red.svg</image:loc><image:caption>number9red</image:caption><image:title>number9red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Mastery%20Unlocked.png</image:loc><image:caption>CMMCMasteryUnlocked</image:caption><image:title>CMMCMasteryUnlocked</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%2024X7%20Security%20Operations%20Center%20SOC%20services%20continuous%20monitoring.png</image:loc><image:caption>MADSecurity24X7SecurityOperationsCenterSOCservicescontinuousmonitoring</image:caption><image:title>MADSecurity24X7SecurityOperationsCenterSOCservicescontinuousmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_1_red.svg</image:loc><image:caption>number1red</image:caption><image:title>number1red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/incident%20response.png</image:loc><image:caption>CMMCRPOIncidentResponse</image:caption><image:title>incidentresponse</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Pre-Audit%20Self-Attestation.png</image:loc><image:caption>CMMCAuditProcessPreAuditSelfAttestation</image:caption><image:title>CMMCAuditProcessPreAuditSelfAttestation</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(1)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics11</image:caption><image:title>CMMCWebPageSectionGraphics11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(2)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics21</image:caption><image:title>CMMCWebPageSectionGraphics21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_2_red.svg</image:loc><image:caption>number2red</image:caption><image:title>number2red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics.png</image:loc><image:caption>CMMCWebPageSectionGraphics</image:caption><image:title>CMMCWebPageSectionGraphics</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(3).png</image:loc><image:caption>CMMCWebPageSectionGraphics3</image:caption><image:title>CMMCWebPageSectionGraphics3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(6).png</image:loc><image:caption>CMMCWebPageSectionGraphics6</image:caption><image:title>CMMCWebPageSectionGraphics6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Audit%20Process%20Evidence-Based%20Assessment.png</image:loc><image:caption>CMMCAuditProcessEvidenceBasedAssessment</image:caption><image:title>CMMCAuditProcessEvidenceBasedAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ultimate%20guide%20CMMC%20mastery.png</image:loc><image:caption>ultimateguideCMMCmastery</image:caption><image:title>ultimateguideCMMCmastery</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(3)-1.png</image:loc><image:caption>CMMCWebPageSectionGraphics31</image:caption><image:title>CMMCWebPageSectionGraphics31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/managed%20detection%20response.png</image:loc><image:caption>CMMCRPOManagementDetectionandResponseMDR</image:caption><image:title>manageddetectionresponse</image:title></image:image><lastmod>2026-03-04</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/smart-budgeting-for-cmmc-2.0-mad-security-town-hall-webinar-recap-april-2025</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/capital-one-data-breach</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Capital%20One%20Data%20Breach%20Featured%20Image.png</image:loc><image:caption>CapitalOneDataBreach</image:caption><image:title>CapitalOneDataBreachFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/slack-300x82-1-1.png</image:loc><image:caption>slack300x8211</image:caption><image:title>slack300x8211</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/twitter_blog-300x179-1-1.png</image:loc><image:caption>TwitterPost</image:caption><image:title>twitterblog300x17911</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/vendor-management-in-todays-interconnected-world</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Vendor%20Management%20in%20Today%E2%80%99s%20Interconnected%20World%20Featured%20Image.png</image:loc><image:caption>VendorManagementinTodaysInterconnectedWorld</image:caption><image:title>VendorManagementinTodaysInterconnectedWorldFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/subcontractor-cmmc-survival-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(8)-1.png</image:loc><image:caption>WebsiteImages81</image:caption><image:title>WebsiteImages81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(5)-1.png</image:loc><image:caption>WebsiteImages51</image:caption><image:title>WebsiteImages51</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Website%20Images%20(2)-1.png</image:loc><image:caption>WebsiteImages21</image:caption><image:title>WebsiteImages21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20The%20Subcontractors%20Guide%20to%20Surviving%20CMMC%202.0%20How%20to%20Stay%20Eligible%20for%20Prime%20Contracts%20(2).png</image:loc><image:caption>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts2</image:caption><image:title>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20The%20Subcontractors%20Guide%20to%20Surviving%20CMMC%202.0%20How%20to%20Stay%20Eligible%20for%20Prime%20Contracts-1.png</image:loc><image:caption>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts1</image:caption><image:title>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(13).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages13</image:caption><image:title>MADSECCMMCAssessmentGuideImages13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(23).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages23</image:caption><image:title>MADSECCMMCAssessmentGuideImages23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(11).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages11</image:caption><image:title>MADSECCMMCAssessmentGuideImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20The%20Subcontractors%20Guide%20to%20Surviving%20CMMC%202.0%20How%20to%20Stay%20Eligible%20for%20Prime%20Contracts%20(4).png</image:loc><image:caption>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts4</image:caption><image:title>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Subcontractor%E2%80%99s%20Guide%20to%20Surviving%20CMMC%202.0%20How%20to%20Stay%20Eligible%20for%20Prime%20Contracts%20MAD%20Security%20Blog.png</image:loc><image:caption>TheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts</image:caption><image:title>TheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContractsMADSecurityBlog</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20The%20Subcontractors%20Guide%20to%20Surviving%20CMMC%202.0%20How%20to%20Stay%20Eligible%20for%20Prime%20Contracts%20(1)-1.png</image:loc><image:caption>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts11</image:caption><image:title>MADSECFTIMAGETheSubcontractorsGuidetoSurvivingCMMC20HowtoStayEligibleforPrimeContracts11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Future%20Proofing%20Cybersecurity%20Town%20Hall.svg</image:loc><image:caption>FutureProofingCybersecurityTownHall</image:caption><image:title>FutureProofingCybersecurityTownHall</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(18).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages18</image:caption><image:title>MADSECCMMCAssessmentGuideImages18</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2025-07-10</lastmod></url><url><loc>https://madsecurity.com/cmmc-for-dod-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Black%20Yellow%20and%20Blue%20Bold%20Modern%20Logistics%20Presentation(3).png</image:loc><image:caption>BlackYellowandBlueBoldModernLogisticsPresentation3</image:caption><image:title>BlackYellowandBlueBoldModernLogisticsPresentation3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_2_red.svg</image:loc><image:caption>number2red</image:caption><image:title>number2red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_3_red.svg</image:loc><image:caption>number3red</image:caption><image:title>number3red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_1_red.svg</image:loc><image:caption>number1red</image:caption><image:title>number1red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_9_red.svg</image:loc><image:caption>number9red</image:caption><image:title>number9red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_8_red.svg</image:loc><image:caption>number8red</image:caption><image:title>number8red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_5_red.svg</image:loc><image:caption>number5red</image:caption><image:title>number5red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_4_red.svg</image:loc><image:caption>number4red</image:caption><image:title>number4red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_6_red.svg</image:loc><image:caption>number6red</image:caption><image:title>number6red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Web%20Page%20Section%20Graphics%20(6).png</image:loc><image:caption>CMMCWebPageSectionGraphics6</image:caption><image:title>CMMCWebPageSectionGraphics6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_7_red.svg</image:loc><image:caption>number7red</image:caption><image:title>number7red</image:title></image:image><lastmod>2026-03-01</lastmod></url><url><loc>https://madsecurity.com/risk-and-compliance-services</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1089434819.jpg</image:loc><image:caption>shutterstock1089434819</image:caption><image:title>shutterstock1089434819</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/GRC%20Challenges%20Graphic.png</image:loc><image:caption>GRCChallengesGraphic</image:caption><image:title>GRCChallengesGraphic</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_69852688.jpg</image:loc><image:caption>shutterstock69852688</image:caption><image:title>shutterstock69852688</image:title></image:image><lastmod>2024-03-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/building-holistic-cybersecurity-beyond-cmmc-dib</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/1-1024x1024-2.png</image:loc><image:caption>11024x10242</image:caption><image:title>11024x10242</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Beyond%20CMMC%202.0:%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%C2%A0Featured%20Image.png</image:loc><image:caption>BeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContractsnbsp</image:caption><image:title>BeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContractsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/4-1024x1024-1.png</image:loc><image:caption>41024x10241</image:caption><image:title>41024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/6-1024x1024-1.png</image:loc><image:caption>61024x10241</image:caption><image:title>61024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Assessment%20Objectives%20Are%20Often%20Overlooked%20in%20CMMC%20Compliance%203.jpg</image:loc><image:caption>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance3</image:caption><image:title>AssessmentObjectivesAreOftenOverlookedinCMMCCompliance3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/3-1024x1024-1.png</image:loc><image:caption>31024x10241</image:caption><image:title>31024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/2-1024x1024-2.png</image:loc><image:caption>21024x10242</image:caption><image:title>21024x10242</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/5-1024x1024-1.png</image:loc><image:caption>51024x10241</image:caption><image:title>51024x10241</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/ransomware-defenses</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Screen-Shot-2019-02-01-at-1_49_40-PM-1.png</image:loc><image:caption>ScreenShot20190201at14940PM1</image:caption><image:title>ScreenShot20190201at14940PM1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Ransomware%20Defenses%20Featured%20Image.png</image:loc><image:caption>RansomwareDefenses</image:caption><image:title>RansomwareDefensesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/RW-1-1.png</image:loc><image:caption>RW11</image:caption><image:title>RW11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Registry-keys-1.png</image:loc><image:caption>Registrykeys1</image:caption><image:title>Registrykeys1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Files-Opened-1.png</image:loc><image:caption>FilesOpened1</image:caption><image:title>FilesOpened1</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/future-proofing-post-assessment-compliance-mad-security-town-hall-webinar-recap-august-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/9-2.png</image:loc><image:caption>92</image:caption><image:title>92</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Future-Proofing%20Post-Assessment%20Compliance.png</image:loc><image:caption>FutureProofingPostAssessmentCompliance</image:caption><image:title>FutureProofingPostAssessmentCompliance</image:title></image:image><lastmod>2025-12-22</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/shared-responsibility-matrix-cmmc</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20a%20Shared%20Responsibility%20Matrix%20(SRM)%20in%20CMMC%20and%20Why%20It%20Matters%20for%20DoD%20Contractors.png</image:loc><image:caption>WhatIsaSharedResponsibilityMatrixSRMinCMMCandWhyItMattersforDoDContractors</image:caption><image:title>WhatIsaSharedResponsibilityMatrixSRMinCMMCandWhyItMattersforDoDContractors</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(1)-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget11</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20Recap%20%E2%80%93%20March%202025%20(1).png</image:loc><image:caption>TownHallWebinarRecapMarch20251</image:caption><image:title>TownHallWebinarRecapMarch20251</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><lastmod>2026-02-18</lastmod></url><url><loc>https://madsecurity.com/townhall-webinar-maritime</loc><image:image><image:loc>https://madsecurity.com/hubfs/Top-250-MSSP_Badge-2025.webp</image:loc><image:caption>Top250MSSPBadge2025</image:caption><image:title>Top250MSSPBadge2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cliff%20Neve%20Town%20Hall%20Maritime.png</image:loc><image:caption>CliffNeveMADSecurityMaritimeTownHallWebinar</image:caption><image:title>CliffNeveTownHallMaritime</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/webinars/cyber%20maritime%20technology%20ocean.jpg</image:loc><image:caption>cybermaritimetechnologyocean</image:caption><image:title>cybermaritimetechnologyocean</image:title></image:image><lastmod>2026-03-12</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/outsourcing-cybersecurity-mssp-smart</loc><image:image><image:loc>https://madsecurity.com/hubfs/Cybersecurity%20Cost-Effectiveness.png</image:loc><image:caption>CybersecurityCostEffectiveness</image:caption><image:title>CybersecurityCostEffectiveness</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/continuous%20monitoring.png</image:loc><image:caption>continuousmonitoring</image:caption><image:title>continuousmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Why%20Outsourcing%20Cybersecurity%20to%20a%20Managed%20Security%20Service%20Provider%20(MSSP)%20is%20a%20Smart%20Move%20for%20Government%20and%20Defense%20Contractors%20Featured%20Image.png</image:loc><image:caption>WhyOutsourcingCybersecuritytoaManagedSecurityServiceProviderMSSPisaSmartMoveforGovernmentandDefenseContractors</image:caption><image:title>WhyOutsourcingCybersecuritytoaManagedSecurityServiceProviderMSSPisaSmartMoveforGovernmentandDefenseContractorsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-partners-with-opentext</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Partners%20with%20OpenText%20Response%20to%20Improve%20Response%20Time%20to%20Cyber%20Threats%20and%20Shrink%20the%20Attack%20Surface%20Featured%20Image.png</image:loc><image:caption>MADSecurityPartnerswithOpenTextResponsetoImproveResponseTimetoCyberThreatsandShrinktheAttackSurfaceFeaturedImage</image:caption><image:title>MADSecurityPartnerswithOpenTextResponsetoImproveResponseTimetoCyberThreatsandShrinktheAttackSurfaceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cyber-security-impacts-of-financial-institution-organic-growth-strategies</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cyber%20Security%20Impacts%20of%20Financial%20Institution%20Organic%20Growth%20Strategies%20Featured%20Image.png</image:loc><image:caption>CyberSecurityImpactsofFinancialInstitutionOrganicGrowthStrategies</image:caption><image:title>CyberSecurityImpactsofFinancialInstitutionOrganicGrowthStrategiesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-recognized-as-contender-for-2024-best-places-to-work-award</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20Best%20Places%20to%20Work%20Contender%20240513%20News%20Featured%20Image-1.png</image:loc><image:caption>MADSecurityBestPlacestoWorkContender240513NewsFeaturedImage1</image:caption><image:title>MADSecurityBestPlacestoWorkContender240513NewsFeaturedImage1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/2024-BP2W-Contender-art-SQ.jpg</image:loc><image:caption>2024BP2WContenderartSQ</image:caption><image:title>2024BP2WContenderartSQ</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/cyber-security-newsletter</loc><image:image><image:loc>https://madsecurity.com/hubfs/Newsletter%20Images%20and%20Graphics/Aug%202025%20MAD%20Security%20Newsletter%20email%20banner.png</image:loc><image:caption>Aug2025MADSecurityNewsletteremailbanner</image:caption><image:title>Aug2025MADSecurityNewsletteremailbanner</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Dark%20Blue%20Internet%20Technology%20Presentation.png</image:loc><image:caption>DarkBlueInternetTechnologyPresentation</image:caption><image:title>DarkBlueInternetTechnologyPresentation</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/check_red.svg</image:loc><image:caption>checkred</image:caption><image:title>checkred</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cyber%20Security%20newsletter.png</image:loc><image:caption>CyberSecuritynewsletter</image:caption><image:title>CyberSecuritynewsletter</image:title></image:image><lastmod>2025-08-12</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/8-best-practices-for-managing-cyber-risk</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/fraud-scam-phishing-caution-deception-concept-2-edited-1-scaled-1.jpg</image:loc><image:caption>fraudscamphishingcautiondeceptionconcept2edited1scaled1</image:caption><image:title>fraudscamphishingcautiondeceptionconcept2edited1scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/close-up-laptop-with-lock-chain-1-edited-scaled-1.jpg</image:loc><image:caption>closeuplaptopwithlockchain1editedscaled1</image:caption><image:title>closeuplaptopwithlockchain1editedscaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/8%20Best%20Practices%20for%20Managing%20Cyber%20Risk%20Featured%20Image.png</image:loc><image:caption>8BestPracticesforManagingCyberRisk</image:caption><image:title>8BestPracticesforManagingCyberRiskFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-combating-nation-state-cyber-threats-defense-industrial-base</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1-1024x827-1.png</image:loc><image:caption>MADSECBlogImages11024x8271</image:caption><image:title>MADSECBlogImages11024x8271</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-aa-1024x668-1.png</image:loc><image:caption>MADSECBlogImagesaa1024x6681</image:caption><image:title>MADSECBlogImagesaa1024x6681</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20and%20Combating%20Nation-State%20Cyber%20Threats:%20An%20In-depth%20Guide%20for%20the%20Defense%20Industrial%20Base%C2%A0Featured%20Image.png</image:loc><image:caption>UnderstandingandCombatingNationStateCyberThreatsAnIndepthGuidefortheDefenseIndustrialBasenbsp</image:caption><image:title>UnderstandingandCombatingNationStateCyberThreatsAnIndepthGuidefortheDefenseIndustrialBaseFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1-1024x576-1.png</image:loc><image:caption>MADSECBlogImages11024x5761</image:caption><image:title>MADSECBlogImages11024x5761</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/managed-security-services</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1724713912.jpg</image:loc><image:caption>shutterstock1724713912</image:caption><image:title>shutterstock1724713912</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/User%20Awareness%20Training.jpg</image:loc><image:caption>UserAwarenessTraining</image:caption><image:title>UserAwarenessTraining</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Virtual%20Compliance%20Manager.jpg</image:loc><image:caption>VirtualComplianceManager</image:caption><image:title>VirtualComplianceManager</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/check-1.svg</image:loc><image:caption>check1</image:caption><image:title>check1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/jdakjdasjda-e1621884776514.png</image:loc><image:caption>jdakjdasjdae1621884776514</image:caption><image:title>jdakjdasjdae1621884776514</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1074975773-jpg.jpeg</image:loc><image:caption>shutterstock1074975773jpg</image:caption><image:title>shutterstock1074975773jpg</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Phishing.jpg</image:loc><image:caption>Phishing</image:caption><image:title>Phishing</image:title></image:image><lastmod>2024-10-05</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/navigating-maritimebr-facility-cybersecuritybrstrategies-for-a-resilient-future</loc><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-1.png</image:loc><image:caption>ContactUs1</image:caption><image:title>ContactUs1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Navigating%20Maritime%20Facility%20Cybersecurity:%20Strategies%20for%20a%20Resilient%20Future%20Featured%20Image.png</image:loc><image:caption>NavigatingMaritimeFacilityCybersecurityStrategiesforaResilientFuture</image:caption><image:title>NavigatingMaritimeFacilityCybersecurityStrategiesforaResilientFutureFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Pre-Assessment-1.png</image:loc><image:caption>CMMCPreAssessment1</image:caption><image:title>CMMCPreAssessment1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Boats%20in%20the%20port%20of%20Miami%20at%20sunset.jpeg</image:loc><image:caption>BoatsintheportofMiamiatsunset</image:caption><image:title>BoatsintheportofMiamiatsunset</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cyber-vulnerabilities-to-dod-systems-may-include-these-top-risks</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/phishing%20attacks.png</image:loc><image:caption>phishingattacks</image:caption><image:title>phishingattacks</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Today%E2%80%99s%20Cyber%20Vulnerabilities%20to%20DOD%20Systems%20May%20Include%20These%20Top%20Risks%20Featured%20Image.png</image:loc><image:caption>TodaysCyberVulnerabilitiestoDODSystemsMayIncludeTheseTopRisks</image:caption><image:title>TodaysCyberVulnerabilitiestoDODSystemsMayIncludeTheseTopRisksFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/technical-testing</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_112274039.jpg</image:loc><image:caption>shutterstock112274039</image:caption><image:title>shutterstock112274039</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1519162145.jpg</image:loc><image:caption>shutterstock1519162145</image:caption><image:title>shutterstock1519162145</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_680078878-scaled-pdtcej6mwinmi8m3xqjqodcmzjvkee1vh5gt6a7lxk.jpg</image:loc><image:caption>shutterstock680078878scaledpdtcej6mwinmi8m3xqjqodcmzjvkee1vh5gt6a7lxk</image:caption><image:title>shutterstock680078878scaledpdtcej6mwinmi8m3xqjqodcmzjvkee1vh5gt6a7lxk</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/diagram-pdtcey81xv87o009hx1rs9k0hptftjpkv7wkuplb60.jpg</image:loc><image:caption>diagrampdtcey81xv87o009hx1rs9k0hptftjpkv7wkuplb60</image:caption><image:title>diagrampdtcey81xv87o009hx1rs9k0hptftjpkv7wkuplb60</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://madsecurity.com/what-is-a-cmmc-rpo</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(4).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO4</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO-1.png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO1</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(6).png</image:loc><image:caption>MADSECWebsiteImages6</image:caption><image:title>MADSECWebsiteImages6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(1).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO1</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(3).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO3</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20CMMC%20RPO%20PAGE%20(1).png</image:loc><image:caption>CopyofCMMCRPOPAGE1</image:caption><image:title>CopyofCMMCRPOPAGE1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(2).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO2</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(13).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages13</image:caption><image:title>MADSECCMMCAssessmentGuideImages13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(7).png</image:loc><image:caption>MADSECWebsiteImages7</image:caption><image:title>MADSECWebsiteImages7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(14).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages14</image:caption><image:title>MADSECCMMCAssessmentGuideImages14</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5)-1.png</image:loc><image:caption>MADSECWebsiteImages51</image:caption><image:title>MADSECWebsiteImages51</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(18).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages18</image:caption><image:title>MADSECCMMCAssessmentGuideImages18</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(24).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages24</image:caption><image:title>MADSECCMMCAssessmentGuideImages24</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(11).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages11</image:caption><image:title>MADSECCMMCAssessmentGuideImages11</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-compliance-written-policies-documentation-technical-controls</loc><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-Jun-17-2024-10-04-00-8928-AM.png</image:loc><image:caption>Untitleddesign2Jun1720241004008928AM</image:caption><image:title>Untitleddesign2Jun1720241004008928AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-3-300x150.png</image:loc><image:caption>MADSECBlogImages3300x150</image:caption><image:title>MADSECBlogImages3300x150</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cyber%20continous%20monitoring.jpg</image:loc><image:caption>cybercontinousmonitoring</image:caption><image:title>cybercontinousmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec13.jpg</image:loc><image:caption>Madsec13</image:caption><image:title>Madsec13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Why%20Written%20Policies%20Aren%E2%80%99t%20Enough:%20The%20Critical%20Role%20of%20Evidence%20and%20Documentation%20in%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>WhyWrittenPoliciesArentEnoughTheCriticalRoleofEvidenceandDocumentationinCMMCCompliance</image:caption><image:title>WhyWrittenPoliciesArentEnoughTheCriticalRoleofEvidenceandDocumentationinCMMCComplianceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec16.jpg</image:loc><image:caption>Madsec16</image:caption><image:title>Madsec16</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec10.jpg</image:loc><image:caption>Madsec10</image:caption><image:title>Madsec10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec12.jpg</image:loc><image:caption>Madsec12</image:caption><image:title>Madsec12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1hh-scaled-qa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c.jpg</image:loc><image:caption>MADSECBlogImages1hhscaledqa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c</image:caption><image:title>MADSECBlogImages1hhscaledqa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Madsec9.jpg</image:loc><image:caption>Madsec9</image:caption><image:title>Madsec9</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/top-250-mssps-2023-ranking</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Really-Grea-Site-1024x1024-1.png</image:loc><image:caption>ReallyGreaSite1024x10241</image:caption><image:title>ReallyGreaSite1024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%202023%20List%20of%20Top%20250%20MSSPs%20Featured%20Image.png</image:loc><image:caption>MADSecurityranksamongtheTop250MSSPs</image:caption><image:title>MADSecurityNamedtoMSSPAlerts2023ListofTop250MSSPsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/ensuring-cmmc-2.0-compliance-with-mobile-device-management-a-complete-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Configuring%20Security%20Controls.png</image:loc><image:caption>ConfiguringSecurityControls</image:caption><image:title>ConfiguringSecurityControls</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Monitor%20and%20Audit%20Device%20Activities.png</image:loc><image:caption>MonitorandAuditDeviceActivities</image:caption><image:title>MonitorandAuditDeviceActivities</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Future%20of%20MDM%20in%20Cybersecurity%20Compliance.png</image:loc><image:caption>FutureofMDMinCybersecurityComplianceCMMCMADSecurity</image:caption><image:title>FutureofMDMinCybersecurityCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Case%20Study%20MDM%20Implementation%20CMMC%202.0%20Compliance.png</image:loc><image:caption>CaseStudyMDMImplementationCMMC20Compliance</image:caption><image:title>CaseStudyMDMImplementationCMMC20Compliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Importance%20of%20Mobile%20Device%20Management%20in%20Cybersecurity%20Compliance.png</image:loc><image:caption>ImportanceofMobileDeviceManagementinCybersecurityCompliance</image:caption><image:title>ImportanceofMobileDeviceManagementinCybersecurityCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Generated%20Blog%20Post%20Images/Mobile%20Device%20Management%20(MDM)%20CMMC%20Compliance.png</image:loc><image:caption>MobileDeviceManagementMDMCMMCCompliance</image:caption><image:title>MobileDeviceManagementMDMCMMCCompliance</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Ensuring%20CMMC%20Compliance%20with%20Mobile%20Device%20Management%20A%20Complete%20Guide%20Featured%20Image.png</image:loc><image:caption>EnsuringCMMCCompliancewithMobileDeviceManagementACompleteGuide</image:caption><image:title>EnsuringCMMCCompliancewithMobileDeviceManagementACompleteGuideFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Overcoming%20Common%20Challenges%20in%20MDM%20Deployment.png</image:loc><image:caption>OvercomingCommonChallengesinMDMDeployment</image:caption><image:title>OvercomingCommonChallengesinMDMDeployment</image:title></image:image><lastmod>2025-12-02</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-cmmc</loc><image:image><image:loc>https://madsecurity.com/hubfs/What%20is%20CMMC.png</image:loc><image:caption>WhatisCMMC</image:caption><image:title>WhatisCMMC</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20CMMC%202.0%20Explained%20What%20DoD%20Contractors%20Need%20to%20Know%20to%20Stay%20Compliant%20and%20Win%20Contracts%20%20(1).png</image:loc><image:caption>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts1</image:caption><image:title>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20CMMC%202.0%20Explained%20What%20DoD%20Contractors%20Need%20to%20Know%20to%20Stay%20Compliant%20and%20Win%20Contracts%20%20(3).png</image:loc><image:caption>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts3</image:caption><image:title>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20CMMC%202.0%20Explained%20What%20DoD%20Contractors%20Need%20to%20Know%20to%20Stay%20Compliant%20and%20Win%20Contracts%20%20(2).png</image:loc><image:caption>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts2</image:caption><image:title>MADSECFTIMAGECMMC20ExplainedWhatDoDContractorsNeedtoKnowtoStayCompliantandWinContracts2</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/analyze-contracts-for-cui-references-handling-requirements</loc><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010%20(2).png</image:loc><image:caption>MadSecBlog102</image:caption><image:title>MadSecBlog102</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010%20(4).png</image:loc><image:caption>MadSecBlog104</image:caption><image:title>MadSecBlog104</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20How%20to%20Effectively%20Analyze%20Contracts%20for%20CUI%20References%20and%20Handling%20Requirements%20.png</image:loc><image:caption>CopyofHowtoEffectivelyAnalyzeContractsforCUIReferencesandHandlingRequirements</image:caption><image:title>CopyofHowtoEffectivelyAnalyzeContractsforCUIReferencesandHandlingRequirements</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010%20(5).png</image:loc><image:caption>MadSecBlog105</image:caption><image:title>MadSecBlog105</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010%20(1).png</image:loc><image:caption>MadSecBlog101</image:caption><image:title>MadSecBlog101</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20to%20Effectively%20Analyze%20Contracts%20for%20CUI%20References%20and%20Handling%20Requirements%20Featured%20Image.png</image:loc><image:caption>HowtoEffectivelyAnalyzeContractsforCUIReferencesandHandlingRequirements</image:caption><image:title>HowtoEffectivelyAnalyzeContractsforCUIReferencesandHandlingRequirementsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010.png</image:loc><image:caption>MadSecBlog10</image:caption><image:title>MadSecBlog10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%2010%20(3).png</image:loc><image:caption>MadSecBlog103</image:caption><image:title>MadSecBlog103</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-an-sprs-score</loc><image:image><image:loc>https://madsecurity.com/hubfs/9-2.png</image:loc><image:caption>92</image:caption><image:title>92</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(4).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-2.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/8-1.png</image:loc><image:caption>81</image:caption><image:title>81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(8)%20(1).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(2).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/SOC-as-a-Service%20from%20MAD%20Security-2.png</image:loc><image:caption>SOCasaServicefromMADSecurity2</image:caption><image:title>SOCasaServicefromMADSecurity2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(5).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation5</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20an%20SPRS%20Score%3F%20Understanding%20DFARS%20252.204-7012%2c%20NIST%20800-171%2c%20and%20CMMC%20Level%202%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2Requirements</image:caption><image:title>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2RequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/SOC-as-a-Service%20from%20MAD%20Security-1.png</image:loc><image:caption>SOCasaServicefromMADSecurity1</image:caption><image:title>SOCasaServicefromMADSecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/4-3.png</image:loc><image:caption>43</image:caption><image:title>43</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(7)-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:title></image:image><lastmod>2026-02-17</lastmod></url><url><loc>https://madsecurity.com/terms-privacy-policy</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2024-03-31</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/new-technology-implementations-for-financial-institutions</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Screen-Shot-2019-03-22-small-300x170-1-1.png</image:loc><image:caption>ScreenShot20190322small300x17011</image:caption><image:title>ScreenShot20190322small300x17011</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/New%20Technology%20Implementations%20for%20Financial%20Institutions%20Featured%20Image.png</image:loc><image:caption>NewTechnologyImplementationsforFinancialInstitutions</image:caption><image:title>NewTechnologyImplementationsforFinancialInstitutionsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-control-3-11-1-comprehensive-risk-assessments</loc><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity.png</image:loc><image:caption>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity</image:caption><image:title>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(2).png</image:loc><image:caption>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity2</image:caption><image:title>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cyber-Security-Icon-Concept-2-1-1024x632.jpeg</image:loc><image:caption>CyberSecurityIconConcept211024x632</image:caption><image:title>CyberSecurityIconConcept211024x632</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(3).png</image:loc><image:caption>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity3</image:caption><image:title>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(4).png</image:loc><image:caption>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity4</image:caption><image:title>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20CMMC%20Control%203.11.1:%20Comprehensive%20Risk%20Assessments%20Beyond%20Malicious%20Outsiders%20Featured%20Image.png</image:loc><image:caption>UnderstandingCMMCControl3111ComprehensiveRiskAssessmentsBeyondMaliciousOutsiders</image:caption><image:title>UnderstandingCMMCControl3111ComprehensiveRiskAssessmentsBeyondMaliciousOutsidersFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Copy%20of%20MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(1).png</image:loc><image:caption>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity1</image:caption><image:title>CopyofMADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity1</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/lsi-cmmc-success-story-defense-contractor-webinar</loc><image:image><image:loc>https://madsecurity.com/hubfs/Marty%20Taylor.png</image:loc><image:caption>MartyTaylor</image:caption><image:title>MartyTaylor</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Noel%20Vestal.png</image:loc><image:caption>NoelVestal</image:caption><image:title>NoelVestal</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Dave%20%E2%80%9CDJ%E2%80%9D%20Jackson.png</image:loc><image:caption>DaveDJJackson</image:caption><image:title>DaveDJJackson</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Brad%20Proctor%20Director%20of%20Operations.png</image:loc><image:caption>BradProctorDirectorofOperations</image:caption><image:title>BradProctorDirectorofOperations</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/From%20-71%20to%20110%20LSIs%20CMMC%20Success%20Story%20Featured%20Image%20v2.png</image:loc><image:caption>From71to110LSIsCMMCSuccessStoryMADSecurity</image:caption><image:title>From71to110LSIsCMMCSuccessStoryFeaturedImagev2</image:title></image:image><lastmod>2025-07-25</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/six-reasons-to-have-a-penetration-test-performed</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/penetration%20testing.png</image:loc><image:caption>penetrationtesting</image:caption><image:title>penetrationtesting</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Six%20Reasons%20to%20have%20a%20Penetration%20Test%20Performed%20Featured%20Image.png</image:loc><image:caption>SixReasonstohaveaPenetrationTestPerformed</image:caption><image:title>SixReasonstohaveaPenetrationTestPerformedFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/the-marriott-breach-lessons-learned-for-the-hotel-industry</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Marriott%20Breach%20Lessons%20Learned%20for%20the%20Hotel%20Industry%20Featured%20Image.png</image:loc><image:caption>TheMarriottBreachLessonsLearnedfortheHotelIndustry</image:caption><image:title>TheMarriottBreachLessonsLearnedfortheHotelIndustryFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-inheritable-controls-msp-misconception</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/SOC-as-a-Service%20from%20MAD%20Security-1.png</image:loc><image:caption>SOCasaServicefromMADSecurity1</image:caption><image:title>SOCasaServicefromMADSecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(7)-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Understanding%20Inheritable%20Controls%20in%20CMMC%20Assessments-%20Why%20%E2%80%9CMy%20MSP%20Handles%20It%E2%80%9D%20Isn%E2%80%99t%20Good%20EnoughBlog%20Post%20Featured%20Image.png</image:loc><image:caption>UnderstandingInheritableControlsinCMMCAssessmentsWhyMyMSPHandlesItIsntGoodEnoughBlogPostFeaturedImage</image:caption><image:title>UnderstandingInheritableControlsinCMMCAssessmentsWhyMyMSPHandlesItIsntGoodEnoughBlogPostFeaturedImage</image:title></image:image><lastmod>2025-12-09</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-level-1-vs-level-2-differences-requirements-assessments</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Level%201%20vs%20Level%202%20Explained%20Requirements%2c%20Costs%2c%20and%20Assessments%20Infographic(2).png</image:loc><image:caption>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessmentsInfographic2</image:caption><image:title>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessmentsInfographic2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(3).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO3</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(3)-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget31</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Level%201%20vs%20Level%202%20Explained%20Requirements%2c%20Costs%2c%20and%20Assessments.png</image:loc><image:caption>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessments</image:caption><image:title>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessments</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mastering-cybersecurity-compliance-federal-agencies</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/FREE%20CMMC%20PRE-ASSESSMENT.png</image:loc><image:caption>MADSecurityFREECMMCPreAssessment</image:caption><image:title>FREECMMCPREASSESSMENT</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1gg-qa4tkztuyiqcs1lntm5yszigdeh6eel6fspb2iqpx4.jpg</image:loc><image:caption>MADSECBlogImages1ggqa4tkztuyiqcs1lntm5yszigdeh6eel6fspb2iqpx4</image:caption><image:title>MADSECBlogImages1ggqa4tkztuyiqcs1lntm5yszigdeh6eel6fspb2iqpx4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Mastering%20Cybersecurity%20Compliance:%20Navigating%20M-21-31%20and%20Executive%20Order%2014028%20Featured%20Image.png</image:loc><image:caption>MasteringCybersecurityComplianceNavigatingM2131andExecutiveOrder14028</image:caption><image:title>MasteringCybersecurityComplianceNavigatingM2131andExecutiveOrder14028FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/shutterstock_1699780489-1-qce1j14gbzl1ay7oqrifloa0es3846ewbwvbx35c92.webp</image:loc><image:caption>shutterstock16997804891qce1j14gbzl1ay7oqrifloa0es3846ewbwvbx35c92</image:caption><image:title>shutterstock16997804891qce1j14gbzl1ay7oqrifloa0es3846ewbwvbx35c92</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1hh-scaled-qa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c.jpg</image:loc><image:caption>MADSECBlogImages1hhscaledqa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c</image:caption><image:title>MADSECBlogImages1hhscaledqa4tkhyxco1wngblpwg1zm0p32x7c5ma1cb2y9h77c</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-9-qibhxold27ze61jm1aepyoeucylha7uhkpa6jysa0o.png</image:loc><image:caption>MADSECBlogImages9qibhxold27ze61jm1aepyoeucylha7uhkpa6jysa0o</image:caption><image:title>MADSECBlogImages9qibhxold27ze61jm1aepyoeucylha7uhkpa6jysa0o</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-4-qa88c4a1s86g6akt8t0uau3h1t6gig7aoff5kegou0.png</image:loc><image:caption>MADSECWebsiteBlogImage4qa88c4a1s86g6akt8t0uau3h1t6gig7aoff5kegou0</image:caption><image:title>MADSECWebsiteBlogImage4qa88c4a1s86g6akt8t0uau3h1t6gig7aoff5kegou0</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/coast-guard-cybersecurity-training-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Training%20Your%20Crew%20Meeting%20the%20January%202026%20Cyber%20Training%20Deadline%20Featured%20Image.png</image:loc><image:caption>TrainingYourCrewMeetingtheJanuary2026CyberTrainingDeadline</image:caption><image:title>TrainingYourCrewMeetingtheJanuary2026CyberTrainingDeadlineFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/undefined-Sep-26-2025-12-29-31-9765-PM.png</image:loc><image:caption>undefinedSep2620251229319765PM</image:caption><image:title>undefinedSep2620251229319765PM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(2).png</image:loc><image:caption>MADSECHubSpotBlogImages2</image:caption><image:title>MADSECHubSpotBlogImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(5).png</image:loc><image:caption>MADSECWebsiteImages5</image:caption><image:title>MADSECWebsiteImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-2.png</image:loc><image:caption>MADSECHubSpotBlogImages12</image:caption><image:title>MADSECHubSpotBlogImages12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-2.png</image:loc><image:caption>MADSECHubSpotBlogImages2</image:caption><image:title>MADSECHubSpotBlogImages2</image:title></image:image><lastmod>2025-09-30</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-awarded-all-four-gsa-highly-adaptive-cybersecurity-services-hacs</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Awarded%20All%20Four%20GSA%20Highly%20Adaptive%20Cybersecurity%20Services%20(HACS)%20Featured%20Image.png</image:loc><image:caption>MADSecurityAwardedAllFourGSAHighlyAdaptiveCybersecurityServicesHACS</image:caption><image:title>MADSecurityAwardedAllFourGSAHighlyAdaptiveCybersecurityServicesHACSFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/false-claims-act-cybersecurity-dod-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(1).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow1</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(4).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow4</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(3).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow3</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/FCA%20Cybersecurity%20Enforcement.png</image:loc><image:caption>FCACybersecurityEnforcementMADSecurity</image:caption><image:title>FCACybersecurityEnforcement</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(2).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow2</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(5).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow5</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20FCA%20Enforcement%20What%20Every%20DoD%20Contractor%20Needs%20to%20Know%20(6).png</image:loc><image:caption>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow6</image:caption><image:title>MADSECFTIMAGEFCAEnforcementWhatEveryDoDContractorNeedstoKnow6</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-joins-the-360-compliance-alliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/Conway%20Quote%20360%20ADvanced%20240828.png</image:loc><image:caption>ConwayQuote360ADvanced240828</image:caption><image:title>ConwayQuote360ADvanced240828</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/MAD%20Security%20joins%20the%20360%20Advanced%20Compliance%20Alliance%20Featured%20Image%20240905.png</image:loc><image:caption>MADSecurityjoinsthe360AdvancedComplianceAllianceFeaturedImage240905</image:caption><image:title>MADSecurityjoinsthe360AdvancedComplianceAllianceFeaturedImage240905</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/6-essential-cybersecurity-best-practices-your-business-wont-want-to-miss</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/An%20Open%20Letter%20to%20Our%20Customers%20and%20Partners%20from%20MAD%20Security%20President%20Jeremy%20Conway%20Featured%20Image.png</image:loc><image:caption>AnOpenLettertoOurCustomersandPartnersfromMADSecurityPresidentJeremyConway</image:caption><image:title>AnOpenLettertoOurCustomersandPartnersfromMADSecurityPresidentJeremyConwayFeaturedImage</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/vendor-agnostic-cybersecurity-partners</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(4).png</image:loc><image:caption>MADSECHubSpotBlogImages4</image:caption><image:title>MADSECHubSpotBlogImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(3).png</image:loc><image:caption>MADSECHubSpotBlogImages3</image:caption><image:title>MADSECHubSpotBlogImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(2)-1.png</image:loc><image:caption>MADSECHubSpotBlogImages21</image:caption><image:title>MADSECHubSpotBlogImages21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Vendor-Dependent%20vs%20Vendor-Agnostic%20Cybersecurity%20Partners%20What%20Defense%20Contractors%20Need%20to%20Know%20Featured%20Image.png</image:loc><image:caption>VendorDependentvsVendorAgnosticCybersecurityPartnersWhatDefenseContractorsNeedtoKnow</image:caption><image:title>VendorDependentvsVendorAgnosticCybersecurityPartnersWhatDefenseContractorsNeedtoKnowFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-3.png</image:loc><image:caption>MADSECHubSpotBlogImages3</image:caption><image:title>MADSECHubSpotBlogImages3</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-mobilizes-maritime-industry-following-u.s.-coast-guard-cybersecurity-rule-implementation</loc><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/MAD%20Security%20Mobilizes%20Maritime%20Industry%20Following%20U.S.%20Coast%20Guard%20Cybersecurity%20Rule%20Implementation%20Cliff%20Neve%20quote.png</image:loc><image:caption>MADSecurityMobilizesMaritimeIndustryFollowingUSCoastGuardCybersecurityRuleImplementationCliffNevequote</image:caption><image:title>MADSecurityMobilizesMaritimeIndustryFollowingUSCoastGuardCybersecurityRuleImplementationCliffNevequote</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Mobilizes%20Maritime%20Industry%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>MADSecurityMobilizesMaritimeIndustryFollowingUSCoastGuardCybersecurityRuleImplementation</image:caption><image:title>MADSecurityMobilizesMaritimeIndustryBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-07-25</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/continuous-monitoring-cmmc-level-2-certification</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20BLOG%20IMAGE%20(5).png</image:loc><image:caption>MADSECBLOGIMAGE5</image:caption><image:title>MADSECBLOGIMAGE5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cyber%20compliance%20management.jpg</image:loc><image:caption>cybercompliancemanagement</image:caption><image:title>cybercompliancemanagement</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cyber%20continous%20monitoring.jpg</image:loc><image:caption>cybercontinousmonitoring</image:caption><image:title>cybercontinousmonitoring</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Mastering%20Continuous%20Monitoring%20for%20CMMC%20Level%202:%20Simplifying%20Compliance%20and%20Streamlining%20Security%20Reviews%20Featured%20Image.png</image:loc><image:caption>MasteringContinuousMonitoringforCMMCLevel2SimplifyingComplianceandStreamliningSecurityReviews</image:caption><image:title>MasteringContinuousMonitoringforCMMCLevel2SimplifyingComplianceandStreamliningSecurityReviewsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20BLOG%20IMAGE%20(4).png</image:loc><image:caption>MADSECBLOGIMAGE4</image:caption><image:title>MADSECBLOGIMAGE4</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/business-continuity-cybersecurity-solutions</loc><image:image><image:loc>https://madsecurity.com/hubfs/team-putting-cyber-security-plan-in-place.png</image:loc><image:caption>teamputtingcybersecurityplaninplace</image:caption><image:title>teamputtingcybersecurityplaninplace</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/working-together-to-protect-your-business-from-hackers.png</image:loc><image:caption>workingtogethertoprotectyourbusinessfromhackers</image:caption><image:title>workingtogethertoprotectyourbusinessfromhackers</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/Puzzle.png</image:loc><image:caption>Puzzle</image:caption><image:title>Puzzle</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/secure-your-businsess-from-hackers-on-computer.png</image:loc><image:caption>secureyourbusinsessfromhackersoncomputer</image:caption><image:title>secureyourbusinsessfromhackersoncomputer</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/team-managed-security-solution.png</image:loc><image:caption>teammanagedsecuritysolution</image:caption><image:title>teammanagedsecuritysolution</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog</loc><image:image><image:loc>https://madsecurity.com/hubfs/DFARS%20Clause%20Renumbering%20Under%20the%20CMMC%20Deviation%20What%20Contractors%20Need%20to%20Know.webp</image:loc><image:caption>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:caption><image:title>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Maritime%20Cybersecurity%20Compliance%20Mandate%20Coast%20Guard%20Final%20Rule%20Explained-1.png</image:loc><image:caption>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:caption><image:title>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Incident%20Response-%20An%20Integral%20Part%20of%20the%20CMMC%202.0%20Lifecycle%20%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>IncidentResponseAnIntegralPartoftheCMMC20Lifecycle</image:caption><image:title>IncidentResponseAnIntegralPartoftheCMMC20LifecycleBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Level%201%20vs%20Level%202%20Explained%20Requirements%2c%20Costs%2c%20and%20Assessments.png</image:loc><image:caption>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessments</image:caption><image:title>CMMCLevel1vsLevel2ExplainedRequirementsCostsandAssessments</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/From%20Policy%20to%20Pier%20MAD%20Security%20Maritime%20Town%20Hall%20Webinar%20Recap%20%E2%80%93%20March%202026-1.png</image:loc><image:caption>FromPolicytoPierMADSecurityMaritimeTownHallWebinarRecapMarch20261</image:caption><image:title>FromPolicytoPierMADSecurityMaritimeTownHallWebinarRecapMarch20261</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20an%20SPRS%20Score%3F%20Understanding%20DFARS%20252.204-7012%2c%20NIST%20800-171%2c%20and%20CMMC%20Level%202%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2Requirements</image:caption><image:title>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2RequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1455362342.jpg</image:loc><image:caption>shutterstock1455362342</image:caption><image:title>shutterstock1455362342</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20Is%20an%20SSP%20A%20Contractor%E2%80%99s%20Guide%20to%20Building%20a%20Compliant%20System%20Security%20Plan.png</image:loc><image:caption>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:caption><image:title>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20FCI%3F%20Understanding%20Federal%20Contract%20Information%20And%20Its%20Cybersecurity%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirements</image:caption><image:title>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20a%20Shared%20Responsibility%20Matrix%20(SRM)%20in%20CMMC%20and%20Why%20It%20Matters%20for%20DoD%20Contractors.png</image:loc><image:caption>WhatIsaSharedResponsibilityMatrixSRMinCMMCandWhyItMattersforDoDContractors</image:caption><image:title>WhatIsaSharedResponsibilityMatrixSRMinCMMCandWhyItMattersforDoDContractors</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20Controlled%20Unclassified%20Information%20A%20DoD%20Contractor%E2%80%99s%20Guide.png</image:loc><image:caption>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:caption><image:title>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Is%20More%20Than%20Cybersecurity%20Aligning%20Compliance%20with%20Business%2c%20Culture%2c%20and%20Contracts%20%7C%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20February%202026.png</image:loc><image:caption>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:caption><image:title>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Who%20Is%20Responsible%20for%20Protecting%20Controlled%20Unclassified%20Information.png</image:loc><image:caption>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:caption><image:title>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:title></image:image><lastmod>2026-03-03</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-maritime-town-hall-recap-january-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/New%20Year%20Compliance%20Kickstart-%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20January%202026%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>NewYearComplianceKickstartMADSecurityTownHallRecapJanuary2026</image:caption><image:title>NewYearComplianceKickstartMADSecurityTownHallRecapJanuary2026BlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><lastmod>2026-01-30</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cybersecurity-spotlight-jeremy-conway-mad-security</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cybersecurity%20Spotlight%20Jeremy%20Conway%2c%20MAD%20Security%20Featured%20Image.png</image:loc><image:caption>CybersecuritySpotlightJeremyConwayMADSecurity</image:caption><image:title>CybersecuritySpotlightJeremyConwayMADSecurityFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Image-uploaded-from-iOS-248x300.jpg</image:loc><image:caption>ImageuploadedfromiOS248x300</image:caption><image:title>ImageuploadedfromiOS248x300</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/leadership-team</loc><image:image><image:loc>https://madsecurity.com/hubfs/Brad-Proctor-Headshot.jpg</image:loc><image:caption>BradProctorHeadshot</image:caption><image:title>BradProctorHeadshot</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/2-3.png</image:loc><image:caption>23</image:caption><image:title>23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Cliff-Neve.png</image:loc><image:caption>CliffNeve</image:caption><image:title>CliffNeve</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1798186051.jpg</image:loc><image:caption>shutterstock1798186051</image:caption><image:title>shutterstock1798186051</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Jeremy-Conway.png</image:loc><image:caption>JeremyConway</image:caption><image:title>JeremyConway</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Screenshot%202024-05-20%20at%204.08.46%20PM.png</image:loc><image:caption>Screenshot20240520at40846PM</image:caption><image:title>Screenshot20240520at40846PM</image:title></image:image><lastmod>2024-12-06</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-scoping-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/headway-5QgIuuBxKwM-unsplash-1-scaled-qiaxjr7ys5b3fiyezmaz4hl4z0h9g16nll4lu3iheo-1.jpg</image:loc><image:caption>headway5QgIuuBxKwMunsplash1scaledqiaxjr7ys5b3fiyezmaz4hl4z0h9g16nll4lu3iheo1</image:caption><image:title>headway5QgIuuBxKwMunsplash1scaledqiaxjr7ys5b3fiyezmaz4hl4z0h9g16nll4lu3iheo1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20CMMC%20Scoping:%20A%20Comprehensive%20Guide%20to%20System%20Definition%C2%A0Featured%20Image.png</image:loc><image:caption>UnderstandingCMMCScopingAComprehensiveGuidetoSystemDefinitionnbsp</image:caption><image:title>UnderstandingCMMCScopingAComprehensiveGuidetoSystemDefinitionFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/alex-kotliarskyi-ourQHRTE2IM-unsplash-scaled-qiaxkzedpczkl768tnefvofsw4fiht21fnsfe3oza8-1.jpg</image:loc><image:caption>alexkotliarskyiourQHRTE2IMunsplashscaledqiaxkzedpczkl768tnefvofsw4fiht21fnsfe3oza81</image:caption><image:title>alexkotliarskyiourQHRTE2IMunsplashscaledqiaxkzedpczkl768tnefvofsw4fiht21fnsfe3oza81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/cherrydeck-rMILC1PIwM0-unsplash-scaled-qiaxroywhs69gzfcn1tk6hh9k5cug0p20vg7q7qsv4-1.jpg</image:loc><image:caption>cherrydeckrMILC1PIwM0unsplashscaledqiaxroywhs69gzfcn1tk6hh9k5cug0p20vg7q7qsv41</image:caption><image:title>cherrydeckrMILC1PIwM0unsplashscaledqiaxroywhs69gzfcn1tk6hh9k5cug0p20vg7q7qsv41</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-are-the-cmmc-requirements</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cybersecurity%20Assessment.jpeg</image:loc><image:caption>CMMCCybersecurityAssessmentAudit</image:caption><image:title>CybersecurityAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Department%20of%20Defense%20(DoD)%20Pentagon.jpeg</image:loc><image:caption>MADSecurityCMMCDepartmentofDefense</image:caption><image:title>DepartmentofDefenseDoDPentagon</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/navigating-cmmc-compliance-challenges-for-dod-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/balancing%20costs%20and%20business%20efficiency.png</image:loc><image:caption>balancingcostsandbusinessefficiency</image:caption><image:title>balancingcostsandbusinessefficiency</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Navigating%20Upper%20Management%20and%20Organizational%20Challenges%20in%20CMMC%20Compliance:%20How%20Employees%20Can%20Address%20Pushback%20While%20Ensuring%20DoD%20Business%20Success%20Featured%20Image.png</image:loc><image:caption>NavigatingUpperManagementandOrganizationalChallengesinCMMCComplianceHowEmployeesCanAddressPushbackWhileEnsuringDoDBusinessSuccess</image:caption><image:title>NavigatingUpperManagementandOrganizationalChallengesinCMMCComplianceHowEmployeesCanAddressPushbackWhileEnsuringDoDBusinessSuccessFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Strategies%20for%20Communicating%20Compliance%20Priorities%20to%20Upper%20Management.png</image:loc><image:caption>StrategiesforCommunicatingCompliancePrioritiestoUpperManagement</image:caption><image:title>StrategiesforCommunicatingCompliancePrioritiestoUpperManagement</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec1.jpg</image:loc><image:caption>MadSec1</image:caption><image:title>MadSec1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/The%20Risks%20of%20Prioritizing%20Cost-Savings%20Over%20Compliance.png</image:loc><image:caption>TheRisksofPrioritizingCostSavingsOverCompliance</image:caption><image:title>TheRisksofPrioritizingCostSavingsOverCompliance</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/case-study/potter-electric</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-level-2-compliance-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-5-1-1024x1024-1.png</image:loc><image:caption>MADSECIcons511024x10241</image:caption><image:title>MADSECIcons511024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Five%20Steps%20to%20Achieve%20CMMC%202.0%20Level%202%20Compliance:%20A%20Comprehensive%20Guide%C2%A0Featured%20Image.png</image:loc><image:caption>FiveStepstoAchieveCMMC20Level2ComplianceAComprehensiveGuidenbsp</image:caption><image:title>FiveStepstoAchieveCMMC20Level2ComplianceAComprehensiveGuideFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-4-1024x1024-1.png</image:loc><image:caption>MADSECIcons41024x10241</image:caption><image:title>MADSECIcons41024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-5-1024x1024-1.png</image:loc><image:caption>MADSECIcons51024x10241</image:caption><image:title>MADSECIcons51024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-3-1024x1024-1.png</image:loc><image:caption>MADSECIcons31024x10241</image:caption><image:title>MADSECIcons31024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-2-1024x1024-1.png</image:loc><image:caption>MADSECIcons21024x10241</image:caption><image:title>MADSECIcons21024x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Icons-1-1-1024x1024-1.png</image:loc><image:caption>MADSECIcons111024x10241</image:caption><image:title>MADSECIcons111024x10241</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-2-0-compliance-and-cis-18-for-dod-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20DOD%20Contractors%20Need%20to%20Know%20About%20CMMC%202.0%20and%20CIS-18%20Featured%20Image.png</image:loc><image:caption>WhatDODContractorsNeedtoKnowAboutCMMC20andCIS18</image:caption><image:title>WhatDODContractorsNeedtoKnowAboutCMMC20andCIS18FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/cmmc2-levels-stv2.png</image:loc><image:caption>cmmc2levelsstv2</image:caption><image:title>cmmc2levelsstv2</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/the-cmmc-blog</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-09-29</lastmod></url><url><loc>https://madsecurity.com/about-us</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_572801404-1-pdtcei8wd90fnveoegw2e2aa1kgyy7cyfa9szctmuw.jpg</image:loc><image:caption>shutterstock5728014041pdtcei8wd90fnveoegw2e2aa1kgyy7cyfa9szctmuw</image:caption><image:title>shutterstock5728014041pdtcei8wd90fnveoegw2e2aa1kgyy7cyfa9szctmuw</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/bcd31754-af20-401b-a5ac-262b236b35db.svg</image:loc><image:caption>bcd31754af20401ba5ac262b236b35db</image:caption><image:title>bcd31754af20401ba5ac262b236b35db</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_148106435.jpg</image:loc><image:caption>shutterstock148106435</image:caption><image:title>shutterstock148106435</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/business%20partners%2c%20partnership%20concept%20with%20two%20businessman%20handshake.jpeg</image:loc><image:caption>businesspartnerspartnershipconceptwithtwobusinessmanhandshake</image:caption><image:title>businesspartnerspartnershipconceptwithtwobusinessmanhandshake</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_8_red.svg</image:loc><image:caption>number8red</image:caption><image:title>number8red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Top%20250%20MSSP%202024.png</image:loc><image:caption>2024Top250MSSP</image:caption><image:title>Top250MSSP2024</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1243021003.jpg</image:loc><image:caption>shutterstock1243021003</image:caption><image:title>shutterstock1243021003</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/2021%20Top%20250%20MSSPs%20Button%20Logo.jpeg</image:loc><image:caption>2021Top250MSSPsButtonLogo</image:caption><image:title>2021Top250MSSPsButtonLogo</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_1_red.svg</image:loc><image:caption>number1red</image:caption><image:title>number1red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ee22adad-7ff0-45bf-8f40-5efbc703bd30.svg</image:loc><image:caption>ee22adad7ff045bf8f405efbc703bd30</image:caption><image:title>ee22adad7ff045bf8f405efbc703bd30</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/7b16b77a-b3ac-4d1d-b39f-20d72d1f41b0.svg</image:loc><image:caption>7b16b77ab3ac4d1db39f20d72d1f41b0</image:caption><image:title>7b16b77ab3ac4d1db39f20d72d1f41b0</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_5_red.svg</image:loc><image:caption>number5red</image:caption><image:title>number5red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/outline.svg</image:loc><image:caption>outline</image:caption><image:title>outline</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/check_red.svg</image:loc><image:caption>checkred</image:caption><image:title>checkred</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Future%20Proofing%20Cybersecurity%20Town%20Hall.svg</image:loc><image:caption>FutureProofingCybersecurityTownHall</image:caption><image:title>FutureProofingCybersecurityTownHall</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_7_red.svg</image:loc><image:caption>number7red</image:caption><image:title>number7red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_6_red.svg</image:loc><image:caption>number6red</image:caption><image:title>number6red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/54f36a47-7565-46ee-a2fe-31802a7f95aa.svg</image:loc><image:caption>54f36a47756546eea2fe31802a7f95aa</image:caption><image:title>54f36a47756546eea2fe31802a7f95aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Canva%20Image.png</image:loc><image:caption>CanvaImage</image:caption><image:title>CanvaImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_3_red.svg</image:loc><image:caption>number3red</image:caption><image:title>number3red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD-SEC.png</image:loc><image:caption>MADSEC</image:caption><image:title>MADSEC</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_2_red.svg</image:loc><image:caption>number2red</image:caption><image:title>number2red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_4_red.svg</image:loc><image:caption>number4red</image:caption><image:title>number4red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/number_9_red.svg</image:loc><image:caption>number9red</image:caption><image:title>number9red</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/2022%20Top%20250%20MSSPs%20Button%20Logo.png</image:loc><image:caption>2022Top250MSSPsButtonLogo</image:caption><image:title>2022Top250MSSPsButtonLogo</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/2023%20MSSP%20Alert%20Top%20250%20MSSPs.png</image:loc><image:caption>2023MSSPAlertTop250MSSPs</image:caption><image:title>2023MSSPAlertTop250MSSPs</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><lastmod>2026-03-04</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/how-to-build-a-winning-cybersecurity-program</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20to%20Build%20a%20Winning%20Cybersecurity%20Program%20Featured%20Image.png</image:loc><image:caption>HowtoBuildaWinningCybersecurityProgram</image:caption><image:title>HowtoBuildaWinningCybersecurityProgramFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cybersecurity-5-actions-dod-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(1)-4.png</image:loc><image:caption>Untitleddesign14</image:caption><image:title>Untitleddesign14</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(3)-2.png</image:loc><image:caption>Untitleddesign32</image:caption><image:title>Untitleddesign32</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-4.png</image:loc><image:caption>Untitleddesign24</image:caption><image:title>Untitleddesign24</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Strengthening%20Cybersecurity:%205%20Critical%20Actions%20for%20DoD%20and%20Government%20Contractors%20Featured%20Image.png</image:loc><image:caption>StrengtheningCybersecurity5CriticalActionsforDoDandGovernmentContractors</image:caption><image:title>StrengtheningCybersecurity5CriticalActionsforDoDandGovernmentContractorsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/case-study/signal-systems</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/maritime-mssp-soc-service</loc><image:image><image:loc>https://madsecurity.com/hubfs/maksym-kaharlytskyi-851_Smpkk-U-unsplash-scaled.jpg</image:loc><image:caption>maksymkaharlytskyi851SmpkkUunsplashscaled</image:caption><image:title>maksymkaharlytskyi851SmpkkUunsplashscaled</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/111-q65uhl7abq48ot5ns5lob3egik4qmfis30sz0tlw2a.png</image:loc><image:caption>111q65uhl7abq48ot5ns5lob3egik4qmfis30sz0tlw2a</image:caption><image:title>111q65uhl7abq48ot5ns5lob3egik4qmfis30sz0tlw2a</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/zxc2-q6hsgy74ku7232is6p05ifjfnebxsiifaquk747dzm.png</image:loc><image:caption>zxc2q6hsgy74ku7232is6p05ifjfnebxsiifaquk747dzm</image:caption><image:title>zxc2q6hsgy74ku7232is6p05ifjfnebxsiifaquk747dzm</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/zxc-q6hshgzwdiwsj9rh4x4owasnj3ra2gl21bw9snfij6.png</image:loc><image:caption>zxcq6hshgzwdiwsj9rh4x4owasnj3ra2gl21bw9snfij6</image:caption><image:title>zxcq6hshgzwdiwsj9rh4x4owasnj3ra2gl21bw9snfij6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/jacob-meissner-oGafvInnHlY-unsplash-800x450.jpg</image:loc><image:caption>jacobmeissneroGafvInnHlYunsplash800x450</image:caption><image:title>jacobmeissneroGafvInnHlYunsplash800x450</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/maritime_technology_-scaled.jpg</image:loc><image:caption>maritimetechnologyscaled</image:caption><image:title>maritimetechnologyscaled</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/zxc1-q6hsfq0pnmikxeaycnwor8orqadoqqn1go6qn40w42.png</image:loc><image:caption>zxc1q6hsfq0pnmikxeaycnwor8orqadoqqn1go6qn40w42</image:caption><image:title>zxc1q6hsfq0pnmikxeaycnwor8orqadoqqn1go6qn40w42</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/william-william-NndKt2kF1L4-unsplash-1200x700.jpg</image:loc><image:caption>williamwilliamNndKt2kF1L4unsplash1200x700</image:caption><image:title>williamwilliamNndKt2kF1L4unsplash1200x700</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/peto-tj-UykTzs_VWfc-unsplash-800x450.jpg</image:loc><image:caption>petotjUykTzsVWfcunsplash800x450</image:caption><image:title>petotjUykTzsVWfcunsplash800x450</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/diego-fernandez-6Vg8N8u61aI-unsplash-800x450.jpg</image:loc><image:caption>diegofernandez6Vg8N8u61aIunsplash800x450</image:caption><image:title>diegofernandez6Vg8N8u61aIunsplash800x450</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/zxc3-q6hsg7vn9h711zl0gdmlkm6j0lxnszlxv4kyrdaetu.png</image:loc><image:caption>zxc3q6hsg7vn9h711zl0gdmlkm6j0lxnszlxv4kyrdaetu</image:caption><image:title>zxc3q6hsg7vn9h711zl0gdmlkm6j0lxnszlxv4kyrdaetu</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/11-q65uhk9g4w2yd770xn71qlmzx69deqf1qw5hjjna8i.png</image:loc><image:caption>11q65uhk9g4w2yd770xn71qlmzx69deqf1qw5hjjna8i</image:caption><image:title>11q65uhk9g4w2yd770xn71qlmzx69deqf1qw5hjjna8i</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20sitepage%20images/AI%20Intelligence.png</image:loc><image:caption>AIIntelligence</image:caption><image:title>AIIntelligence</image:title></image:image><lastmod>2024-06-04</lastmod></url><url><loc>https://madsecurity.com/register-a-deal</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MadSec%20Blog%203.jpg</image:loc><image:caption>MadSecBlog3</image:caption><image:title>MadSecBlog3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/2023%20MSSP%20Alert%20Top%20250%20MSSPs.png</image:loc><image:caption>2023MSSPAlertTop250MSSPs</image:caption><image:title>2023MSSPAlertTop250MSSPs</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><lastmod>2024-06-06</lastmod></url><url><loc>https://madsecurity.com/case-study</loc><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1699780489-1.webp</image:loc><image:caption>shutterstock16997804891</image:caption><image:title>shutterstock16997804891</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-security-culture-leadership-role</loc><image:image><image:loc>https://madsecurity.com/hubfs/check_red.svg</image:loc><image:caption>checkred</image:caption><image:title>checkred</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/7.png</image:loc><image:caption>7</image:caption><image:title>7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(4).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages4</image:caption><image:title>MADSECCMMCAssessmentGuideImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Why%20Security%20is%20a%20Shared%20Responsibility%20Across%20All%20Departments.png</image:loc><image:caption>WhySecurityisaSharedResponsibilityAcrossAllDepartments</image:caption><image:title>WhySecurityisaSharedResponsibilityAcrossAllDepartments</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(5).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages5</image:caption><image:title>MADSECCMMCAssessmentGuideImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/6-1.png</image:loc><image:caption>61</image:caption><image:title>61</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Understanding%20Security%20Culture%20and%20Its%20Seven%20Dimensions.png</image:loc><image:caption>UnderstandingSecurityCultureandItsSevenDimensions</image:caption><image:title>UnderstandingSecurityCultureandItsSevenDimensions</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success.png</image:loc><image:caption>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success</image:caption><image:title>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Building%20a%20Sustainable%20CMMC%20Security%20Culture%20with%20Measurable%20Results%20.png</image:loc><image:caption>BuildingaSustainableCMMCSecurityCulturewithMeasurableResults</image:caption><image:title>BuildingaSustainableCMMCSecurityCulturewithMeasurableResults</image:title></image:image><lastmod>2025-10-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-dfars-7024</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1024x512-1.png</image:loc><image:caption>MADSECBlogImages1024x5121</image:caption><image:title>MADSECBlogImages1024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20DFARS%207024:%20A%20Comprehensive%20Guide%20for%20Defense%20Contractors%20Featured%20Image.png</image:loc><image:caption>UnderstandingDFARS7024AComprehensiveGuideforDefenseContractors</image:caption><image:title>UnderstandingDFARS7024AComprehensiveGuideforDefenseContractorsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-6-1-1024x512-1.png</image:loc><image:caption>MADSECBlogImages611024x5121</image:caption><image:title>MADSECBlogImages611024x5121</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/cmmc-consulting</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(1).png</image:loc><image:caption>CMMCCONSULTINGPAGE1</image:caption><image:title>CMMCCONSULTINGPAGE1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(18).png</image:loc><image:caption>CMMCCONSULTINGPAGE18</image:caption><image:title>CMMCCONSULTINGPAGE18</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(4).png</image:loc><image:caption>CMMCCONSULTINGPAGE4</image:caption><image:title>CMMCCONSULTINGPAGE4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(3).png</image:loc><image:caption>CMMCCONSULTINGPAGE3</image:caption><image:title>CMMCCONSULTINGPAGE3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(9).png</image:loc><image:caption>CMMCCONSULTINGPAGE9</image:caption><image:title>CMMCCONSULTINGPAGE9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(12).png</image:loc><image:caption>CMMCCONSULTINGPAGE12</image:caption><image:title>CMMCCONSULTINGPAGE12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(5).png</image:loc><image:caption>CMMCCONSULTINGPAGE5</image:caption><image:title>CMMCCONSULTINGPAGE5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(17).png</image:loc><image:caption>CMMCCONSULTINGPAGE17</image:caption><image:title>CMMCCONSULTINGPAGE17</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(8).png</image:loc><image:caption>CMMCCONSULTINGPAGE8</image:caption><image:title>CMMCCONSULTINGPAGE8</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(15).png</image:loc><image:caption>CMMCCONSULTINGPAGE15</image:caption><image:title>CMMCCONSULTINGPAGE15</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(11).png</image:loc><image:caption>CMMCCONSULTINGPAGE11</image:caption><image:title>CMMCCONSULTINGPAGE11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(7).png</image:loc><image:caption>CMMCCONSULTINGPAGE7</image:caption><image:title>CMMCCONSULTINGPAGE7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(16).png</image:loc><image:caption>CMMCCONSULTINGPAGE16</image:caption><image:title>CMMCCONSULTINGPAGE16</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/website%20MAD%20slider%20background.png</image:loc><image:caption>MADSecurityMSSPAlert2024Top250MSSP</image:caption><image:title>websiteMADsliderbackground</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE.png</image:loc><image:caption>CMMCCONSULTINGPAGE</image:caption><image:title>CMMCCONSULTINGPAGE</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(10).png</image:loc><image:caption>CMMCCONSULTINGPAGE10</image:caption><image:title>CMMCCONSULTINGPAGE10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(2)-1.png</image:loc><image:caption>CMMCCONSULTINGPAGE21</image:caption><image:title>CMMCCONSULTINGPAGE21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(6).png</image:loc><image:caption>CMMCCONSULTINGPAGE6</image:caption><image:title>CMMCCONSULTINGPAGE6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/CMMC%20Consulting.png</image:loc><image:caption>CMMCConsulting</image:caption><image:title>CMMCConsulting</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20CONSULTING%20PAGE%20(1)-1.png</image:loc><image:caption>CMMCCONSULTINGPAGE11</image:caption><image:title>CMMCCONSULTINGPAGE11</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-level-2-assessment-phases</loc><image:image><image:loc>https://madsecurity.com/hubfs/11.png</image:loc><image:caption>11</image:caption><image:title>11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Quick%20Breakdown%20of%20the%20CMMC%20Level%202%20Assessment%20Phases%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>QuickBreakdownoftheCMMCLevel2AssessmentPhases</image:caption><image:title>QuickBreakdownoftheCMMCLevel2AssessmentPhasesBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/10-essential-tips-to-fortify-against-phishing-attacks</loc><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-Apr-28-2024-06-12-05-2483-PM.png</image:loc><image:caption>Untitleddesign2Apr2820240612052483PM</image:caption><image:title>Untitleddesign2Apr2820240612052483PM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(1)-Apr-28-2024-05-53-43-9844-PM.png</image:loc><image:caption>Untitleddesign1Apr2820240553439844PM</image:caption><image:title>Untitleddesign1Apr2820240553439844PM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/10%20Essential%20Tips%20to%20Fortify%20Against%20Phishing%20Attacks:%20A%20Guide%20for%20Government%20Contractors%20Featured%20Image.png</image:loc><image:caption>10EssentialTipstoFortifyAgainstPhishingAttacksAGuideforGovernmentContractors</image:caption><image:title>10EssentialTipstoFortifyAgainstPhishingAttacksAGuideforGovernmentContractorsFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/understanding-dfars-cmmc-compliance-through-real-life-cybersecurity-incidents</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Understanding%20the%20Crucial%20Role%20of%20DFARS%20and%20CMMC%20Compliance%20Through%20Real-Life%20Cybersecurity%20Incidents%C2%A0Featured%20Image.png</image:loc><image:caption>UnderstandingtheCrucialRoleofDFARSandCMMCComplianceThroughRealLifeCybersecurityIncidentsnbsp</image:caption><image:title>UnderstandingtheCrucialRoleofDFARSandCMMCComplianceThroughRealLifeCybersecurityIncidentsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-1-1-1024x576-3.png</image:loc><image:caption>MADSECWebsiteBlogImage111024x5763</image:caption><image:title>MADSECWebsiteBlogImage111024x5763</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Website-Blog-Image-3-1024x576-3.png</image:loc><image:caption>MADSECWebsiteBlogImage31024x5763</image:caption><image:title>MADSECWebsiteBlogImage31024x5763</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/risk-and-compliance-services/cmmc</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/cyberab-RP-badge-1aa.png</image:loc><image:caption>cyberabRPbadge1aa</image:caption><image:title>cyberabRPbadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_69852688.jpg</image:loc><image:caption>shutterstock69852688</image:caption><image:title>shutterstock69852688</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2024-03-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-june-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Securing%20Your%20Supply%20Chain%20%20MAD%20Security%20Webinar%20Recap%20%E2%80%93%20June%202025%20Featured%20Image.png</image:loc><image:caption>SecuringYourSupplyChainMADSecurityWebinarRecapJune2025FeaturedImage</image:caption><image:title>SecuringYourSupplyChainMADSecurityWebinarRecapJune2025FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2025-11-03</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mssp-alerts-top-250-2022</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%20Top%20250%20MSSPs%20List%20for%202022%20Featured%20Image.png</image:loc><image:caption>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2022</image:caption><image:title>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2022FeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/final-rule-real-impact-what-48-cfr-means-for-your-contracts-mad-security-town-hall-webinar-recap-november-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(4).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Final%20Rule%2c%20Real%20Impact%20What%2048%20CFR%20Means%20for%20Your%20Contracts%20%20%20MAD%20Security%20Town%20Hall%20Webinar%20Recap%20-%20November%202025.png</image:loc><image:caption>FinalRuleRealImpactWhat48CFRMeansforYourContractsMADSecurityTownHallWebinarRecapNovember2025</image:caption><image:title>FinalRuleRealImpactWhat48CFRMeansforYourContractsMADSecurityTownHallWebinarRecapNovember2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><lastmod>2025-12-11</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/strengthening-cyber-resilience-guide-zero-day-vulnerabilities</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Strengthening%20Cyber%20Resilience:%20A%20Comprehensive%20Guide%20to%20Counter%20Zero-Day%20Vulnerabilities%2c%20Public%20Disclosures%2c%20and%20Unpatchable%20Situations%C2%A0Featured%20Image.png</image:loc><image:caption>StrengtheningCyberResilienceAComprehensiveGuidetoCounterZeroDayVulnerabilitiesPublicDisclosuresandUnpatchableSituationsnbsp</image:caption><image:title>StrengtheningCyberResilienceAComprehensiveGuidetoCounterZeroDayVulnerabilitiesPublicDisclosuresandUnpatchableSituationsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1-1-1024x512-1.png</image:loc><image:caption>MADSECBlogImages111024x5121</image:caption><image:title>MADSECBlogImages111024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-3-1024x512-1.png</image:loc><image:caption>MADSECBlogImages31024x5121</image:caption><image:title>MADSECBlogImages31024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-2-1024x512-1.png</image:loc><image:caption>MADSECBlogImages21024x5121</image:caption><image:title>MADSECBlogImages21024x5121</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-2-1-1024x512-1.png</image:loc><image:caption>MADSECBlogImages211024x5121</image:caption><image:title>MADSECBlogImages211024x5121</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/how-cmmc-certification-sets-you-apart-mad-security-webinar-recap-may-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/How%20CMMC%20Certification%20Sets%20You%20Apart%20Featured%20Image.png</image:loc><image:caption>HowCMMCCertificationSetsYouApart</image:caption><image:title>HowCMMCCertificationSetsYouApartFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20Recap%20%E2%80%93%20May%202025%20(1).png</image:loc><image:caption>TownHallWebinarRecapMay20251</image:caption><image:title>TownHallWebinarRecapMay20251</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20Recap%20%E2%80%93%20May%202025.png</image:loc><image:caption>TownHallWebinarRecapMay2025</image:caption><image:title>TownHallWebinarRecapMay2025</image:title></image:image><lastmod>2026-02-09</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/an-open-letter-to-our-customers-and-partners-from-mad-security-president-jeremy-conway</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/6%20Essential%20Cybersecurity%20Best%20Practices%20Your%20Business%20Won%E2%80%99t%20Want%20To%20Miss%20Featured%20Image.png</image:loc><image:caption>6EssentialCybersecurityBestPracticesYourBusinessWontWantToMiss</image:caption><image:title>6EssentialCybersecurityBestPracticesYourBusinessWontWantToMissFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-cmmc-level-2</loc><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Assessment%20Guide.png</image:loc><image:caption>CMMCAssessmentGuide</image:caption><image:title>CMMCAssessmentGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Business%20woman%20using%20tablet%20with%20financial%2c%20cloud%20connectivity%20concept.jpeg</image:loc><image:caption>WhyisCMMCComplianceImportant</image:caption><image:title>Businesswomanusingtabletwithfinancialcloudconnectivityconcept</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/maritime-cybersecurity-leadership-incident-response-best-practices</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Copy-of-Overcome-Lack-of-Cybersecurity-Expertise-by-Partnering-with-an-MSSP-qea5o7959hbwm2g44krkbncbnotb98sr7ex4psrbmo-1.png</image:loc><image:caption>CopyofOvercomeLackofCybersecurityExpertisebyPartneringwithanMSSPqea5o7959hbwm2g44krkbncbnotb98sr7ex4psrbmo1</image:caption><image:title>CopyofOvercomeLackofCybersecurityExpertisebyPartneringwithanMSSPqea5o7959hbwm2g44krkbncbnotb98sr7ex4psrbmo1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/Copy-of-Overcome-Lack-of-Cybersecurity-Expertise-by-Partnering-with-an-MSSP-1-qea5oq1x261n29ot2sw3piljje8nj6vdxzyubbzg68-1.png</image:loc><image:caption>CopyofOvercomeLackofCybersecurityExpertisebyPartneringwithanMSSP1qea5oq1x261n29ot2sw3piljje8nj6vdxzyubbzg681</image:caption><image:title>CopyofOvercomeLackofCybersecurityExpertisebyPartneringwithanMSSP1qea5oq1x261n29ot2sw3piljje8nj6vdxzyubbzg681</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Security%20Operations%20Center%20Best%20Practices:%20From%20the%20Global%20Maritime%20Cybersecurity%20Consortium%2c%20by%20Cliff%20Neve%2c%20Director%20of%20MAD%20Maritime%20Featured%20Image.png</image:loc><image:caption>SecurityOperationsCenterBestPracticesFromtheGlobalMaritimeCybersecurityConsortiumbyCliffNeveDirectorofMADMaritime</image:caption><image:title>SecurityOperationsCenterBestPracticesFromtheGlobalMaritimeCybersecurityConsortiumbyCliffNeveDirectorofMADMaritimeFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-controlled-unclassified-information-cui</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(7)-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation71</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(8)-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20Controlled%20Unclassified%20Information%20A%20DoD%20Contractor%E2%80%99s%20Guide.png</image:loc><image:caption>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:caption><image:title>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/9-2.png</image:loc><image:caption>92</image:caption><image:title>92</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(2).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:title></image:image><lastmod>2026-02-24</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-continuous-compliance-integrated-soc</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Top%2010%20SSP%20Mistakes%20That%20Will%20Derail%20Your%20CMMC%20Assessment%20(10).png</image:loc><image:caption>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment10</image:caption><image:title>MADSECFTIMAGETop10SSPMistakesThatWillDerailYourCMMCAssessment10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20the%20Audit%20How%20Integrated%20SOC%20%2B%20Compliance%20Services%20Ensure%20Continuous%20CMMC%202.0%20Readiness%20(1).png</image:loc><image:caption>MADSECFTIMAGEBeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20Readiness1</image:caption><image:title>MADSECFTIMAGEBeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20Readiness1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20the%20Audit%20How%20Integrated%20SOC%20%2B%20Compliance%20Services%20Ensure%20Continuous%20CMMC%202.0%20Readiness%20(3).png</image:loc><image:caption>MADSECFTIMAGEBeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20Readiness3</image:caption><image:title>MADSECFTIMAGEBeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20Readiness3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Beyond%20the%20Audit%20How%20Integrated%20SOC%20%2B%20Compliance%20Services%20Ensure%20Continuous%20CMMC%202.0%20Readiness%20Featured%20Image.png</image:loc><image:caption>BeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20Readiness</image:caption><image:title>BeyondtheAuditHowIntegratedSOCComplianceServicesEnsureContinuousCMMC20ReadinessFeaturedImage</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/respond-cybersecurity-questionnaire-dfars-cmmc-nist</loc><lastmod>2025-11-09</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/false-claims-act-cases-pennstate-verizon</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/verizon-93632408-c245-11ec-9b0a-38a983a2edcb-1024x682-2.jpg</image:loc><image:caption>verizon93632408c24511ec9b0a38a983a2edcb1024x6822</image:caption><image:title>verizon93632408c24511ec9b0a38a983a2edcb1024x6822</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-3-1024x576-2.png</image:loc><image:caption>MADSECBlogImages31024x5762</image:caption><image:title>MADSECBlogImages31024x5762</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Setting%20Precedence:%20Unraveling%20the%20Implications%20of%20Penn%20State%20and%20Verizon%20False%20Claims%20Act%20Cases%20Featured%20Image.png</image:loc><image:caption>SettingPrecedenceUnravelingtheImplicationsofPennStateandVerizonFalseClaimsActCases</image:caption><image:title>SettingPrecedenceUnravelingtheImplicationsofPennStateandVerizonFalseClaimsActCasesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-5-1024x576-2.png</image:loc><image:caption>MADSECBlogImages51024x5762</image:caption><image:title>MADSECBlogImages51024x5762</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/preparing-for-cmmc-evidence-triad-interview-examine-test</loc><image:image><image:loc>https://madsecurity.com/hubfs/1-Nov-12-2025-04-04-55-8912-AM.png</image:loc><image:caption>1Nov1220250404558912AM</image:caption><image:title>1Nov1220250404558912AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/8-1.png</image:loc><image:caption>81</image:caption><image:title>81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Preparing%20for%20CMMC%E2%80%99s%20%E2%80%9CEvidence%20Triad%E2%80%9D%20Interview%2c%20Examine%2c%20and%20Test.png</image:loc><image:caption>PreparingforCMMCsEvidenceTriadInterviewExamineandTest</image:caption><image:title>PreparingforCMMCsEvidenceTriadInterviewExamineandTest</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(8)-1.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation81</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(2).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/2-Nov-12-2025-04-04-53-8139-AM.png</image:loc><image:caption>2Nov1220250404538139AM</image:caption><image:title>2Nov1220250404538139AM</image:title></image:image><lastmod>2025-12-29</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/why-security-operations-are-critical-for-maritime-cybersecurity-protecting-critical-infrastructure</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(2).png</image:loc><image:caption>MADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity2</image:caption><image:title>MADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20(1).png</image:loc><image:caption>MADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity1</image:caption><image:title>MADSECFTIMAGEWhySecurityOperationsAreCriticalforMaritimeCybersecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity:%20Protecting%20Critical%20Infrastructure%20Featured%20Image.png</image:loc><image:caption>WhySecurityOperationsAreCriticalforMaritimeCybersecurityProtectingCriticalInfrastructure</image:caption><image:title>WhySecurityOperationsAreCriticalforMaritimeCybersecurityProtectingCriticalInfrastructureFeaturedImage</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/coast-guard-cybersecurity-rule-maritime-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20the%20Coast%20Guard%E2%80%99s%20Final%20Rule%20Means%20for%20Maritime%20CybersecurityBlog%20Post%20Featured%20Image.png</image:loc><image:caption>WhattheCoastGuardsFinalRuleMeansforMaritimeCybersecurityBlogPostFeaturedImage</image:caption><image:title>WhattheCoastGuardsFinalRuleMeansforMaritimeCybersecurityBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-2.png</image:loc><image:caption>MADSECHubSpotBlogImages12</image:caption><image:title>MADSECHubSpotBlogImages12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-4.png</image:loc><image:caption>MADSECHubSpotBlogImages4</image:caption><image:title>MADSECHubSpotBlogImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><lastmod>2025-10-30</lastmod></url><url><loc>https://madsecurity.com</loc><image:image><image:loc>https://madsecurity.com/hubfs/webinars/cyber%20maritime%20technology%20ocean.jpg</image:loc><image:caption>cybermaritimetechnologyocean</image:caption><image:title>cybermaritimetechnologyocean</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1073337977-scaled-1.webp</image:loc><image:caption>shutterstock1073337977scaled1</image:caption><image:title>shutterstock1073337977scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1243021015-scaled-1.webp</image:loc><image:caption>shutterstock1243021015scaled1</image:caption><image:title>shutterstock1243021015scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Maritime%20Cybersecurity%20Compliance%20Mandate%20Coast%20Guard%20Final%20Rule%20Explained-1.png</image:loc><image:caption>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:caption><image:title>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20assessments-1.jpeg</image:loc><image:caption>CMMCassessments1</image:caption><image:title>CMMCassessments1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20Is%20an%20SSP%20A%20Contractor%E2%80%99s%20Guide%20to%20Building%20a%20Compliant%20System%20Security%20Plan.png</image:loc><image:caption>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:caption><image:title>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(6).png</image:loc><image:caption>Untitleddesign6</image:caption><image:title>Untitleddesign6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported%20images/shutterstock_1590824917-1200x800.jpg</image:loc><image:caption>shutterstock15908249171200x800</image:caption><image:title>shutterstock15908249171200x800</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Insider%20Threats%20and%20CMMC%20-%20How%20DoD%20Contractors%20Can%20Protect%20CUI%20and%20Stay%20Compliant%20(1).png</image:loc><image:caption>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:caption><image:title>MADSECFTIMAGEInsiderThreatsandCMMCHowDoDContractorsCanProtectCUIandStayCompliant1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20Controlled%20Unclassified%20Information%20A%20DoD%20Contractor%E2%80%99s%20Guide.png</image:loc><image:caption>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:caption><image:title>WhatIsControlledUnclassifiedInformationADoDContractorsGuide</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_669170623-scaled-1.webp</image:loc><image:caption>shutterstock669170623scaled1</image:caption><image:title>shutterstock669170623scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%20Is%20More%20Than%20Cybersecurity%20Aligning%20Compliance%20with%20Business%2c%20Culture%2c%20and%20Contracts%20%7C%20MAD%20Security%20Town%20Hall%20Recap%20%E2%80%93%20February%202026.png</image:loc><image:caption>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:caption><image:title>CMMCIsMoreThanCybersecurityAligningCompliancewithBusinessCultureandContractsMADSecurityTownHallRecapFebruary2026</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Town%20Hall%20Webinar%20MAD%20Slider%20240927.png</image:loc><image:caption>TownHallWebinarMADSlider240927</image:caption><image:title>TownHallWebinarMADSlider240927</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/DFARS%20Clause%20Renumbering%20Under%20the%20CMMC%20Deviation%20What%20Contractors%20Need%20to%20Know.webp</image:loc><image:caption>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:caption><image:title>DFARSClauseRenumberingUndertheCMMCDeviationWhatContractorsNeedtoKnow</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Incident%20Response-%20An%20Integral%20Part%20of%20the%20CMMC%202.0%20Lifecycle%20%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>IncidentResponseAnIntegralPartoftheCMMC20Lifecycle</image:caption><image:title>IncidentResponseAnIntegralPartoftheCMMC20LifecycleBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20an%20SPRS%20Score%3F%20Understanding%20DFARS%20252.204-7012%2c%20NIST%20800-171%2c%20and%20CMMC%20Level%202%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2Requirements</image:caption><image:title>WhatIsanSPRSScoreUnderstandingDFARS2522047012NIST800171andCMMCLevel2RequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20FCI%3F%20Understanding%20Federal%20Contract%20Information%20And%20Its%20Cybersecurity%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirements</image:caption><image:title>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(3)-Oct-16-2025-10-52-37-3122-AM.png</image:loc><image:caption>Untitleddesign3Oct1620251052373122AM</image:caption><image:title>Untitleddesign3Oct1620251052373122AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1047388429-scaled-1.webp</image:loc><image:caption>shutterstock1047388429scaled1</image:caption><image:title>shutterstock1047388429scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1699780489-1.webp</image:loc><image:caption>shutterstock16997804891</image:caption><image:title>shutterstock16997804891</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_1073337953-scaled-1.webp</image:loc><image:caption>shutterstock1073337953scaled1</image:caption><image:title>shutterstock1073337953scaled1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/shutterstock_662879284.webp</image:loc><image:caption>shutterstock662879284</image:caption><image:title>shutterstock662879284</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(2)-Oct-16-2025-09-18-08-3891-AM.png</image:loc><image:caption>Untitleddesign2Oct1620250918083891AM</image:caption><image:title>Untitleddesign2Oct1620250918083891AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Untitled%20design%20(1)-Oct-16-2025-09-16-58-2987-AM.png</image:loc><image:caption>Untitleddesign1Oct1620250916582987AM</image:caption><image:title>Untitleddesign1Oct1620250916582987AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Who%20Is%20Responsible%20for%20Protecting%20Controlled%20Unclassified%20Information.png</image:loc><image:caption>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:caption><image:title>WhoIsResponsibleforProtectingControlledUnclassifiedInformation</image:title></image:image><lastmod>2026-03-23</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-q2-performance-2023</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%E2%80%99s%20Stellar%20Q2%20Performance:%20Gratitude%2c%20Team%20Excellence%2c%20and%20Elevated%20Cybersecurity%20Standards%C2%A0Featured%20Image.png</image:loc><image:caption>MADSecuritysStellarQ2PerformanceGratitudeTeamExcellenceandElevatedCybersecurityStandardsnbsp</image:caption><image:title>MADSecuritysStellarQ2PerformanceGratitudeTeamExcellenceandElevatedCybersecurityStandardsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/20230714-MADQBR-017-1-1.jpg</image:loc><image:caption>20230714MADQBR01711</image:caption><image:title>20230714MADQBR01711</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/20230714-MADQBR-024-2-768x408-1.jpg</image:loc><image:caption>20230714MADQBR0242768x4081</image:caption><image:title>20230714MADQBR0242768x4081</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/20230714-MADQBR-010-2-1.jpg</image:loc><image:caption>20230714MADQBR01021</image:caption><image:title>20230714MADQBR01021</image:title></image:image><lastmod>2025-12-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/customer-responsibility-matrix-crm-cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Customer%20Responsibility%20Matrix%20(CRM)%20A%20Key%20to%20CMMC%20Compliance%20(3).png</image:loc><image:caption>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance3</image:caption><image:title>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Customer%20Responsibility%20Matrix%20(CRM)%20A%20Key%20to%20CMMC%20Compliance%20(1).png</image:loc><image:caption>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance1</image:caption><image:title>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Customer%20Responsibility%20Matrix%20(CRM)%20A%20Key%20to%20CMMC%20Compliance%20(2).png</image:loc><image:caption>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance2</image:caption><image:title>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Customer%20Responsibility%20Matrix%20(CRM)%20A%20Key%20to%20CMMC%20Compliance%20(4).png</image:loc><image:caption>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance4</image:caption><image:title>MADSECFTIMAGECustomerResponsibilityMatrixCRMAKeytoCMMCCompliance4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Customer%20Responsibility%20Matrix%20(CRM):%20A%20Key%20to%20CMMC%20Compliance%20Featured%20Image.png</image:loc><image:caption>CustomerResponsibilityMatrixCRMAKeytoCMMCCompliance</image:caption><image:title>CustomerResponsibilityMatrixCRMAKeytoCMMCComplianceFeaturedImage</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/assessing-and-mitigating-supply-chain-cybersecurity-risks-for-defense-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/National-Nurses-Day-2-1024x533-1.png</image:loc><image:caption>NationalNursesDay21024x5331</image:caption><image:title>NationalNursesDay21024x5331</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Assessing%20and%20Mitigating%20Supply%20Chain%20Cybersecurity%20Risks%20for%20Defense%20Contractors%20Featured%20Image.png</image:loc><image:caption>AssessingandMitigatingSupplyChainCybersecurityRisksforDefenseContractors</image:caption><image:title>AssessingandMitigatingSupplyChainCybersecurityRisksforDefenseContractorsFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-5-1024x512-1.png</image:loc><image:caption>MADSECBlogImages51024x5121</image:caption><image:title>MADSECBlogImages51024x5121</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/risk-and-compliance-services/risk-and-compliance-solution</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_776174995-1.jpg</image:loc><image:caption>shutterstock7761749951</image:caption><image:title>shutterstock7761749951</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/GRC-Sec-Architecture-Graphic-955x1024-1.png</image:loc><image:caption>GRCSecArchitectureGraphic955x10241</image:caption><image:title>GRCSecArchitectureGraphic955x10241</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_69852688.jpg</image:loc><image:caption>shutterstock69852688</image:caption><image:title>shutterstock69852688</image:title></image:image><lastmod>2024-06-04</lastmod></url><url><loc>https://madsecurity.com/risk-and-compliance-services/cmmc-solution</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/CyberAB-RPO-Badge-1aa.png</image:loc><image:caption>CyberABRPOBadge1aa</image:caption><image:title>CyberABRPOBadge1aa</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_69852688.jpg</image:loc><image:caption>shutterstock69852688</image:caption><image:title>shutterstock69852688</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_500248984-1.jpg</image:loc><image:caption>shutterstock5002489841</image:caption><image:title>shutterstock5002489841</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2024-03-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-town-hall-recap-december-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Maritime%20Cybersecurity%20Wake-Up%20Call%20MAD%20Security%20Town%20Hall%20Recap%20December%202025.png</image:loc><image:caption>MaritimeCybersecurityWakeUpCallMADSecurityTownHallRecapDecember2025</image:caption><image:title>MaritimeCybersecurityWakeUpCallMADSecurityTownHallRecapDecember2025</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-12-20</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mssp-for-msps-compliance-cybersecurity-partnership</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/The%20Strategic%20Advantage%20Why%20MSPs%20Are%20Partnering%20with%20MAD%20Security%20for%20Compliance%20and%20Cyber%20Defense%20Featured%20Image.png</image:loc><image:caption>TheStrategicAdvantageWhyMSPsArePartneringwithMADSecurityforComplianceandCyberDefense</image:caption><image:title>TheStrategicAdvantageWhyMSPsArePartneringwithMADSecurityforComplianceandCyberDefenseFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget1</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(4).png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget4</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(1)-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget11</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(2)-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget21</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20CMMC%20Compliance%20on%20a%20Budget%20(3)-1.png</image:loc><image:caption>MADSECWebsiteImagesCMMCComplianceonaBudget31</image:caption><image:title>MADSECWebsiteImagesCMMCComplianceonaBudget31</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/msp-mssp-role-cmmc-level-2-assessment</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-1.png</image:loc><image:caption>MADSECHubSpotBlogImages1</image:caption><image:title>MADSECHubSpotBlogImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-1.png</image:loc><image:caption>MADSECHubSpotBlogImages11</image:caption><image:title>MADSECHubSpotBlogImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20The%20Role%20of%20the%20MSP%20and%20MSSP%20During%20the%20CMMC%20Certification%20Assessment%20Assessment%20Infographic(1).png</image:loc><image:caption>BlogTheRoleoftheMSPandMSSPDuringtheCMMCCertificationAssessmentAssessmentInfographic1</image:caption><image:title>BlogTheRoleoftheMSPandMSSPDuringtheCMMCCertificationAssessmentAssessmentInfographic1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Role%20of%20mSSP.png</image:loc><image:caption>RoleofmSSP</image:caption><image:title>RoleofmSSP</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><lastmod>2025-12-01</lastmod></url><url><loc>https://madsecurity.com/careers</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1455362342.jpg</image:loc><image:caption>shutterstock1455362342</image:caption><image:title>shutterstock1455362342</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20Benefits%20v2%20240823.png</image:loc><image:caption>MADSecurityBenefitsv2240823</image:caption><image:title>MADSecurityBenefitsv2240823</image:title></image:image><lastmod>2025-07-08</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cybersecurity-maturity-model-certification-cmmc-program-guidance-published-by-the-department-of-defense-dod</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/CMMC-2_0-Timeline-v2-231223-1024x584-1.png</image:loc><image:caption>CMMC20Timelinev22312231024x5841</image:caption><image:title>CMMC20Timelinev22312231024x5841</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-Security-Process-230730-1024x538-1.png</image:loc><image:caption>MADSecurityProcess2307301024x5381</image:caption><image:title>MADSecurityProcess2307301024x5381</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20Program%20Guidance%20Published%20by%20the%20Department%20of%20Defense%20(DoD)%20Featured%20Image.png</image:loc><image:caption>CybersecurityMaturityModelCertificationCMMCProgramGuidancePublishedbytheDepartmentofDefenseDoD</image:caption><image:title>CybersecurityMaturityModelCertificationCMMCProgramGuidancePublishedbytheDepartmentofDefenseDoDFeaturedImage</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/shared-responsibility-matrix-cmmc-2-0-guide</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/6-1.png</image:loc><image:caption>61</image:caption><image:title>61</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/How%20to%20Obtain%20an%20SRM:%20What%20a%20Contractor%20Needs%20&amp;%20What%20to%20Expect%C2%A0.png</image:loc><image:caption>HowtoObtainanSRMWhataContractorNeedsampWhattoExpectnbsp</image:caption><image:title>HowtoObtainanSRMWhataContractorNeedsWhattoExpect</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Start%20Smart%20Why%20Mastering%20CMMC%20Level%201%20Controls%20Is%20the%20Strategic%20First%20Step%20to%20Level%202%20Success%20(1).png</image:loc><image:caption>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success1</image:caption><image:title>StartSmartWhyMasteringCMMCLevel1ControlsIstheStrategicFirstSteptoLevel2Success1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(4).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages4</image:caption><image:title>MADSECCMMCAssessmentGuideImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(5).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages5</image:caption><image:title>MADSECCMMCAssessmentGuideImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/check_red.svg</image:loc><image:caption>checkred</image:caption><image:title>checkred</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Key%20Components%20of%20an%20SRM.png</image:loc><image:caption>KeyComponentsofanSRM</image:caption><image:title>KeyComponentsofanSRM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/How%20SRM%20Fits%20into%20CMMC%202.0%20Compliance.png</image:loc><image:caption>HowSRMFitsintoCMMC20Compliance</image:caption><image:title>HowSRMFitsintoCMMC20Compliance</image:title></image:image><lastmod>2025-12-19</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/maritime-cybersecurity-drills-and-exercises-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(1)-4.png</image:loc><image:caption>MADSECHubSpotBlogImages14</image:caption><image:title>MADSECHubSpotBlogImages14</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images%20(2)-2.png</image:loc><image:caption>MADSECHubSpotBlogImages22</image:caption><image:title>MADSECHubSpotBlogImages22</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Planning%20Cyber%20Drills%20and%20Exercises%20for%20the%20New%20Year%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>PlanningCyberDrillsandExercisesfortheNewYearBlogPostFeaturedImage</image:caption><image:title>PlanningCyberDrillsandExercisesfortheNewYearBlogPostFeaturedImage</image:title></image:image><lastmod>2025-12-02</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/separation-of-duties-small-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(6).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff6</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(4).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff4</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(3).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff3</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Separation%20of%20Duties%20for%20Small%20Contractors:%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20Featured%20Image.png</image:loc><image:caption>SeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff</image:caption><image:title>SeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaffFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(2).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff2</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(1).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff1</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Separation%20of%20Duties%20for%20Small%20Contractors%20How%20to%20Protect%20Your%20Business%20with%20Limited%20IT%20Staff%20%20(5).png</image:loc><image:caption>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff5</image:caption><image:title>MADSECFTIMAGESeparationofDutiesforSmallContractorsHowtoProtectYourBusinesswithLimitedITStaff5</image:title></image:image><lastmod>2025-08-13</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-an-ssp-a-contractors-guide-to-building-a-compliant-system-security-plan</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20a%20CMMC%20RPO%20(1).png</image:loc><image:caption>MADSECWebsiteImagesWhatisaCMMCRPO1</image:caption><image:title>MADSECWebsiteImagesWhatisaCMMCRPO1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation(1)-3.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation13</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/What%20Is%20an%20SSP%20A%20Contractor%E2%80%99s%20Guide%20to%20Building%20a%20Compliant%20System%20Security%20Plan.png</image:loc><image:caption>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:caption><image:title>WhatIsanSSPAContractorsGuidetoBuildingaCompliantSystemSecurityPlan</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2026-03-24</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/maritime-cybersecurity-compliance-mandate-coast-guard-final-rule-explained</loc><image:image><image:loc>https://madsecurity.com/hubfs/Maritime%20Cybersecurity%20Compliance%20Mandate%20Coast%20Guard%20Final%20Rule%20Explained-1.png</image:loc><image:caption>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:caption><image:title>MaritimeCybersecurityComplianceMandateCoastGuardFinalRuleExplained1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><lastmod>2026-03-28</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/building-nist-based-incident-response-plan-defense-contractors</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1jj-1024x576-1.png</image:loc><image:caption>MADSECBlogImages1jj1024x5761</image:caption><image:title>MADSECBlogImages1jj1024x5761</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Building%20a%20Comprehensive%20Incident%20Response%20Plan%20for%20Defense%20Contractors%20Using%20NIST%20Guidelines%20Featured%20Image.png</image:loc><image:caption>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelines</image:caption><image:title>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelinesFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Imported_Blog_Media/MAD-SEC-Blog-Images-1kk-1024x576-1.png</image:loc><image:caption>MADSECBlogImages1kk1024x5761</image:caption><image:title>MADSECBlogImages1kk1024x5761</image:title></image:image><lastmod>2025-12-07</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-named-to-mssp-alerts-2024-list-of-top-250-mssps</loc><image:image><image:loc>https://madsecurity.com/hubfs/Top-250-MSSP.png</image:loc><image:caption>Top250MSSP</image:caption><image:title>Top250MSSP</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Top%20250%20MSSP%202024%20CEO%20Jeremy%20Conway%20quote.png</image:loc><image:caption>MADSecurityTop250MSSPfor2024CMMCCompliance</image:caption><image:title>Top250MSSP2024CEOJeremyConwayquote</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20named%20to%20MSSP%20Alerts%202024%20List%20of%20Top%20250%20MSSPs.png</image:loc><image:caption>MADSecuritynamedtoMSSPAlerts2024ListofTop250MSSPs</image:caption><image:title>MADSecuritynamedtoMSSPAlerts2024ListofTop250MSSPs</image:title></image:image><lastmod>2025-08-12</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/mad-security-and-blackridge-technology-partner-to-deliver-next-generation-cyber-security-solutions-to-government-and-commercial-markets</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20and%20BlackRidge%20Technology%20Partner%20to%20Deliver%20Next%20Generation%20Cyber%20Security%20Solutions%20to%20Government%20and%20Commercial%20Markets%20Featured%20Image.png</image:loc><image:caption>MADSecurityandBlackRidgeTechnologyPartnertoDeliverNextGenerationCyberSecuritySolutionstoGovernmentandCommercialMarkets</image:caption><image:title>MADSecurityandBlackRidgeTechnologyPartnertoDeliverNextGenerationCyberSecuritySolutionstoGovernmentandCommercialMarketsFeaturedImage</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/choosing-a-cybersecurity-service-provider-government-contractor</loc><image:image><image:loc>https://madsecurity.com/hubfs/cmmc2-levels-stv2.png</image:loc><image:caption>cmmc2levelsstv2</image:caption><image:title>cmmc2levelsstv2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Choosing%20A%20Cybersecurity%20Provider%20As%20A%20Government%20Contractor%20Featured%20Image.png</image:loc><image:caption>ChoosingACybersecurityProviderAsAGovernmentContractor</image:caption><image:title>ChoosingACybersecurityProviderAsAGovernmentContractorFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/what-is-federal-contract-information-fci</loc><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%202%20two.png</image:loc><image:caption>MADred2two</image:caption><image:title>MADred2two</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation-2.png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%203%20three.png</image:loc><image:caption>MADred3three</image:caption><image:title>MADred3three</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%204%20four.png</image:loc><image:caption>MADred4four</image:caption><image:title>MADred4four</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%206%20six.png</image:loc><image:caption>MADred6six</image:caption><image:title>MADred6six</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/What%20Is%20FCI%3F%20Understanding%20Federal%20Contract%20Information%20And%20Its%20Cybersecurity%20Requirements%20Blog%20Post%20Featured%20Image.png</image:loc><image:caption>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirements</image:caption><image:title>WhatIsFCIUnderstandingFederalContractInformationAndItsCybersecurityRequirementsBlogPostFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/10.png</image:loc><image:caption>10</image:caption><image:title>10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%205%20five.png</image:loc><image:caption>MADred5five</image:caption><image:title>MADred5five</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/ICONS/MAD%20red%201%20one.png</image:loc><image:caption>MADred1one</image:caption><image:title>MADred1one</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/maritime-town-hall-recap-september-2025</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Cybersecurity%20Training%20Compliance%20in%20Maritime%20Operations%20MAD%20Security%20Maritime%20Town%20Hall%20Recap%20%E2%80%93%20September%202025%20Featured%20Image.png</image:loc><image:caption>CybersecurityTrainingComplianceinMaritimeOperationsMADSecurityMaritimeTownHallRecapSeptember2025</image:caption><image:title>CybersecurityTrainingComplianceinMaritimeOperationsMADSecurityMaritimeTownHallRecapSeptember2025FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><lastmod>2025-10-07</lastmod></url><url><loc>https://madsecurity.com/cmmc-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(9).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE9</image:caption><image:title>CMMCCOMPLIANCEPAGE9</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(8).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE8</image:caption><image:title>CMMCCOMPLIANCEPAGE8</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(12).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE12</image:caption><image:title>CMMCCOMPLIANCEPAGE12</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(7).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE7</image:caption><image:title>CMMCCOMPLIANCEPAGE7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(11).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE11</image:caption><image:title>CMMCCOMPLIANCEPAGE11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20FT%20IMAGE%20-%20Beyond%20CMMC%202.0%20Building%20a%20Holistic%20Cybersecurity%20Posture%20for%20DIB%20Contracts%20%20(1)-1.png</image:loc><image:caption>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts11</image:caption><image:title>MADSECFTIMAGEBeyondCMMC20BuildingaHolisticCybersecurityPostureforDIBContracts11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(6).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE6</image:caption><image:title>CMMCCOMPLIANCEPAGE6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(5).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE5</image:caption><image:title>CMMCCOMPLIANCEPAGE5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(10).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE10</image:caption><image:title>CMMCCOMPLIANCEPAGE10</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20COMPLIANCE%20PAGE%20(3).png</image:loc><image:caption>CMMCCOMPLIANCEPAGE3</image:caption><image:title>CMMCCOMPLIANCEPAGE3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Pillar%20Page%20Featured%20Image/CMMC%20Compliance.png</image:loc><image:caption>CMMCCompliance</image:caption><image:title>CMMCCompliance</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/handling-cui-in-hybrid-and-remote-work-environments</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Handling%20CUI%20in%20Hybrid%20and%20Remote%20Work%20Environments%20Protecting%20Sensitive%20Data%20Beyond%20the%20Office.png</image:loc><image:caption>HandlingCUIinHybridandRemoteWorkEnvironmentsProtectingSensitiveDataBeyondtheOffice</image:caption><image:title>HandlingCUIinHybridandRemoteWorkEnvironmentsProtectingSensitiveDataBeyondtheOffice</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/interactive-194075349118.png</image:loc><image:caption>interactive194075349118</image:caption><image:title>interactive194075349118</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20HubSpot%20Blog%20Images-Dec-10-2025-03-59-30-5736-AM.png</image:loc><image:caption>MADSECHubSpotBlogImagesDec1020250359305736AM</image:caption><image:title>MADSECHubSpotBlogImagesDec1020250359305736AM</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20images%20design(4).png</image:loc><image:caption>Blogimagesdesign4</image:caption><image:title>Blogimagesdesign4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/4-3.png</image:loc><image:caption>43</image:caption><image:title>43</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/blog%20images(1).png</image:loc><image:caption>blogimages1</image:caption><image:title>blogimages1</image:title></image:image><lastmod>2026-03-03</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/from-policy-to-pier-mad-security-maritime-town-hall-webinar-recap-march-2026</loc><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(1).png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/From%20Policy%20to%20Pier%20MAD%20Security%20Maritime%20Town%20Hall%20Webinar%20Recap%20%E2%80%93%20March%202026-1.png</image:loc><image:caption>FromPolicytoPierMADSecurityMaritimeTownHallWebinarRecapMarch20261</image:caption><image:title>FromPolicytoPierMADSecurityMaritimeTownHallWebinarRecapMarch20261</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(4).png</image:loc><image:caption>MADSECWebsiteImages4</image:caption><image:title>MADSECWebsiteImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/3-1.webp</image:loc><image:caption>31</image:caption><image:title>31</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/2-1.webp</image:loc><image:caption>21</image:caption><image:title>21</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(3).png</image:loc><image:caption>MADSECWebsiteImages3</image:caption><image:title>MADSECWebsiteImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Contact%20Us-2.png</image:loc><image:caption>ContactUs2</image:caption><image:title>ContactUs2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/1.webp</image:loc><image:caption>1</image:caption><image:title>1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images-1.png</image:loc><image:caption>MADSECWebsiteImages1</image:caption><image:title>MADSECWebsiteImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20Website%20Images%20(2).png</image:loc><image:caption>MADSECWebsiteImages2</image:caption><image:title>MADSECWebsiteImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://madsecurity.com/newsroom</loc><image:image><image:loc>https://madsecurity.com/hubfs/2024-BP2W-Contender-art-SQ.jpg</image:loc><image:caption>2024BP2WContenderartSQ</image:caption><image:title>2024BP2WContenderartSQ</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/HSV%20chamber%20SBA.jpg</image:loc><image:caption>HSVchamberSBA</image:caption><image:title>HSVchamberSBA</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/MAD%20Security%20Mobilizes%20Maritime%20Industry%20Following%20U.S.%20Coast%20Guard%20Cybersecurity%20Rule%20Implementation%20Thumbnail.png</image:loc><image:caption>MADSecurityMobilizesMaritimeIndustryFollowingUSCoastGuardCybersecurityRuleImplementation</image:caption><image:title>MADSecurityMobilizesMaritimeIndustryFollowingUSCoastGuardCybersecurityRuleImplementationThumbnail</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Partners%20with%20OpenText%20Response%20to%20Improve%20Response%20Time%20to%20Cyber%20Threats%20and%20Shrink%20the%20Attack%20Surface%20Featured%20Image.png</image:loc><image:caption>MADSecurityPartnerswithOpenTextResponsetoImproveResponseTimetoCyberThreatsandShrinktheAttackSurfaceFeaturedImage</image:caption><image:title>MADSecurityPartnerswithOpenTextResponsetoImproveResponseTimetoCyberThreatsandShrinktheAttackSurfaceFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Why%20Security%20Operations%20Are%20Critical%20for%20Maritime%20Cybersecurity%20Protecting%20Critical%20Infrastructure.png</image:loc><image:caption>WhySecurityOperationsAreCriticalforMaritimeCybersecurityProtectingCriticalInfrastructure</image:caption><image:title>WhySecurityOperationsAreCriticalforMaritimeCybersecurityProtectingCriticalInfrastructure</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/6%20Essential%20Cybersecurity%20Best%20Practices%20Your%20Business%20Won%E2%80%99t%20Want%20To%20Miss%20Featured%20Image.png</image:loc><image:caption>6EssentialCybersecurityBestPracticesYourBusinessWontWantToMiss</image:caption><image:title>6EssentialCybersecurityBestPracticesYourBusinessWontWantToMissFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Awarded%20All%20Four%20GSA%20Highly%20Adaptive%20Cybersecurity%20Services%20(HACS)%20Featured%20Image.png</image:loc><image:caption>MADSecurityAwardedAllFourGSAHighlyAdaptiveCybersecurityServicesHACS</image:caption><image:title>MADSecurityAwardedAllFourGSAHighlyAdaptiveCybersecurityServicesHACSFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20achieves%20CMMC%20Level%202%20Certification.png</image:loc><image:caption>MADSecurityachievesCMMCLevel2Certification</image:caption><image:title>MADSecurityachievesCMMCLevel2Certification</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Newsroom%20Template.png</image:loc><image:caption>NewsroomTemplate</image:caption><image:title>NewsroomTemplate</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/MAD%20Security%20360%20Advanced%20Compliance%20Alliance%20Program.png</image:loc><image:caption>MADSecurity360AdvancedComplianceAllianceProgram</image:caption><image:title>MADSecurity360AdvancedComplianceAllianceProgram</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20Security%20Top%20250%20MSSP.png</image:loc><image:caption>MADSecurityMSSPAlert2024Tops250MSSP</image:caption><image:title>MADSecurityTop250MSSP</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Building%20a%20Comprehensive%20Incident%20Response%20Plan%20for%20Defense%20Contractors%20Using%20NIST%20Guidelines.png</image:loc><image:caption>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelines</image:caption><image:title>BuildingaComprehensiveIncidentResponsePlanforDefenseContractorsUsingNISTGuidelines</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Achieves%20Certification%20as%20a%20Service-Disabled%20Veteran-Owned%20Small%20Business%20(SDVOSB)%C2%A0Featured%20Image.png</image:loc><image:caption>MADSecurityAchievesCertificationasaServiceDisabledVeteranOwnedSmallBusinessSDVOSBnbsp</image:caption><image:title>MADSecurityAchievesCertificationasaServiceDisabledVeteranOwnedSmallBusinessSDVOSBFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%20Top%20250%20MSSPs%20List%20for%202022%20Featured%20Image.png</image:loc><image:caption>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2022</image:caption><image:title>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2022FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%20Top%20250%20MSSPs%20List%20for%202021%20Featured%20Image.png</image:loc><image:caption>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2021</image:caption><image:title>MADSecurityNamedtoMSSPAlertsTop250MSSPsListfor2021FeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Press%20Releases/MAD%20Security%20Sets%20the%20Standard%20for%20CMMC%20Level%202%20Success%20%20Newsroom%20Thumbnail.png</image:loc><image:caption>MADSecuritySetstheStandardforCMMCLevel2Success</image:caption><image:title>MADSecuritySetstheStandardforCMMCLevel2SuccessNewsroomThumbnail</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/An%20Open%20Letter%20to%20Our%20Customers%20and%20Partners%20from%20MAD%20Security%20President%20Jeremy%20Conway%20Featured%20Image.png</image:loc><image:caption>AnOpenLettertoOurCustomersandPartnersfromMADSecurityPresidentJeremyConway</image:caption><image:title>AnOpenLettertoOurCustomersandPartnersfromMADSecurityPresidentJeremyConwayFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_328181225.jpg</image:loc><image:caption>shutterstock328181225</image:caption><image:title>shutterstock328181225</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/Vendor%20Management%20in%20Today%E2%80%99s%20Interconnected%20World%20Featured%20Image.png</image:loc><image:caption>VendorManagementinTodaysInterconnectedWorld</image:caption><image:title>VendorManagementinTodaysInterconnectedWorldFeaturedImage</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/MAD%20Security%20Named%20to%20MSSP%20Alert%E2%80%99s%202023%20List%20of%20Top%20250%20MSSPs%20Featured%20Image.png</image:loc><image:caption>MADSecurityranksamongtheTop250MSSPs</image:caption><image:title>MADSecurityNamedtoMSSPAlerts2023ListofTop250MSSPsFeaturedImage</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://madsecurity.com/general-regulatory-compliance</loc><image:image><image:loc>https://madsecurity.com/hubfs/General-Regional-Compliance-007-e1707169991754.png</image:loc><image:caption>GeneralRegionalCompliance007e1707169991754</image:caption><image:title>GeneralRegionalCompliance007e1707169991754</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/shutterstock_1067105606.jpg</image:loc><image:caption>shutterstock1067105606</image:caption><image:title>shutterstock1067105606</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/GRC.png</image:loc><image:caption>GRC</image:caption><image:title>GRC</image:title></image:image><lastmod>2025-06-02</lastmod></url><url><loc>https://madsecurity.com/what-is-a-c3pao</loc><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(13).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages13</image:caption><image:title>MADSECCMMCAssessmentGuideImages13</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(1).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO1</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(7).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO7</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO7</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(4).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages4</image:caption><image:title>MADSECCMMCAssessmentGuideImages4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/CMMC%20Pre-Assessment.png</image:loc><image:caption>CMMCPreAssessment</image:caption><image:title>CMMCPreAssessment</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(5).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages5</image:caption><image:title>MADSECCMMCAssessmentGuideImages5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(24).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages24</image:caption><image:title>MADSECCMMCAssessmentGuideImages24</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Banner%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideBanner2</image:caption><image:title>MADSECCMMCAssessmentGuideBanner2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(2).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO2</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(3).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages3</image:caption><image:title>MADSECCMMCAssessmentGuideImages3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(5).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO5</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO5</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(3).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO3</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO3</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO.png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(15).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages15</image:caption><image:title>MADSECCMMCAssessmentGuideImages15</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(2).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images-2.png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages2</image:caption><image:title>MADSECCMMCAssessmentGuideImages2</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(11).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages11</image:caption><image:title>MADSECCMMCAssessmentGuideImages11</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(1).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages1</image:caption><image:title>MADSECCMMCAssessmentGuideImages1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(17).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages17</image:caption><image:title>MADSECCMMCAssessmentGuideImages17</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(4).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO4</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(6).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO6</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO6</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(18).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages18</image:caption><image:title>MADSECCMMCAssessmentGuideImages18</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(22).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages22</image:caption><image:title>MADSECCMMCAssessmentGuideImages22</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20-%20CMMC%20Assessment%20Guide%20Images%20(23).png</image:loc><image:caption>MADSECCMMCAssessmentGuideImages23</image:caption><image:title>MADSECCMMCAssessmentGuideImages23</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/MAD%20SEC%20Website%20Images%20-%20What%20is%20C3PAO%20(8).png</image:loc><image:caption>MADSECWebsiteImagesWhatisC3PAO8</image:caption><image:title>MADSECWebsiteImagesWhatisC3PAO8</image:title></image:image><lastmod>2025-09-11</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-mobile-code-controls</loc><image:image><image:loc>https://madsecurity.com/hubfs/Blue%20and%20White%20Modern%20Securing%20Digital%20Infrastructure%20Presentation%20(4).png</image:loc><image:caption>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:caption><image:title>BlueandWhiteModernSecuringDigitalInfrastructurePresentation4</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Blog%20Post%20Images/CMMC%203.13.13%20What%20Mobile%20Code%20Really%20Means%20and%20How%20to%20Control%20It.png</image:loc><image:caption>CMMC31313WhatMobileCodeReallyMeansandHowtoControlIt</image:caption><image:title>CMMC31313WhatMobileCodeReallyMeansandHowtoControlIt</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/Migration%20Images/MAD%20Security%20Advanced%20Cybersecurity%20and%20Compliance%20Protection.png</image:loc><image:caption>MADSecurityAdvancedCybersecurityandComplianceProtection</image:caption><image:title>MADSecurityAdvancedCybersecurityandComplianceProtection</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/SOC-as-a-Service%20from%20MAD%20Security-1.png</image:loc><image:caption>SOCasaServicefromMADSecurity1</image:caption><image:title>SOCasaServicefromMADSecurity1</image:title></image:image><image:image><image:loc>https://madsecurity.com/hubfs/9-1.png</image:loc><image:caption>91</image:caption><image:title>91</image:title></image:image><lastmod>2026-01-27</lastmod></url><url><loc>https://madsecurity.com/madsecurity-blog/cmmc-rollout-timeline-2025-2028</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://madsecurity.com/case-study/smarterd</loc><lastmod>2026-01-15</lastmod></url></urlset>