<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//relyblue.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://relyblue.com/when-it-is-okay-to-do-a-penetration-test-in-ot/</loc>
		<lastmod>2026-01-12T09:51:51+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2025/12/Image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/elementor-1520/</loc>
		<lastmod>2026-01-12T09:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2025/12/Image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/a-guide-to-your-certification-journey-in-ics-ot-cybersecurity/</loc>
		<lastmod>2026-01-12T09:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2025/12/Image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2025/12/1677236797816.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/list-of-protocols/</loc>
		<lastmod>2026-05-05T08:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/semiconductor-cybersecurity-what-semi-e187-e188-and-e191-mean-for-fabs-and-equipment-suppliers/</loc>
		<lastmod>2026-05-07T09:20:52+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/ot-cybersecurity-is-public-safety-why-risk-assessments-need-to-go-beyond-dollars/</loc>
		<lastmod>2026-05-07T09:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/real-leadership-in-ics-ot-cybersecurity-is-an-attitude-not-a-title/</loc>
		<lastmod>2026-05-07T09:24:38+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/what-do-you-really-want-from-your-ot-cybersecurity-risk-assessment/</loc>
		<lastmod>2026-05-07T10:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/is-it-too-difficult-to-start-no-here-is-exactly-where-to-begin/</loc>
		<lastmod>2026-05-07T10:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/conducting-a-gap-assessment-for-your-ot-cybersecurity-program/</loc>
		<lastmod>2026-05-07T10:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/tabletop-exercises-ttx-for-ot-incident-response-how-to-run-one-that-actually-teaches-you-something/</loc>
		<lastmod>2026-05-07T10:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/the-eu-cyber-resilience-act-cra-what-product-manufacturers-need-to-know/</loc>
		<lastmod>2026-05-07T10:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/iec-62443-zones-and-conduits-explained-without-the-standards-language/</loc>
		<lastmod>2026-05-07T10:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/ics-ot-incident-response-why-your-it-runbook-wont-save-the-plant/</loc>
		<lastmod>2026-05-07T10:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/what-makes-an-ot-network-perfectly-air-gapped-and-why-yours-probably-isnt/</loc>
		<lastmod>2026-05-07T10:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/understanding-the-industrial-dmz-level-3-5-the-security-buffer-that-keeps-industrial-systems-safe/</loc>
		<lastmod>2026-05-07T10:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/why-ot-security-is-different-from-it-security-and-why-the-distinction-still-matters/</loc>
		<lastmod>2026-05-07T10:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/a-guide-to-your-certification-journey-in-ics-ot-cybersecurity-2/</loc>
		<lastmod>2026-05-07T10:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/rising-threats-in-ot-cybersecurity-why-the-risk-landscape-is-changing-faster-than-your-controls/</loc>
		<lastmod>2026-05-07T10:21:26+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/you-dont-always-need-tools-to-protect-your-ot-environment/</loc>
		<lastmod>2026-05-07T10:21:56+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/cyber-governance-in-ics-ot-where-most-programs-quietly-fail/</loc>
		<lastmod>2026-05-07T10:22:33+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://relyblue.com/will-ai-steal-your-ot-cybersecurity-job-heres-what-i-told-a-group-of-students/</loc>
		<lastmod>2026-05-07T10:23:19+00:00</lastmod>
		<image:image>
			<image:loc>https://relyblue.com/wp-content/uploads/2026/05/Image-10-1024x472.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->