<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://tl2security.com/2023/05/24/taking-care-of-business/</loc><lastmod>2023-05-24T13:21:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/05/16/you-me-and-dystopia/</loc><lastmod>2023-05-16T12:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/05/08/beer-powerpoint-and-politics/</loc><lastmod>2023-05-08T14:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/04/26/when-it-all-goes-pete-tong/</loc><lastmod>2023-04-26T11:08:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/04/19/we-have-both-types-of-teaching-here-education-and-awareness/</loc><lastmod>2023-04-19T11:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/04/05/ciso-basics-part-2/</loc><lastmod>2023-04-05T12:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/03/29/ciso-basics-part-1/</loc><lastmod>2023-03-29T16:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/03/22/risky-business/</loc><lastmod>2023-03-22T15:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/03/15/document-and-review/</loc><lastmod>2023-03-15T12:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2023/03/07/agile-or-fragile/</loc><lastmod>2023-03-07T18:37:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/home-backup/</loc><lastmod>2020-11-28T16:51:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/2020/11/28/selling-out-and-moving-out/</loc><lastmod>2020-11-28T15:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/10/29/the-new-etiquette-of-webinars-insert-post-covid-statement-here/</loc><lastmod>2020-10-29T12:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/about-us/about/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/02/top-ten-blue.jpg</image:loc><image:title>Top 10 winner</image:title><image:caption>Top 10 winner</image:caption></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/02/fullsizerender.jpg</image:loc><image:title>fullsizerender</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/02/unknown.jpeg</image:loc><image:title>unknown</image:title></image:image><lastmod>2020-07-27T07:26:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/2020/06/24/when-auditors-attack/</loc><lastmod>2020-06-24T11:44:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/06/17/all-fun-games/</loc><lastmod>2020-06-17T11:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/06/10/too-much-of-a-good-thing/</loc><lastmod>2020-06-10T11:43:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/06/03/strategic-defense/</loc><lastmod>2020-06-03T11:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/05/27/busy-doing-nothing/</loc><lastmod>2020-05-27T11:41:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/05/20/command-control-and-conquer/</loc><lastmod>2020-05-20T11:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/05/07/the-runners-and-riders-of-lockdown/</loc><lastmod>2020-05-07T12:17:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2020/03/18/shameless-coronavirus-special-promotion-risk-edition/</loc><lastmod>2020-04-01T11:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/services/cyber-essentials/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/03/iu-17.jpeg</image:loc><image:title>iu-17</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/03/iu-8.png</image:loc><image:title>iu-8</image:title></image:image><lastmod>2020-03-30T13:18:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/partners/leadership-through-data/</loc><lastmod>2020-03-27T19:58:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/partners/th4ts3cur1ty-company/</loc><lastmod>2020-03-27T19:57:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/resources/portals/</loc><lastmod>2020-03-27T19:55:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/services/consulting/</loc><lastmod>2020-03-27T19:53:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/services/speaking/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/02/img_0079.jpeg</image:loc><image:title>IMG_0079</image:title></image:image><lastmod>2020-03-27T19:53:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/services/rates/</loc><lastmod>2020-03-27T19:52:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/about-us/testimonials/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/pinsent-masons.jpg</image:loc><image:title>Pinsent Masons</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations5.jpg</image:loc><image:title>Recommendations5</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations6.jpg</image:loc><image:title>Recommendations6</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations4.jpg</image:loc><image:title>Recommendations4</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations3.jpg</image:loc><image:title>Recommendations3</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations2.jpg</image:loc><image:title>Recommendations2</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2020/02/recommendations.jpg</image:loc><image:title>Recommendations</image:title></image:image><lastmod>2020-03-02T22:45:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/partners/</loc><lastmod>2020-02-08T00:13:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/about-us/</loc><lastmod>2020-02-08T00:09:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/resources/downloads/</loc><lastmod>2020-02-08T00:01:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/services/</loc><lastmod>2019-10-26T15:59:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/resources/</loc><lastmod>2019-10-26T15:57:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com/2019/02/18/welcome-to-our-blog/</loc><lastmod>2019-10-26T12:56:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/07/26/the-lost-ciso-who/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0783.jpeg</image:loc><image:title>IMG_0783</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0783-2.jpg</image:loc><image:title>IMG_0783</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0785-1.jpeg</image:loc><image:title>IMG_0785</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0783-1.jpg</image:loc><image:title>IMG_0783</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0785.jpeg</image:loc><image:title>IMG_0785</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/07/img_0783.jpg</image:loc><image:title>IMG_0783</image:title></image:image><lastmod>2019-07-26T11:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/06/28/keeping-it-supremely-simple-the-nasa-way/</loc><lastmod>2019-06-28T12:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/06/24/price-versus-value-why-it-is-important-in-information-security/</loc><lastmod>2019-06-24T11:09:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/06/19/waving-not-drowning/</loc><lastmod>2019-06-19T14:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/06/11/standards-standards-and-more-standards/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/06/adobestock_109666567.jpeg</image:loc><image:title>Junge präsentiert selbstbewusst seine Bizeps Muskeln</image:title></image:image><lastmod>2019-06-14T15:49:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/03/25/rsa-2019-and-women-finally-had-to-queue-for-the-toilets/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/03/whyqueuesfor.jpg</image:loc><image:title>whyqueuesfor</image:title></image:image><lastmod>2019-03-25T09:41:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/03/21/a-lot-of-talking/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/03/8190ycxe9cl._cr0038402880_._sl1000_.jpg</image:loc><image:title>8190YCXe9cL._CR0,0,3840,2880_._SL1000_</image:title></image:image><lastmod>2019-03-25T06:04:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/02/25/opening-a-new-door-of-opportunity/</loc><lastmod>2019-02-25T18:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/2019/02/18/drowning-not-waving/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/02/shutterstock_40212385.jpg</image:loc><image:title>shutterstock_40212385</image:title></image:image><lastmod>2019-02-19T11:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://tl2security.com/blog/</loc><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/01/img_0106.jpg</image:loc><image:title>img_0106</image:title></image:image><image:image><image:loc>https://tl2security.com/wp-content/uploads/2019/01/pexels-photo-57690.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2019-02-08T16:58:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://tl2security.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-05-24T13:21:54+00:00</lastmod></url></urlset>
