<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://johntscott.com/security-architecture-review/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/cissp-logo-2.png</image:loc><image:title>CISSP-logo (2)</image:title></image:image><lastmod>2024-12-19T20:34:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/certifications/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/mcprgb.jpg</image:loc><image:title>MCP(rgb)</image:title><image:caption>Certified in 1999</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/ccsp-logo-2lines.jpg</image:loc><image:title>CCSP-logo-2lines</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/ccsp.png</image:loc><image:title>ccsp</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/cissp-issap.png</image:loc><image:title>cissp-issap</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/cissp.png</image:loc><image:title>cissp</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/mct.png</image:loc><image:title>mct</image:title><image:caption>Certified in 2011</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/mcse.jpg</image:loc><image:title>mcse</image:title><image:caption>Certified in 2010</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/mcsa.jpg</image:loc><image:title>mcsa</image:title><image:caption>Certified in 2010</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/mcdba.jpg</image:loc><image:title>mcdba</image:title><image:caption>Certified in 2010</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/ctt.jpg</image:loc><image:title>ctt+</image:title><image:caption>Certified in 2011</image:caption></image:image><lastmod>2023-03-09T01:30:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/resources/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2023/03/library-header2.jpg</image:loc><image:title>Library-Header2</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2023/03/library-header.jpg</image:loc><image:title>Library-Header</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2023/02/security-matters-header.jpg</image:loc><image:title>security-matters-header</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/internet_clipart.jpg</image:loc><image:title>internet_clipart</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/cyber-resources-cropped.jpeg</image:loc><image:title>cyber-resources-cropped</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/cyber-resources.jpeg</image:loc><image:title>cyber-resources</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/cyberresources_header.jpg</image:loc><image:title>cyberResources_header</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/cybersecurity-resources.jpg</image:loc><image:title>Cybersecurity-Resources</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/information-technology.jpg</image:loc><image:title>information-technology</image:title></image:image><lastmod>2023-03-01T21:30:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/2011/03/11/my-computer-knows-me-when-it-sees-me/</loc><lastmod>2023-03-01T19:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2011/03/01/is-that-a-humming-bird-outside-my-window/</loc><lastmod>2023-03-01T19:23:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2021/07/15/cyber-security-in-the-post-covid-world/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2020/11/covid-19_coronavirus.jpg</image:loc><image:title>covid-19_coronavirus</image:title></image:image><lastmod>2023-03-01T19:15:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2019/07/02/my-trip-to-the-gartner-security-summit/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/06/2019-06-18-14.52.51.jpg</image:loc><image:title>2019-06-18 14.52.51</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/06/2019-06-18-09.11.45.jpg</image:loc><image:title>2019-06-18 09.11.45</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/06/2019-06-20-11.07.13.jpg</image:loc><image:title>2019-06-20 11.07.13</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/06/2019-06-20-09.34.20.jpg</image:loc><image:title>2019-06-20 09.34.20</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/05/2019-06-20-09.35.06-1.jpg</image:loc><image:title>2019-06-20 09.35.06-1</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/04/gartner-summit-2019.jpg</image:loc><image:title>gartner-summit-2019</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/04/gartner-conference.jpg</image:loc><image:title>Gartner-Conference</image:title></image:image><lastmod>2023-03-01T19:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2019/04/03/its-the-little-things/</loc><lastmod>2023-03-01T19:08:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2019/03/11/the-nsa-makes-ghidra-open-source/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/ghidra.jpg</image:loc><image:title>ghidra</image:title></image:image><lastmod>2023-03-01T19:07:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2019/02/19/whos-fault-is-it/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/cybercrime-keyboard-e1550606839134.jpg</image:loc><image:title>cybercrime-keyboard</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/large.jpg</image:loc><image:title>large</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/cyber-crime.jpg</image:loc><image:title>cyber-crime</image:title></image:image><lastmod>2023-03-01T19:06:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2019/01/30/keep-it-simple/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/keep-it-simple-blog.jpg</image:loc><image:title>Keep it simple!</image:title><image:caption>The phrase  Keep it Simple written on a blackboard</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/keep-it-simple-2-e1548861685383.jpg</image:loc><image:title>keep-it-simple</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/01/keep-it-simple-1.jpg</image:loc><image:title>keep-it-simple (1)</image:title></image:image><lastmod>2023-03-01T19:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2017/03/02/cloudy-with-a-chance-of-fud/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/cloud-computing-plain.jpg</image:loc><image:title>cloud-computing-plain</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/cloud-computing.jpg</image:loc><image:title>cloud-computing</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/cloudsolutions.png</image:loc><image:title>cloudsolutions</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/cloud-computing-security.jpg</image:loc><image:title>cloud-computing-security</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/4-formas-que-el-cloud-computing-ha-cambiado-m-l-qdkjjg.jpeg</image:loc><image:title>4-formas-que-el-cloud-computing-ha-cambiado-m-l-qdkjjg</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2017/03/570f7ef8d96d6-e1466463758912.jpeg</image:loc><image:title>570f7ef8d96d6-e1466463758912</image:title></image:image><lastmod>2023-03-01T19:04:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/experience/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/05/resume-icon.jpg</image:loc><image:title>resume-icon</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download5.jpg</image:loc><image:title>download5</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download4.jpg</image:loc><image:title>download4</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download3.jpg</image:loc><image:title>Businessman using tablet and set up network connection with shield guard to protected from cyber attacks. Network security system concept</image:title><image:caption>Businessman using tablet and set up network connection with shield guard to protected from cyber attacks. Network security system concept</image:caption></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download2.jpg</image:loc><image:title>download2</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download1.jpg</image:loc><image:title>download1</image:title></image:image><lastmod>2022-11-17T14:41:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/security-gap-analysis-2/</loc><lastmod>2022-10-19T12:59:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/virtual-ciso-services/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/vciso.jpg</image:loc><image:title>vciso</image:title></image:image><lastmod>2022-10-19T12:40:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/consulting/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/security-consulting-header.jpg</image:loc><image:title>security-consulting-header</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/consulting-services-cropped.jpg</image:loc><image:title>Untitled-1 hand 51</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/security-consulting-cropped.jpg</image:loc><image:title>security-consulting-cropped</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/consultant.png</image:loc><image:title>consultant</image:title></image:image><lastmod>2022-03-08T13:08:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/soc-2-type-ii-audit-reviews/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2021/07/soc-2-compliant.jpg</image:loc><image:title>SOC-2-Compliant</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2021/07/soc-2-compliance.png</image:loc><image:title>soc-2-compliance</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2021/07/soc-2-2.jpg</image:loc><image:title>soc-2 (2)</image:title></image:image><lastmod>2021-08-11T12:33:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/threat-management-and-risk-mitigation/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/cybersecurity-graphic.png</image:loc><image:title>cybersecurity-graphic</image:title></image:image><lastmod>2021-07-16T19:52:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/contact/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/download5-cropped.jpg</image:loc><image:title>download5-cropped</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/contact-me.jpg</image:loc><image:title>contact-me</image:title></image:image><lastmod>2021-07-14T20:09:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/breach-response-management/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/breach-and-incident-response.jpg</image:loc><image:title>breach-and-incident-response</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/breach.jpg</image:loc><image:title>antivirus</image:title><image:caption>antivirus</image:caption></image:image><lastmod>2020-11-25T16:32:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/compliance-and-audit-response/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2020/09/compliance-audit.png</image:loc><image:title>compliance-audit</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/02/compliance.jpg</image:loc><image:title>compliance</image:title></image:image><lastmod>2020-11-25T16:31:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/14-2/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/maine-photo-3-e1552410616186.jpg</image:loc><image:title>maine-photo-3</image:title></image:image><lastmod>2020-10-20T18:36:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/the-vault/</loc><lastmod>2019-05-28T19:34:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/blog-2/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2019/03/securitymatters-logo.png</image:loc><image:title>securitymatters-logo</image:title></image:image><lastmod>2019-04-03T17:40:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/online-cyber-security-training-resources/</loc><lastmod>2019-04-03T17:02:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://johntscott.com/2010/09/22/why-again/</loc><lastmod>2010-09-22T14:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/08/10/certifiable-again/</loc><lastmod>2010-08-10T15:21:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/03/hello-world/</loc><lastmod>2010-05-25T11:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/04/thank-you-mr-gates/</loc><lastmod>2010-05-25T11:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/05/good-bad-or-indifferent/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/02/tom_swift_11.jpg</image:loc><image:title>tom_swift_1</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/02/tom_swift_1.jpg</image:loc><image:title>tom_swift_1</image:title></image:image><lastmod>2010-05-25T11:42:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/09/what-about-when-it-fails/</loc><lastmod>2010-05-25T11:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/17/splitting-hairs/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/02/speedskating.jpg</image:loc><image:title>Speedskating</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/02/luge.jpg</image:loc><image:title>Luge</image:title></image:image><lastmod>2010-05-25T11:39:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/05/17/the-future-of-space/</loc><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/05/apollo11_astronauts.jpg</image:loc><image:title>Apollo11_Astronauts</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/05/virgingalactic-spaceport.jpg</image:loc><image:title>virgingalactic-spaceport</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/05/branson1.jpg</image:loc><image:title>branson1</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/05/obama-nasa1.jpg</image:loc><image:title>Obama-NASA</image:title></image:image><image:image><image:loc>https://johntscott.com/wp-content/uploads/2010/05/obama-nasa.jpg</image:loc><image:title>Obama-NASA</image:title></image:image><lastmod>2010-05-24T12:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com/2010/02/03/technology-meets-art/</loc><lastmod>2010-02-04T18:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://johntscott.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-12-19T20:34:08+00:00</lastmod></url></urlset>
