<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://peakdefence.com/blog/local-ai-infrastructure-cybersecurity-latvian/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/five-timeless-principles-of-security/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/how-time-horizons-transform-security-planning/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/method/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/the-risk-owners-guide-to-effective-risk-reviews/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/connecting-the-dots/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/open-source-methodology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/method/core/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/cross-functional-security-integration/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/method/planning/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/method/shaping/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/method/roles/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/ai/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/ai-infrastructure/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/artificial-intelligence/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/critical-infrastructure/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/cybersecurity/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/cybersecurity/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/data-sovereignty/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/eu-funding/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/latvia/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/latvian-language/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/local-infrastructure/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/nis2/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/projects/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/wingman/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/cookie-policy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/careers/security-consultant/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/resilience/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-leadership/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/security-leadership/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-principles/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/team-development/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/agile-security/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/cross-functional/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/methodology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/planning/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/security-planning/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-strategy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/time-horizons/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/cross-functional-security/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/good-practice/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/open-source/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/open-source/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-methodology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/adaptation/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/core-principles/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/governance/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/horizons/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/introduction/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/management/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/methodology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/organizational-design/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/organizational-structure/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/people/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/philosophy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/process/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/raci/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/resources/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/responsibilities/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/roadmap/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/roles/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-effectiveness/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-integration/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/security-management/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-planning/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/shaping/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/strategy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/team-structure/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/technology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/threat-modeling/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/time-management/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/ai/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/grc/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/knowledge-management/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/knowledge-silos/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/security-strategy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/careers/backend-developer/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/categories/ai-in-cybersecurity/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/tags/security-management/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/blog/what-ai-means-for-your-security-team/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/privacy-policy/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/company/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/authors/</loc></url><url><loc>https://peakdefence.com/careers/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/contact/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/careers/jobs/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/departments/</loc></url><url><loc>https://peakdefence.com/gap-audit-2025/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/locations/</loc></url><url><loc>https://peakdefence.com/nis2/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/methodology/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/demo/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/sections/</loc></url><url><loc>https://peakdefence.com/blog/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/solutions/security-services/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/solutions/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/partnerships/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/terms-of-service/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/thank-you/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/gap-audit-thank-you/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url><url><loc>https://peakdefence.com/solutions/wingman/</loc><lastmod>2025-11-07T12:19:29+02:00</lastmod></url></urlset>