<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.securitects.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.securitects.com/</loc>
		<lastmod>2024-03-09T15:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2018/04/securitects-top-bg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-10-jahre-erfahrung-in-it-sicherheit.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-hoechste-beratungsqualitaet.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/05/securitects-angebot-innerhalb-48-stunden.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-individuelle-it-sicherheitskonzepte.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/05/securitects-umfassende-it-sicherheitsanalysen.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-konkrete-handlungsempfehlungen.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-international-anerkannte-it-sicherheitszertifikate.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-neutrale-unabhaengige-expertensicht.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-professionelle-betreuung-aus-einer-hand.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-logo-2c-pos.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-logo-2c-pos.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2018/04/securitects-top-bg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-10-jahre-erfahrung-in-it-sicherheit.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-hoechste-beratungsqualitaet.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/05/securitects-angebot-innerhalb-48-stunden.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-individuelle-it-sicherheitskonzepte.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/05/securitects-umfassende-it-sicherheitsanalysen.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-konkrete-handlungsempfehlungen.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-international-anerkannte-it-sicherheitszertifikate.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-neutrale-unabhaengige-expertensicht.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-professionelle-betreuung-aus-einer-hand.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-logo-2c-pos.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2022/03/securitects-logo-2c-pos.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.securitects.com/impressum/</loc>
		<lastmod>2023-05-02T11:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/kontakt/</loc>
		<lastmod>2023-05-02T12:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/datenschutz-beratung/</loc>
		<lastmod>2023-09-17T18:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/security-awareness-training-registration/</loc>
		<lastmod>2023-12-27T10:08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/iso-27001-gap-analyse/</loc>
		<lastmod>2024-02-07T16:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/beratung-zu-tisax/</loc>
		<lastmod>2024-06-24T07:42:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/datenschutz/</loc>
		<lastmod>2024-06-24T09:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/datenschutz-audit/</loc>
		<lastmod>2024-09-05T10:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/it-vulnerability-assessment-scan/</loc>
		<lastmod>2024-09-05T10:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/it-penetration-test-security-audit/</loc>
		<lastmod>2024-09-05T10:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/iso-22301-business-continuity-management-system-beratung/</loc>
		<lastmod>2024-09-16T12:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/karriere/</loc>
		<lastmod>2025-01-04T20:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/it-cyber-security-risk-assessment/</loc>
		<lastmod>2025-01-06T17:57:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/unternehmen/</loc>
		<lastmod>2025-09-05T12:32:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2018/04/securitects-herbert-brunner-portrait.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.securitects.com/wp-content/uploads/2018/04/securitects-herbert-brunner-portrait.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/digital-operational-resilience-act-beratung/</loc>
		<lastmod>2025-09-08T12:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/nis-2-gap-analyse/</loc>
		<lastmod>2025-09-08T12:34:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/iso-27001-information-security-management-system-beratung/</loc>
		<lastmod>2025-09-19T12:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/cyber-resilience-act-beratung/</loc>
		<lastmod>2025-09-23T10:47:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/iso-27001-internes-audit/</loc>
		<lastmod>2025-09-23T10:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/source-code-audit/</loc>
		<lastmod>2025-09-23T11:44:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/beratung-zur-resilienz-kritischer-einrichtungen-richtlinie/</loc>
		<lastmod>2025-10-29T12:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-training-kmu/</loc>
		<lastmod>2025-12-09T13:39:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/iso-27001-isms-training/</loc>
		<lastmod>2025-12-09T13:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/secure-coding-training/</loc>
		<lastmod>2025-12-09T14:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/cyber-security-services/nis-2-richtlinie-beratung-und-umsetzung/</loc>
		<lastmod>2025-12-10T08:36:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.securitects.com/nis-2-management-training/</loc>
		<lastmod>2026-02-27T15:48:01+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->