<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.iriusrisk.com</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/advanced-analytics-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/ai-threat-modeling-and-ml</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/building-secure-software</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/cisos</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/community</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/contact</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/cookie-policy-0</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/demonstrate-security-planning-compliance</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/developers</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/diagram-threat-modeling-through-effective-representation</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/educational-workshop-series</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/empowering-developers-to-build-secure-code</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/eu-cyber-resilience-act-and-how-threat-modeling-can-help</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/european-regional-development-funding</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/find-flaws-and-fixes-in-minutes</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/forrester-tei-study</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/guides-and-toolkits</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/iac</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/iec-62443</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/leadership-team</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/legal</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/nist-800-53-and-how-threat-modeling-can-help</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/operational-technology</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/partners</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/plans</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/project-elevate</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/scalable-collaborative-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/schedule-a-demo</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/security-champions</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/security-content-libraries</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/technical-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/the-open-threat-model-standard</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-model-connect</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-for-medical-devices</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-methodologies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-platform</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-public-sector</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-technology</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-to-aid-regulatory-compliance</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/shostack-associates-coaching</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/eccc-funding</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/ai-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-best-practices-with-gartner</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/search</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/necessary-security-llc</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/conversational-ai-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/customer-updates</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/me/home</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/me/threat-modeling-platform</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/me/ai-threat-modeling-with-jeff</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/video</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/toreon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/careers</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling-training</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/secure-by-design</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/services</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/services-use-cases</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/state-of-threat-modeling-report</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/guide-building-enterprise-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/5-ways-to-transform-threat-modeling-into-a-core-sdlc-practice</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/62443-example-1-sl-a-to-sl-t-basic-component</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/62443-example-2-motor-shaft-and-panels</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/adam-shostack-joins-iriusrisks-board</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/adding-security-into-the-sdlc</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/addressing-us-medical-device-cyber-integrity-and-protecting-patients-1</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/ai-and-threat-modeling-for-secure-architecture</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/ais-role-in-shift-left-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/analyzing-risk-and-automating-threat-modeling-within-your-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/announcement-iriusrisk-2-1-released</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/announcement-iriusrisk-threat-modeling-platform-2-0-released</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/applying-stride-methodology-to-threat-model-a-new-component</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/armorcode-and-iriusrisk-join-forces</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/automotive-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/blueprints-in-iriusrisk-design-without-limits</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/bringing-inspiring-girls-to-aragon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/build-a-cybersecurity-powerhouse-how-to-launch-a-successful-security-champion-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/build-gdpr-compliance-into-your-applications-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/building-a-robust-llm-pipeline-on-aws-a-technical-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/building-foundations-for-your-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/building-gdpr-compliant-software-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/building-llm-pipeline-on-azure-a-technical-walkthrough</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/building-llm-pipeline-on-gcp-a-technical-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/buy-vs-build-a-threat-modeling-tool</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/capec-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/ciso-guide-to-ai-terms-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/code-is-easier-software-is-harder</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/community-edition-hits-four-thousand-users</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/community-edition-new-release</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/continuum-joins-lorca-uk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/continuum-security-donate-asvs-nist-800-53-mapping-to-owasp</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/cvss-v4-key-changes</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/cyber-communication-gap-board-risk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/cyber-resilience-act-compliance</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/delivering-value-with-your-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/deploying-iriusrisk-to-aws-high-availability-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/did-we-do-a-good-job-in-our-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/doubling-down-on-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/driving-adoption-for-your-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/driving-your-threat-modeling-program-further</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/elevating-embedded-device-security-mitre-emb3d</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/embedded-device-security-gap-analysis</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/embedding-security-by-design-a-shared-responsibility</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/eu-ai-act-security-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/eu-cyber-resilience-act-and-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/evolving-threat-modeling-taking-longer-strides</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/fedramp-a-simple-guide-to-a-strict-cloud-security-standard</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/financial-services-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/first-international-workshop-on-gender-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/five-modern-day-considerations-for-medical-device-manufacturers</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/gdpr-and-application-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/genai-agents-are-so-hot-but-are-they-secure</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/global-expansion-mark-watson</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/healthcare-cybersecurity-the-challenges-and-how-to-mitigate-the-risks</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/hierarchy-of-needs-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/hipaa-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/history-of-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/how-do-i-apply-threat-modeling-in-my-organization</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/how-to-create-an-open-threat-model-parser</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/how-to-implement-security-into-software-design-from-the-get-go-0</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/how-to-sniff-cookies-over-https</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/hybrid-threat-modeling-manual-and-automated-approaches</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/ics-security-in-the-cloud-age</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iec-62443-example-3-medical-devices-ot-iot-cloud-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iec-62443-example-4-ot-communications-protocols</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iec-62443-example-5-embedded-device-requirements</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iec-62443-example-6-hardware-security-requirements</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/implementing-security-what-technology-for-which-controls</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/industrial-automation-control-systems</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/insecure-design-added-as-a-new-category-in-the-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/introduction-to-the-open-threat-model-standard</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-2-1-4-release</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-3-2</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-and-cve-2022-22965</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-announces-appointment-of-dr-gary-mcgraw-to-threat-modeling-technical-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-announces-appointment-of-new-vp-product-development-fraser-scott</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-announces-series-a-investment-round</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-appoints-elise-hayes-as-strategic-alliance-director-for-north-america</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-at-devseccon-london-2017</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-at-lorca-live-2020</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-community-v3</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-cwe</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-doubles-the-team-and-annual-recurring-revenue-in-2021</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-functional-components</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-grew-over-80-in-2022</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-infrastructure-as-code-to-enable-automatic-threat-modeling-of-cloud-native-designs</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-launches-new-vision-and-brand-initiative</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-launches-open-threat-model-standard-under-a-creative-commons-license</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-raises-15m-investment-from-swanlaab-jme-sonae-im</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-raises-series-b</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-rules-engine</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-technical-member-isa-security-compliance-institute-isci</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-threat-model-templates</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-tops-the-list-9-great-devsecops-tools-for-dev-teams</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iriusrisk-unaffected-by-log4j</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/launches-threat-modeling-conect</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/launching-iriusrisk-community-edition</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/lets-talk-about-the-security-of-ai-and-ml-systems</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/level-up-your-risk-management-frameworks-and-boost-roi-with-secure-by-design-practices</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/lucidchart-threat-modeling-workflow</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/maestro-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/making-european-medical-devices-more-secure</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/managing-threat-libraries-with-distributed-teams</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/methodologies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/mitre-attck-for-industrial-control-systems-in-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/mitre-attck-library-in-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/must-learn-ai-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/new-community-edition-oct-2021</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/new-dataflow-library-in-iriusrisk-v4-6</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/new-era-of-software-development</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/nist-considering-devsecops-framework-for-agencies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/nist-ssdf-and-iriusrisk-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/nists-threat-modeling-recommendation-and-methodology</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/no-rules-required-new-model-questionnaire-builder</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/oauth-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/octave-threat-modeling-methodologies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/open-infrastructure-security-with-openstack-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/overcoming-analysis-paralysis</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/pasta-threat-modeling-methodologies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/pci-dss-4-0-and-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/predicting-the-unpredictable-how-generative-ai-is-reimagining-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-3-11</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-0</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-0-5</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-28</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-29</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-30</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-31</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-32</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-33</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-34</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-36</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-37</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-38</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-39</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-40</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-41</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-42</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-43</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-44</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-45</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-46</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-47</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-48</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-49</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-50</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-51</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-52</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-53</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-release-4-54</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-iriusrisk-version-4-0-4</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-3-12</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-3-13</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-1</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-10</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-11</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-12</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-13</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-14</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-15</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-16</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-17</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-18</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-19</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-2</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-20</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-21</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-22</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-23</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-24</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-25</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-26</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-27</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-3</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-4</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-5</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-6</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-7</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-8</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/product-update-release-4-9</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/railway-automation</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/recommended-threat-modeling-tools</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/reducing-redos-attacks-in-our-software</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/remote-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/role-permissions-management</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/roles-responsibilities-of-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/sbom-wheres-my-threat-model</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/scaling-threat-modeling-with-tools</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-and-threat-modeling-your-guide-to-a-proactive-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-aws-s3-buckets</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-hardware-security-modules-hsms</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-introduction</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-series-implementing-zero-trust-architecture-zta</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-by-design-tools</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/secure-software-design-the-key-to-a-secure-business-future</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/securing-ai-a-cisos-guide-to-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/securing-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/securing-ml-ai-systems-and-applications</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/securing-software-a-little-less-conversation-and-a-little-more-action-please</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/securing-the-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/security-champions-the-importance-of-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/security-champions-threat-modeling-time-of-increased-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/security-is-a-journey</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/setting-the-scene-for-your-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/shifting-security-left-how-ai-is-revolutionizing-my-cybersecurity-strategy-and-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/singapores-cybersecurity-agency-mandates</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/stride-and-capec-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/technical-advisory-board-expansion</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/the-eu-product-liability-directive-and-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/the-future-of-threat-modeling-with-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/the-good-the-bad-and-the-ugly-of-ai-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/the-realities-of-genai-in-software-development</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/the-sdlc-and-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/things-that-may-look-like-threat-modeling-but-arent</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-hunting-vs-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-aligning-with-doras-vision-for-digital-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-as-a-way-of-thinking-about-design-flaws-log4j-case</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-for-iiot-devices-and-gateways</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-for-web-developers</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-methodology-stride</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-misconceptions-ants-and-the-grasshopper</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-smart-buildings</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-software-features-vs-architecture</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-terminology</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-the-edge-building-security-into-industrial-control-systems</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-vs-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-workflow-for-aws-cloudformation-architectures-using-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-workflow-for-microsoft-threat-modeling-tool</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-workflow-for-microsoft-visio</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modeling-workflow-for-terraform-defined-architectures-using-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/threat-modelling-finding-flaws-before-software-goes-live</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/tmcl-what-is-the-open-threat-model</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/trike-threat-modeling-methodologies</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/two-heads-are-better-than-one</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/understanding-cwes-and-cves-and-how-they-impact-your-threat-models</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/us-financial-security-understanding-occ-and-ffiec-regulations</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/use-case-threat-modeling-saas-applicationss</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/v4-press-release</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/vibe-coding</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/web-application-security-checklists-as-code</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/webinar-new-strategy-can-scale</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/webinar-the-total-economic-impact-of-the-iriusrisk-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/what-is-application-security-six-activities-include-appsec-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/what-is-the-threat-modeling-manifesto</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/what-is-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/why-ai-wont-kill-developer-jobs</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/why-invest-in-a-threat-modeling-tool</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/why-opening-our-tool-to-the-community-is-so-important-to-us</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/resources-blog/winners-of-spains-first-cyber-security-accelerator-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/2023-fincyber-today</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/2024-americas-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/2024-fincyber-today-canada</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/appsec-socal-2024</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/armorcode-luncheon-at-blackhat</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/basc-2024</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/def-con-happy-hour</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/def-con-happy-hour-25</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/denver-owasp-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/german-owasp-day</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/hou-sec-con</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/idc-foundry-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/infosec-enterprise-application-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/meet-us-at-blackhat-2025</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/meet-us-at-rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/opentext-summit-madrid-2025</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-2023-global-appsec</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-austin-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-benelux-days-2025</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-benelux-days-conference</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-germany-day-2025</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-global-appsec-2024-lisbon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-global-appsec-barcelona</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-global-appsec-dc</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-global-appsec-san-francisco</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/owasp-snowfroc</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/threat-modeling-nyc-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/threatmodcon-2025-barcelona</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/threatmodcon-lisbon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/threatmodcon-san-francisco</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/tmc-barcelona-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/tmc-london-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/tmc-tokyo-meetup</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/triangle-infosecon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/events/wall-street-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/adrian-bettag</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/ajay-vaghela</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/allie-howe</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/alvaro-reyes</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/brandon-green</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/charles-marrow</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/claire-allen-addy</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/david-doughty</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/devin-maguire</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/fraser-scott</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/irfaan-santoe</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/iriusrisk-team</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/james-rabe</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/john-taylor</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/jonny-tennyson</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/jorge-esperon</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/jose-lopez</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/josue-encinar</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/lamine-aouad</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/lidia-bergua-sarroca</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/paul-santapau-nebot</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/santiago-manero-de-la-fuente</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/author/stephen-de-vries</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/abn-amro</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/american-enterprise-scaled-130-threat-models-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/axway-case-study</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/british-education-company-case-study</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/british-insurance-services-provider</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/building-secure-by-design</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/clearbank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/custom-threat-modeling-and-powerbi-integration</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/cybersecurity-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/european-bank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/european-financial-services-provider</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/fortune-500-technology-organization</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/german-transport-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/global-financial-leader-scales-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/global-information-services-company-meets-fda-eu-regulatory-requirements-with-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/global-top-10-bank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/leading-french-it-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/lenovo-looks-to-iriusrisk-to-enhance-its-security-strategy-practices-for-future-growth</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/medical-device-company-uses-iriusrisk-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/medical-device-customers</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/multinational-conglomerate</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/multinational-payment-service-provider-threat-model-their-move-to-the-cloud-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/multinational-professional-services-brand</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/nexi</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/pearson</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/raiffeisen-bank-international</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/tailored-threat-modeling-for-financial-institiution</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/u-s-based-it-consultancy-firm-partners-with-iriusrisk-to-implement-threat-modeling-solution-for-major-u-s-airlines-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/us-based-financial-services-firm</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/us-based-mutual-life-insurance-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/case-studies/us-based-software-company</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/accelerating-and-securing-your-cloud-modernization-journey</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/ai-and-meaningful-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/ai-prompt-engineering-for-secure-architecture</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/ai-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/ai-threat-modeling-product-webinar</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/banking-on-security-why-threat-modeling-is-a-solid-investment</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/better-together-webinar</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/better-together-webinar-series-episode-2</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/building-whats-next-the-h1-2026-roadmap</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/cocktails-and-architecture</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/community-edition-getting-started-with-your-threat-modeling-diagram</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/der-eu-cyber-resilience-act-kommt</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/developer-friendly-threat-modeling-making-security-a-design-activity-not-a-tax</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/diagram-it-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/diagram-it-enhancing-threat-modeling-through-effective-representation---single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/diagram-it-enhancing-threat-modeling-through-effective-representation-apis</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/diagram-it-iot</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/diagram-it-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/empowering-your-future-streamlining-security-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/future-proofing-your-digital-assets-a-secure-by-design-strategy</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/genai-primer-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/getting-started-with-your-threat-model-diagram</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/how-our-clients-built-threat-modeling-programs-that-work</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/how-to-build-a-successful-threat-modeling-program-ep1</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/how-to-build-a-successful-threat-modeling-program-ep2</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/integrate-it-issue-tracker</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/integrate-it-series-governance-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/iriusrisk-customer-exclusive-product-roadmap-2024</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/iriusrisk-product-development-new-now-and-next</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/leveling-up-your-software-security</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/match</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/navigating-secure-design-when-ai-is-the-antidote</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/next-generation-threat-modeling-with-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/project-elevate---episode-1-setting-kpis-and-okrs-in-your-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/project-elevate---episode-2-understanding-workflows</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/project-elevate---episode-3-customizing-content-components</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/project-elevate---episode-4-utilizing-integrations</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/project-elevate---episode-5-ama-ask-me-anything</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/questionnaires-in-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/secure-by-design-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/secure-by-design-spotlight-with-synchronoss</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/secure-design-with-iriusrisk-draw-io</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/secure-sdlc-processes-with-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/securing-a-lifetime-of-learning-with-pearson</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/securing-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/smart-configurations-strengthen-your-threat-models</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/starting-left-how-abn-amro-scaled-security-to-development</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/taking-the-work-out-of-workflows</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/the-ciso-story---how-to-show-the-value-of-secure-by-design-to-your-executive-team</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/the-four-steps-to-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/the-threat-modeling-manifesto-from-theory-to-practice</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-and-countermeasure-prioritization</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-model-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-club-live-community-the-pathway-to-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-customizing-content-in-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-ep3-driving-adoption</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-ep4-driving-your-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-ep5-did-we-do-a-good-job</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-in-30-mins-or-less</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-maturity-what-changes-from-startup-to-enterprise</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-series-6-delivering-value</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-vs-the-bottom-line-whats-the-roi</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-webinar-new-normal-collaboration-and-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/threat-modeling-with-eop-book</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/using-llms-ai-securely</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/webinars/when-will-adam-shostack-be-replaced-by-chatgpt-the-implications-of-machine-learning-on-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/devici</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/enterprise</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/freemium</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/microsoft-threat-modeling-tool-alternative</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/okrs-unleashed</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/owasp-threat-dragon-alternative</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/security-compass</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-modeling/threat-modeler-alternative</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/form/enterprise-pricing</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/form/professional-pricing</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/threat-model-your-way/ai-and-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/analyzing-the-threats</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/answer-our-questionnaire-to-create-a-diagram</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/assessing-threats-in-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/countermeasures</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/create-a-diagram-from-scratch</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/creating-a-threat-model</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/custom-fields</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/custom-mappings-for-jira</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/did-we-do-a-good-job</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/embedded-iriusrisk-project-diagrams-in-external-tools</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/expanded-azure-devops-field-mapping</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/filter-threats-and-countermeasures-by-custom-fields</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/import-a-template-or-choose-from-ours</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/import-from-a-diagramming-tool-or-iac</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/import-from-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/importing-leanix-diagrams-qtizs</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/integrations-and-imports</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/introduction</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/keeping-drawio-diagrams-format-when-importing-to-iriusrisk</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/lucidchart-and-visio-diagram-imports</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/objects</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/project-roles</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/rules</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/security-content</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/security-content-hub</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/set-users-role-in-a-business-unit-bu</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/templates</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/the-four-question-framework-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/threat-details</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/use-our-ai-assistant-jeff</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/documentation/workflows</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/aib</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/barclays</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/bmo</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/bny</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/caixabank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/credit-agricole</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/deutsche-bank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/discover</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/edward-jones</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/handelsbanken</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/marsh</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/mastercard</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/morgan-stanley</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/onemain-financial</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/societe-generale</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/standard-chartered</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/t-rowe-price</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/truist</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/unicredit-2</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/usaa</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/with-td-bank-qivc1</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/time-to-threat-model/zurcher-kantonalbank</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/iriusrisk-associate</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/iriusrisk-certified-administrator</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/iriusrisk-features-and-configurations</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/partner-practitioner-program</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/security-by-design-essentials</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-agentic-ais</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-ai</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-ai-ml-systems-essentials</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-champion</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-embedded-devices</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-foundations</loc>
    </url>
    <url>
        <loc>https://www.iriusrisk.com/academy/threat-modeling-program-roll-out</loc>
    </url>
</urlset>