<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.apptega.com</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/lp/continuous-compliance-report</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/security-providers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/careers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcast</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/audit-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/risk-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/iso-27001-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/fedramp</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/use-cases/continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/risk-compliance-management-mssp-msp-mdr</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/nist-csf</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/drata</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/cybersecurity-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/all-frameworks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/consulting-firms-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/free-trial</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/2025-state-of-continuous-compliance-report</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partner-directory</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/integrations</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/what-is-grc-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/law-firms</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/security-teams</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/controlmap</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/get-demo</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/contact</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/third-party-risk-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/nist-800-171-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/2024-state-of-continuous-compliance-report</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/higher-education</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/vanta</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/soc-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/kcm-grc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/ffiec-cat-tool</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compare/hyperproof</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/about</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/cmmc-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/cis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/glba-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/lp/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/framework-crosswalking</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/soc-1</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/guide/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/use-cases/security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/assessment-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/policy-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/use-cases/risk-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/platform/compliance-reporting-automation</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/new-partner-page</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/cape-henry</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/cybersecop</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/evolve-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/foresite</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/gsec</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/guernsey</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/jdl-group</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/kalahari-resorts</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/case-studies/vistrada</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/10-ways-mssps-can-streamline-and-simplify-security-and-compliance-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/3-reasons-for-the-security-talent-shortage-how-to-overcome-it</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/3-tips-for-ensuring-ccpa-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/3-ways-a-grc-platform-can-help-mssps-improve-the-audit-process</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-reasons-saas-companies-are-automating-soc-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-tips-to-simplify-your-strategy-during-cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-ways-mssps-can-help-clients-manage-grc-with-much-need-executive-buy-in</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-ways-mssps-can-simplify-client-cyber-practices</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-ways-to-build-cybersecurity-best-practices-into-your-organizational-culture</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/4-ways-to-get-more-money-for-your-cybersecurity-budget</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/5-tips-for-responding-to-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/5-ways-a-grc-platform-can-elevate-your-security-and-compliance-programs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/5-ways-security-and-compliance-can-break-down-silos-to-save-money-and-meet-increased-regulations</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/5-ways-to-ace-your-audits-in-2023</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/5-ways-to-increase-security-and-compliance-efficiencies-in-2023</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/6-chart-topping-cybersecurity-compliance-trends-for-2022</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/6-cybersecurity-trends-to-keep-an-eye-on-in-the-new-year</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/6-reasons-why-todays-cybersecurity-landscape-is-so-complex</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/6-ways-to-scale-your-msp-with-compliance-services</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/9-quick-tips-for-pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/a-step-by-step-guide-to-navigating-high-stakes-audits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/a-step-by-step-guide-to-navigating-high-stakes-audits-dddd9</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/afraid-and-confused-by-cmmc-bingo</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ai-your-ally-in-cybersecurity-compliance-and-audits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ais-rising-role-in-cybersecurity-adapting-to-the-changing-landscape</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-chief-people-officer-dilshan-ratnayake</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-chief-product-officer-rahul-bakshi</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-ciso-wyman-lewis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-funding-announcement-2024</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-hacware-partnership-equips-msps-with-ai-driven-training-to-clear-compliance-hurdles</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-iso-42001-support</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-lands-39-g2-badges-in-fall-report</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-launches-in-pax8</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-launches-new-framework-glba</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-named-grc-momentum-leader-in-g2-spring-reports</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/apptega-names-bob-layton-as-cro-to-help-security-providers-meet-todays-compliance-challenges</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/are-you-riding-the-grc-wave-or-missing-the-boat</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/as-regulators-lurk-companies-look-to-vcisos-to-fill-board-level-expertise-void</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/avoiding-saas-breaches</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/best-grc-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/bringing-enterprise-grade-tprm-to-the-mid-market</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/build-to-win-spring-product-launch</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/building-compliance-from-scratch-with-a-culture-of-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/building-the-ideal-vciso-offering</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/change-configuration-management-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/check-the-box-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/choose-the-right-framework-to-better-navigate-the-convergence-of-data-privacy-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cis-v7-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cjis-v6-whats-new-and-how-apptega-helps-you-stay-compliant</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-2-0-a-program-not-a-project</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-2-0-a-wait-and-see-game</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-2-0-phased-implementation-begins-this-year-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-certification-and-compliance-soon-required-for-government-contractors-subcontractors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-certification-tips-for-preparation</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-preparation-study</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cmmc-self-assessments</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/colorado-becomes-the-third-state-to-pass-state-mandated-privacy-requirements</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-automation-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-champions-how-msps-help-smbs-comply-with-nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-management-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/compliance-strategy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/continuous-monitoring</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/covid-19-pandemic-planning-managing-cybersecurity-for-remote-teams</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/covid-19-uncertainties-fuel-ransomware-attacks-and-phishing-schemes</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/creating-a-people-first-cybersecurity-business</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cyber-insurance-policy-coverage</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cyber-insurance-the-key-to-business-resilience-in-a-risky-world</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cybersecurity-and-esg-integration</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cybersecurity-executive-order-2021</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cybersecurity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/cybersecurity-tabletop-exercises-ensuring-tangible-success-in-a-virtual-world</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/demystifying-cyber-insurance-7-key-security-controls-every-mssp-should-have</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/demystifying-cyber-insurance-7-key-security-controls-every-organization-should-have</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/department-of-defense-unveils-cmmc-2-0-opening-a-five-year-implementation-window</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/doj-cybercrime-watchdogs-first-settlement-signals-crackdown-on-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/dont-put-preparation-on-pause-cmmc-2-0-is-coming-quicker-than-you-think</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/embracing-the-future-with-nist-csf-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/everything-you-never-knew-about-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/executive-buy-in-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/executive-order-streamlines-cybersecurity-and-reporting-expectations</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/five-reasons-customers-are-demanding-grc-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/foresite-partners-with-apptega-to-deliver-cybersecurity-to-customers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/fully-automated-ai-powered-vciso-services-now-live-in-apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/gbq-joins-apptegas-growing-network-of-partners</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/gdpr-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/go-further-spring-product-launch</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/hipaa-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-cybersecurity-affects-mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-risk-management-increases-mssp-value-to-customers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-to-balance-cyber-costs-with-resilience-goals</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-to-bundle-your-cybersecurity-and-compliance-services</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-to-present-cybersecurity-to-your-board-of-directors-99b83</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/how-to-win-at-state-privacy-whack-a-mole</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/iso-27001-certification-should-my-business-become-certified</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/it-and-ot-security-why-integrated-programs-are-key-to-protecting-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/its-no-longer-about-just-defending-your-kingdom-you-must-withstand-the-storms</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/kaseya-breach-key-takeaways-for-managed-service-providers-webinar</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/log4shell-vulnerability-visibility-and-prevention</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/look-ma-g2-awarded-us-with-a-giant-stack-of-badges</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/make-life-easier-with-a-good-malware-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/managed-compliance-services</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/managing-cybersecurity-risks-up-down-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/managing-cybersecurity-risks-up-down-the-supply-chain-part-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/msp-mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/msps-can-simplify-and-streamline-cmmc-2-0-preparation-and-certification-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/navigating-the-changing-cmmc-landscape-with-mssp-support</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/new-apptega-cfo-brett-bowman</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/new-apptega-cto-john-eastman</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/new-year-new-budgets-how-mssps-can-help-clients-better-manage-cyber-costs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/new-year-tough-economic-times-not-a-reason-to-cut-back-on-cybersecurity-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/nist-800-171-revision-3-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/nist-800-172-and-enhancements-for-sp-800-171-may-strengthen-cui-protection-controls</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/nist-csf-and-cis-v8-commonalities-differences</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ohio-data-protection-act-a-safe-harbor-from-cyber-liability</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/overcoming-common-healthcare-compliance-and-security-challenges-post-pandemic</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-rozmith</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-carl-carpenter</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-josh-fleming-of-echelon</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-larry-akinsooto-of-jdl-group</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-nim-nadarajah-of-criticalmatrix</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-tom-brennan-of-proactive-risk</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/partner-perspectives-with-tracy-fox-of-foresite-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/pci-dss-v4-0-updates</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/presenting-cybersecurity-program-to-a-board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/protecting-your-data-addressing-privacy-and-security-concerns-related-to-ai-tools</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ransomware-attacks-increasing-tips-to-keep-your-organization-safe</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/ransomware-the-unwanted-gift-hackers-keep-on-giving</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/re-integrate-product-launch</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/real-estate-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/recent-nydfs-penalties</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/regulatory-compliance-solutions</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/release-notes-april-2024</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/release-notes-june-2024</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/release-notes-march-2025</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/release-notes-may-2024</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/release-notes-september-2024</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/remote-desktop-and-hackers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/sec-proposals-elevate-infosec-to-board-level</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/secure-comply-repeat-product-launch-event</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/securing-your-infrastructure-with-msp-vendor-risk-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/security-assessment</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/security-compliance-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/selling-value-empowering-msps-to-drive-sales</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/simplify-grc-with-key-strategies-and-technologies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/soc-2-audit-explained-for-saas-companies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/social-distancing-cybersecurity-desk-audits-to-stem-the-spread-of-covid-19</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-ai-compliance-tightrope</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-ai-readiness-gap-why-organizations-are-unprepared</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-comprehensive-value-of-investing-in-both-cybersecurity-and-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-easiest-way-to-pass-an-sec-audit</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-harmonization-effect-transforming-your-cybersecurity-program-to-transform-your-company</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-impact-of-president-bidens-executive-order-on-cybersecurity-readiness</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-msp-guide-to-client-retention-and-acquisition</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-msp-to-mssp-pipeline-how-to-make-the-transition-and-expand-your-business</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-msps-role-in-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-pax8-beyond-conference-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-product-pulse</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-product-pulse-april</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-product-pulse-august</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-product-pulse-july</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-product-pulse-may</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-risk-based-relationship-driven-consultant</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-roi-of-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-role-of-mssps-in-successful-audits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-role-of-security-frameworks-in-determining-cyber-insurance-risks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-slippery-slope-of-cyber-insurance-what-every-mssp-needs-to-know</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-small-business-fallacy-why-you-need-cybersecurity-and-insurance-more-than-ever</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/the-ultimate-guide-to-compliance-framework-crosswalking</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/third-party-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/third-party-risk-management-mixpanel-openai-incident</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/too-many-cybersecurity-vendors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/top-4-security-threats-facing-mssps</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/top-5-cybersecurity-trends-for-2021</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/toxic-msp-client-relationship-heres-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/understanding-dfars-interim-rule</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/unlocking-value-with-the-insider-direct-model</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/vendor-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/walking-the-line-between-compliance-and-productivity-in-your-security-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/what-every-mssp-needs-to-know-about-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/what-is-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/which-cybersecurity-framework-is-right-for-you</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-attackers-bank-on-lateral-movement-and-how-to-stop-them</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-companies-should-invest-in-cybersecurity-during-a-recession</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-consider-nist-800-53-certification</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-internal-audit-it-should-fight-together-against-cyber-breaches</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-law-firms-need-to-get-their-cybersecurity-house-in-order</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/why-non-profit-organizations-need-risk-assessments-and-strong-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/you-were-hacked-now-what</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/your-5-minute-guide-to-nydfss-23-nycrr-500-cybersecurity-regulations</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog/your-clients-are-leaving-because-your-cybersecurity-is-trash</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/ai</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/arr</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/assessment</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/audit</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/auditing</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/automation</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/budgeting</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/budgeting-controls</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/ccpa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cis-v7</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cis-v8</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cjis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cmmc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cmmc-2-0</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/collaboration</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/compliance-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/consulting</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/covid-19</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cpa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cyber-costs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cybercosts</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cybersecurity-controls</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cybersecurity-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cybersecurity-reporting</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/frameworks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/grc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/healthcare</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/hipaa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/infosec</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/internal-audit</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/legal</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/log4shell-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/msp</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/mssp</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/nist</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/nist-800-171</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/nist-csf</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/non-profits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/nydfs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/operational-technology-ot</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/pci</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/phishing</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/privacy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/product-updates</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/project-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/ransomware</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/real-estate</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/remote-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/risk-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/saas</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/sec</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/security-talent</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/smb</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/soc-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/supply-chain</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/third-party-risk</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/trends-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/vciso</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/blog-categories/vendor</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/a-lign</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/abacode</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/aidan-oconnor</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/andrew-stoneking</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/armistead-whitney</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/ashley-bowden</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/chris-lyons</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/ciso-mag</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/courtney-johnson</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/cyber-insights-team</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/dana-prestigiacomo</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/data-magazine</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/dave-colesante</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/frank-kyazze</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/gavin-harris</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/laura-vieiro-rial</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/maija-ehlinger</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/rich-freeman</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/robert-hilson</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/scot-mcleod</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/securestrux</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/sherry-grote</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/sherry-grote-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/sunny-betz</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/tarek-wiley</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/tom-temin</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/wyman-lewis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/authors/zach-armstrong</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/4-reasons-your-next-cybersecurity-tabletop-will-flop</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/5-new-amendments-to-ccpa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/a-step-by-step-guide-to-navigating-high-stakes-audits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/achieving-compliance-with-apptega-a-step-by-step-journey</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/addressing-the-vulnerabilities-used-in-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/ai-meets-secops-how-to-navigate-governance-and-stay-secure</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/answering-cmmcs-big-questions-as-critical-updates-loom</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/building-an-audit-friendly-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/building-cybersecurity-programs-in-saas-companies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/building-stronger-defenses-a-deep-dive-into-nist-800-171</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cisas-cyber-performance-goals</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cmmc-2-0-a-wait-and-see-game</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cmmc-2-0-seeking-the-right-help-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cmmc-2-0-whats-next</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cmmc-challenges-overcoming-the-obstacles</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cmmc-now-what</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/creating-a-culture-of-awareness</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/creating-executive-buy-in-for-a-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cui-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cyber-insurance-the-carrot-and-the-stick-every-msp-should-know</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cybersecurity-trends-for-nonprofits-an-expert-panel</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/cybersecurity-virtual-tabletops-ensure-success-in-the-new-normal</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/demystifying-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/emerging-compliance-risks-and-how-to-navigate-them-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/essential-considerations-for-achieving-cmmc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/everyone-is-telecommuting-how-to-ensure-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/hidden-gotchas-lurking-within-your-cyber-insurance-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-small-medium-sized-businesses-can-navigate-soaring-cyber-risk-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-choose-a-cybersecurity-framework-to-follow</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-crosswalk-frameworks-with-harmony</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-differentiate-with-pricing-packaging-and-positioning-in-a-competitive-market</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-set-up-and-manage-a-cybersecurity-program-from-scratch</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-succeed-as-a-startup-in-managed-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/how-to-win-at-state-privacy-whack-a-mole</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/it-meet-ot-building-integrated-security-and-compliance-programs-across-digital-and-physical-environments</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/jumpstarting-your-cybersecurity-program-with-cis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/kaseya-breach-key-takeaways-for-managed-service-providers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/key-requirements-for-cybersecurity-and-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/leveraging-ai-with-a-security-first-approach-for-sustainable-growth</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/liability-by-association</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/making-the-case-the-business-benefits-of-gcc-high</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/managing-the-cyber-risks-you-didnt-know-you-have</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/new-hipaa-security-rule</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/nist-csf-vs-cis-v8-insights-from-experts</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/nist-sp-800-171-cmmc-minimize-your-risk-of-losing-business-opportunities</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/one-framework-to-rule-them-all-building-a-universal-approach-to-cyber-risk-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/overwhelmed-by-grc-simplify-grc-with-key-strategies-and-technologies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/pci-4-0-a-how-to-guide-from-start-to-finish</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/perfect-pairing-of-cyber-technology-consultancy-for-cmmc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/power-up</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/preparing-for-cmmc-certification</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/preparing-for-cmmc-top-lessons-learned-by-provisional-assessors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/reporting-cybersecurity-to-the-board-in-2021</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/secrets-to-passing-a-cybersecurity-audit-an-auditors-perspective</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/streamlining-gap-assessments-and-remediation-with-apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/the-convergence-of-privacy-and-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/the-slippery-slope-of-cyber-insurance-what-every-mssp-needs-to-know</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/the-value-of-a-virtual-ciso-in-uncertain-times</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/top-5-teleworking-cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/wait-see-cmmc-lessons-learned-by-provisional-assessors-part-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/webinars/youve-been-hacked-now-what</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/ccpa-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/cis-v8-1</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/cjis-v6</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/cmmc-2-0</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/fedramp-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/glba</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/hipaa-privacy-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/hipaa-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/iso-27001-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/nist-800-171-compliance-guide</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/nist-800-53-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/nist-ai-600-1</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/nist-ai-rmf-100-1</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/nist-csf-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/compliance-guides/tisax-603</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/cmmc-2-0-and-what-it-means-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/cmmc-preparation-study</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/how-to-secure-and-ensure-cyber-insurance-coverage-in-case-of-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/how-virtual-ciso-services-can-help-your-msp-win-more-business</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/security-first-considerations-for-purchasing-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/whitepapers/the-evolving-cyber-insurance-landscape-how-to-get-and-keep-coverage-for-your-smb</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/abacode-apptega-partner-to-deliver-holistic-framework-based-cybersecurity-compliance-programs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/agio-enhances-sec-cybersecurity-governance-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-adds-cybersecurity-maturity-model-certification-cmmc-to-its-growing-list-of-compliance-frameworks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-amps-partner-program-by-adding-carrie-hancock-as-director-of-partner-success</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-adapture-align-in-strategic-partnership-at-the-fore-front-of-hyper-growth-cybersecurity-space</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-assessivate-to-disrupt-200-billion-cybersecurity-market</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-hacware-partner-to-help-msps-build-world-class-compliance-programs-through-ai-driven-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-manage-infinity-team-up-in-elite-cybersecurity-partnership-to-proactively-protect-against-cyber-attacks-and-breaches</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-medicus-it-partner-as-powerful-solution-to-increase-stability-in-healthcare-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-philotek-partner-in-data-focused-partnership-to-bring-micro-level-intelligence-and-granularity-to-cybersecurity-industry</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-techcxo-partner-to-bring-massive-improvements-to-cybersecurity-and-compliance-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-tier4-advisors-partner-to-deliver-unprecedented-visibility-of-compliance-ushering-in-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-and-utg---a-coretelligent-company-team-up-to-empower-organizations-to-efficiently-implement-and-report-on-complex-cybersecurity-and-compliance-requirements</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-announces-37m-growth-investment-from-mainsail-partners-to-automate-cybersecurity-management-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-announces-major-industry-breakthrough-intelligent-framework-mapping</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-announces-major-innovation-advancements-at-annual-conference</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-appoints-ashlyn-mclean-as-svp-marketing</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-ceo-armistead-whitney-under-the-spotlight-with-ciso-mag</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-continuing-customer-centric-culture-by-adding-director-of-customer-success-jeff-campbell</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-earns-high-performer-and-momentum-leader-commendations-from-g2-fall-2022-reports</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-earns-leader-and-high-performer-commendations-from-g2-summer-2022-reports</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-earns-momentum-leader-commendations-from-g2-com-for-the-summer-of-2021</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-earns-top-customer-ratings-from-leading-industry-research-firm</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-establishes-affiliation-agreement-with-vistrada-and-putnam-north-westchester-to-bring-cybersecurity-excellence-into-ny-state-schools</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-expands-cybersecurity-management-compliance-growth-with-new-funding-from-gra-venture-fund</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-expands-grc-platform-with-policy-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-grc-software-leader-caps-banner-growth-year-with-inc-5000-nod-and-63-g2-awards</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-hosts-amplify-2020-virtual-cybersecurity-conference-for-customers-and-partners</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-introduces-ai-powered-vciso-services-to-industry-leading-cybersecurity-compliance-platform</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-introduces-new-solution-to-accurately-assess-vendor-cybersecurity-and-compliance-practices</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-introduces-solution-to-simplify-risk-management-processes-through-managing-assessing-and-mitigating-risk</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-is-named-one-of-most-innovative-cybersecurity-startups-companies-in-atlanta</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-lands-21-badges-including-grc-momentum-leader-in-spring-g2-reports</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-lands-21-badges-including-grc-momentum-leader-in-spring-g2-reports-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-lands-23-badges-including-grc-momentum-leader-in-summer-g2-reports</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-launches-audit-manager-to-transform-the-cybersecurity-audit-process</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-launches-cyberxchange-the-first-b2b-ecommerce-marketplace-dedicated-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-launches-edge-to-help-150-000-global-msps-tap-into-massive-lucrative-cybersecurity-compliance-market</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-named-a-top-40-innovative-technology-company</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-named-in-12-cybersecurity-companies-to-know-in-atlanta</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-named-one-of-the-most-innovative-tech-companies-in-southeast-by-venture-atlanta</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-names-cybersecurity-veteran-dave-colesante-as-chief-executive-officer</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-names-scot-mcleod-vice-president-of-marketing</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-powers-ezentrias-complywise-portal-to-provide-visibility-to-compliance-programs-and-cybersecurity-frameworks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-raises-15-million</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-report-finds-security-providers-are-betting-on-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-scores-top-500-ranking-in-inc-5000-list-with-2-236-percent-revenue-growth</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-strengthens-leadership-team-with-vice-president-of-marketing-addition-sherry-grote</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-transforms-as-the-operating-system-for-security-risk-and-compliance-management-for-service-providers</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptega-welcomes-hesom-parhizkar-seasoned-innovation-technology-leader-as-vice-president-of-technology-product</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/apptegas-partnership-with-novatech-brings-highly-intelligent-cybersecurity-management-platform-to-20-000-businesses</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/atlanta-tech-news-names-apptega-top-20-atlanta-tech-company-for-employee-satisfaction</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/behind-atlantas-growth-as-a-cybersecurity-hub</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/bonus-post-what-the-future-holds-for-exhibitors-at-pax8-beyond</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/california-consumer-privacy-act-ccpa-framework-now-available-in-apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/cmmc-assessments-now-supported-in-the-apptega-assessment-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/cmmc-preparation-study-published-by-apptega-and-securestrux</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/elizabeth-davis-joins-apptega-as-vice-president-of-product-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/enterprise-software-developer-apptega-secures-37m-growth-funding</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/foresite-partners-with-apptega-to-deliver-ironclad-cybersecurity-compliance-programs-to-rapidly-expanding-customer-base</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/gavin-macdonald-joins-apptega-as-vice-president-sales</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/going-next-level-atlanta-cybersecurity-firm-raises-37m-will-triple-workforce</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/hank-vanjaria-joins-apptega-as-chief-financial-officer</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/harvey-scholl-joins-apptega-as-chief-technology-officer</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/how-defense-contractors-are-preparing-for-cybersecurity-certification</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/jdl-group-partners-with-apptega-to-bring-differentiated-continuous-compliance-services-to-market</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/mcpc-and-apptega-partner-to-deliver-managed-cybersecurity-governance-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/new-chief-revenue-officer-bob-layton</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/nist-special-publication-sp-800-171-framework-now-available-in-apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/robert-hilson-experienced-saas-marketer-joins-apptega-to-help-drive-cybersecurity-platforms-rapid-growth</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/shareth-ben-seasoned-saas-cybersecurity-leader-joins-apptega-as-chief-customer-officer</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/third-party-risk-manager-launch</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news/translating-cybersecurity-procurement-to-the-b2b-ecommerce-business-model</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/a-culture-of-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/at-the-intersection-of-cybersecurity-and-costco</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/how-ai-is-transforming-cybersecurity-and-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/identifying-weird-to-unify-your-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/in-perfect-harmony</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/learning-to-sell-value---not-features</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/the-path-to-cybersecurity-compliance-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/the-security-vs-productivity-dilemma</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/those-who-can-consult</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/podcasts/your-cmmc-life-coach</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/apptega</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/ceo</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/event</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/funding</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/leadership</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/partnership</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/press</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/product</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/news-categories/recognition</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/assessment-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/audit-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/cmmc-2-0-assessments</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/cmmc-certification-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/crosswalk-multiple-compliance-frameworks-with-ease</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/crosswalking-cybersecurity-privacy-frameworks</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/cybersecurity-compliance-assessments</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/iso-27001-compliance-certification-simplified</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/mssp-cybersecurity-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/multi-tenant-portal</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/nist-800-171-compliance-simplified</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/nist-csf-to-iso-audits</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/program-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/remote-cybersecurity-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/risk-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/soc-2-compliance-audit-readiness</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/product-demos/task-manager</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/acceptable-use-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/access-control-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/asset-management-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/audit-and-accountability-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/business-continuity-plan-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/byod-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/change-management-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/configuration-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/cybersecurity-incident-response-tabletop-exercise</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/data-classification-handling-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/data-retention-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/disaster-recovery-plan-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/employee-ethics-and-code-of-conduct-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/encryption-and-cryptography</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/filthy-fifteen-ransomware-mistakes-checklist</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/identification-and-authentication-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/incident-response-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/maintenance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/managed-service-provider-checklist</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/media-protection-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/network-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/new-4-ways-to-get-started-on-cmmc-certification</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/penetration-testing-methodology</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/personnel-security-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/physical-environmental-protection-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/physical-protection-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/privacy-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/risk-management-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/security-assessment-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/security-awareness-and-training</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/service-provider-checklist-for-dod-contractors</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/software-development-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/system-and-communications-protection-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/system-and-information-integrity-policy-template</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/templates/vendor-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/apptega-partner-agreement-legacy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/apptega-vendor-sub-processor-list</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/data-processing-program-international</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/end-user-terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/partner-pass-through-agreement-legacy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/partner-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/service-level-program-response-time</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/service-level-program-uptime</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/technical-and-operational-measures</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/legal/terms</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/23-nycrr-500</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/ccpa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/cis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/cmmc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/cobit-2019</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/fedramp</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/ffiec</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/gdpr</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/gfsc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/glba</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/hipaa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/iso-27002</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/nist-800-171</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/nist-800-66</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/nist-csf</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/sec</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/soc-1</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/soc-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/sox</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/frameworks/tcf</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/asana</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/aws-security-hub</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/azure-ad</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/connectwise-manage</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/curricula</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/google-drive</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/hacware</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/jira</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/microsoft-defender-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/qualys</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/servicenow</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/integrations/sharepoint</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/abira-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/aon</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/aqueduct-technologies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/arrakis-consulting</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/ascend-technologies</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/bad-rabbit-security-limited</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/blue-alliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/blue-team-alpha</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/brite</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/cyber-guards-usa</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/cyber-watch-systems</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/cybersecop</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/cybolt</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/digital-era-group</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/echelon-risk-cyber</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/evolve-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/f1-solutions</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/fit-solutions</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/foresite-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/gbq-partners</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/heartland-business-systems</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/inversion6</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/jdl-group</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/lascala</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/medicus-it</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/novatech</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/prescient-security</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/proactive-risk</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/proven-it</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/triden-group</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/partners/vistrada</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/audit-readiness</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/audit-trail</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/business-impact-analysis</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/compliance-dashboard</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/cybersecurity-maturity-model-certification-cmmc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/fedramp-federal-risk-and-authorization-management-program</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/ferpa-family-educational-rights-and-privacy-act</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/fisma-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/general-data-protection-regulation-gdpr</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/glba-compliance</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/governance-framework</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/governance-risk-compliance-grc</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/hipaa-health-insurance-portability-and-accountability-act</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/iso-27002</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/iso-42001</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/managed-security-services-provider-mssp</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/nist-800-171</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/nist-800-66</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/nist-cybersecurity-framework</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/pci-dss-payment-card-industry-data-security-standard</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/policy-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/privacy-impact-assessment-pia</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/privileged-access-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/risk-register</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/security-posture</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/soc-2</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/sox-sarbanes-oxley-act</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/third-party-risk-management-tprm</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/vendor-assessment-third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://www.apptega.com/glossary/vendor-risk-management</loc>
    </url>
</urlset>