<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 7:22 PM by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ckcybersecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>CODY KELLER</title>
		<link><![CDATA[https://ckcybersecurity.com]]></link>
		<description><![CDATA[CODY KELLER]]></description>
		<lastBuildDate><![CDATA[Tue, 31 Mar 2026 09:00:00 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ckcybersecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ckcybersecurity.com/rsac-2026-recap-what-actually-matters-and-what-was-just-noise/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/rsac-2026-recap-what-actually-matters-and-what-was-just-noise/]]></link>
			<title>RSAC 2026 Recap: What Actually Matters (And What Was Just Noise)</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 09:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-voice-on-the-phone-isnt-real-how-deepfake-phishing-is-rewriting-the-rules-of-ceo-fraud/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-voice-on-the-phone-isnt-real-how-deepfake-phishing-is-rewriting-the-rules-of-ceo-fraud/]]></link>
			<title>The Voice on the Phone Isn’t Real: How Deepfake Phishing Is Rewriting the Rules of CEO Fraud</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 10:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-qbr-survival-guide-turning-q1-security-data-into-a-story-the-board-actually-cares-about/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-qbr-survival-guide-turning-q1-security-data-into-a-story-the-board-actually-cares-about/]]></link>
			<title>The QBR Survival Guide: Turning Q1 Security Data Into a Story the Board Actually Cares About</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 10:00:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/privacy-policy-2/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/privacy-policy-2/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 15:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/security-insights/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/security-insights/]]></link>
			<title>Security Insights</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 15:28:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/]]></link>
			<pubDate><![CDATA[Tue, 10 Feb 2026 15:18:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-art-of-digital-spring-cleaning-why-your-asset-inventory-is-your-first-line-of-defense/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-art-of-digital-spring-cleaning-why-your-asset-inventory-is-your-first-line-of-defense/]]></link>
			<title>The Art of Digital Spring Cleaning: Why Your Asset Inventory Is Your First Line of Defense</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 10:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-privacy-hangover-3-compliance-checks-you-missed-in-the-january-rush/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-privacy-hangover-3-compliance-checks-you-missed-in-the-january-rush/]]></link>
			<title>The Privacy &#8220;Hangover&#8221;: 3 Compliance Checks You Missed in the January Rush</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 11:00:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/t10-high-roi-ways-to-reinvest-your-bonus-into-your-career/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/t10-high-roi-ways-to-reinvest-your-bonus-into-your-career/]]></link>
			<title>10 High-ROI Ways to Reinvest Your Bonus Into Your Career</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 10:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-ip-pin-the-single-best-defense-against-tax-identity-theft/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-ip-pin-the-single-best-defense-against-tax-identity-theft/]]></link>
			<title>The IP PIN: The Single Best Defense Against Tax Identity Theft</title>
			<pubDate><![CDATA[Tue, 10 Feb 2026 10:00:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/security-vs-privacy-why-secure-doesnt-mean-private/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/security-vs-privacy-why-secure-doesnt-mean-private/]]></link>
			<title>Security vs. Privacy: Why Secure Doesn&#8217;t Mean Private</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 15:46:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-q2-security-reset-what-to-actually-do-when-the-quarter-flips/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-q2-security-reset-what-to-actually-do-when-the-quarter-flips/]]></link>
			<title>The Q2 Security Reset: What to Actually Do When the Quarter Flips</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-soft-skill-that-pays-hard-cash-translation/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-soft-skill-that-pays-hard-cash-translation/]]></link>
			<title>The &#8220;Soft&#8221; Skill That Pays Hard Cash: Translation</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 09:30:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/meet-cody/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/meet-cody/]]></link>
			<title>Meet Cody</title>
			<pubDate><![CDATA[Tue, 03 Feb 2026 00:11:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/2025-in-review-3-security-lessons-from-the-years-biggest-breaches/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/2025-in-review-3-security-lessons-from-the-years-biggest-breaches/]]></link>
			<title>2025 in Review: 3 Security Lessons from the Year&#8217;s Biggest Breaches</title>
			<pubDate><![CDATA[Sat, 06 Dec 2025 00:17:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/title-beyond-get-certified-15-real-goals-for-infosec-analysts-in-2026/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/title-beyond-get-certified-15-real-goals-for-infosec-analysts-in-2026/]]></link>
			<title>Title: Beyond &#8220;Get Certified&#8221;: 15 Real Goals for InfoSec Analysts in 2026</title>
			<pubDate><![CDATA[Sat, 06 Dec 2025 00:17:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/what-is-a-soc-2-report-and-why-should-your-customers-care/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/what-is-a-soc-2-report-and-why-should-your-customers-care/]]></link>
			<title>What Is a SOC 2 Report and Why Should Your Customers Care?</title>
			<pubDate><![CDATA[Sat, 06 Dec 2025 00:03:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/got-a-new-tech-gift-4-steps-to-secure-it-before-you-use-it/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/got-a-new-tech-gift-4-steps-to-secure-it-before-you-use-it/]]></link>
			<title>Got a New Tech Gift? 4 Steps to Secure It Before You Use It</title>
			<pubDate><![CDATA[Sat, 06 Dec 2025 00:03:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/how-to-write-a-security-self-review-that-gets-you-promoted/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/how-to-write-a-security-self-review-that-gets-you-promoted/]]></link>
			<title>How to Write a Security Self-Review That Gets You Promoted</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 09:30:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/network-projects/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/network-projects/]]></link>
			<title>Network &amp; Projects</title>
			<pubDate><![CDATA[Mon, 02 Feb 2026 23:26:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/fighting-malicious-activity-together/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/fighting-malicious-activity-together/]]></link>
			<title>Fighting Malicious Activity Together</title>
			<pubDate><![CDATA[Fri, 12 Dec 2025 22:31:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/interviewing-how-to-determine-a-fit-for-your-potentially-new-security-team/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/interviewing-how-to-determine-a-fit-for-your-potentially-new-security-team/]]></link>
			<title>Interviewing: How to Determine a &#8220;Fit&#8221; for your potentially new Security Team</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 08:00:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/before-the-holiday-freeze-why-you-need-an-incident-response-plan-now/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/before-the-holiday-freeze-why-you-need-an-incident-response-plan-now/]]></link>
			<title>Before the Holiday Freeze: Why You Need an Incident Response Plan Now</title>
			<pubDate><![CDATA[Sat, 06 Dec 2025 00:03:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-death-of-the-spreadsheet-why-ai-is-the-future-of-vendor-risk-management/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-death-of-the-spreadsheet-why-ai-is-the-future-of-vendor-risk-management/]]></link>
			<title>The Death of the Spreadsheet: Why AI is the Future of Vendor Risk Management</title>
			<pubDate><![CDATA[Mon, 29 Dec 2025 10:00:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/build-trust-not-risk-a-simple-privacy-guide-for-california-businesses/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/build-trust-not-risk-a-simple-privacy-guide-for-california-businesses/]]></link>
			<title>Build Trust, Not Risk: A Simple Privacy Guide for California Businesses</title>
			<pubDate><![CDATA[Tue, 09 Dec 2025 10:05:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-two-paths-information-security-manager-vs-principal-contributor/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-two-paths-information-security-manager-vs-principal-contributor/]]></link>
			<title>The Two Paths: Information Security Manager vs. Principal Contributor</title>
			<pubDate><![CDATA[Tue, 28 Oct 2025 10:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/trends-in-cybersecurity-smes-should-watch/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/trends-in-cybersecurity-smes-should-watch/]]></link>
			<title>Trends in Cybersecurity SMEs Should Watch: It&#8217;s Not a Matter of If, but When</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 16:49:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/steps-to-improve-your-cyber-defense-today/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/steps-to-improve-your-cyber-defense-today/]]></link>
			<title>Steps to Improve Your Cyber Defense Today</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 16:49:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/5-cybersecurity-risks-to-avoid-this-holiday-shopping-season/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/5-cybersecurity-risks-to-avoid-this-holiday-shopping-season/]]></link>
			<title>5 Cybersecurity Risks to Avoid This Holiday Shopping Season!</title>
			<pubDate><![CDATA[Thu, 04 Dec 2025 10:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/more-than-a-paperweight-why-security-policies-are-your-businesss-unsung-hero/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/more-than-a-paperweight-why-security-policies-are-your-businesss-unsung-hero/]]></link>
			<title>More Than a Paperweight: Why Security Policies Are Your Business’s Unsung Hero</title>
			<pubDate><![CDATA[Tue, 19 Aug 2025 14:26:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/curing-business-chaos-why-sops-are-the-prescription-for-growth/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/curing-business-chaos-why-sops-are-the-prescription-for-growth/]]></link>
			<title>Curing &#8220;Business Chaos&#8221;: Why SOPs Are the Prescription for Growth</title>
			<pubDate><![CDATA[Tue, 19 Aug 2025 14:22:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/from-vanity-to-value-building-a-risk-based-security-dashboard-executives-actually-understand/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/from-vanity-to-value-building-a-risk-based-security-dashboard-executives-actually-understand/]]></link>
			<title>From Vanity to Value: Building a Risk-Based Security Dashboard Executives Actually Understand</title>
			<pubDate><![CDATA[Mon, 22 Dec 2025 08:15:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/new-privacy-laws/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/new-privacy-laws/]]></link>
			<title>New Privacy Laws</title>
			<pubDate><![CDATA[Tue, 19 Aug 2025 14:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/stop-duplicating-work-the-power-of-the-nist-policy-crosswalk/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/stop-duplicating-work-the-power-of-the-nist-policy-crosswalk/]]></link>
			<title>Stop Duplicating Work: The Power of the NIST Policy Crosswalk</title>
			<pubDate><![CDATA[Mon, 15 Dec 2025 09:30:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/hello-world/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/hello-world/]]></link>
			<title>Conquering the CISSP: Proven Study Tips for Aspiring Cybersecurity Leaders</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/top-cybersecurity-tips-for-small-businesses/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/top-cybersecurity-tips-for-small-businesses/]]></link>
			<title>Top Cybersecurity Tips for Small Businesses</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/how-training-enhances-cybersecurity-skills/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/how-training-enhances-cybersecurity-skills/]]></link>
			<title>How Training Enhances Cybersecurity Skills</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/protecting-your-business-from-common-cyber-threats/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/protecting-your-business-from-common-cyber-threats/]]></link>
			<title>Protecting Your Business from Common Cyber Threats</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/why-smes-need-professional-cybersecurity-consulting/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/why-smes-need-professional-cybersecurity-consulting/]]></link>
			<title>Why SMEs Need Professional Cybersecurity Consulting</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/the-importance-of-cyber-awareness-for-professionals/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/the-importance-of-cyber-awareness-for-professionals/]]></link>
			<title>The Importance of Cyber Awareness for Professionals</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ckcybersecurity.com/building-a-robust-cybersecurity-plan-for-your-company/]]></guid>
			<link><![CDATA[https://ckcybersecurity.com/building-a-robust-cybersecurity-plan-for-your-company/]]></link>
			<title>Building a Robust Cybersecurity Plan for Your Company</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 17:56:36 +0000]]></pubDate>
		</item>
				</channel>
</rss>
