<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://sis-ics.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-02 00:56:43 GMT -->
	<url>
		<loc>https://sis-ics.com/</loc>
		<lastmod>2026-01-18T21:48:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/blog/</loc>
		<lastmod>2026-03-20T03:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/privacy-policy/</loc>
		<lastmod>2025-12-11T20:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience/</loc>
		<lastmod>2026-01-06T10:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/approach/</loc>
		<lastmod>2026-01-14T07:40:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/methodology/</loc>
		<lastmod>2026-01-08T06:11:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/industries/</loc>
		<lastmod>2022-07-11T22:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/healthcare/</loc>
		<lastmod>2021-08-06T02:38:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/water/</loc>
		<lastmod>2021-08-06T02:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/oil-gas/</loc>
		<lastmod>2021-08-06T02:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/transportation/</loc>
		<lastmod>2025-12-16T06:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/power/</loc>
		<lastmod>2021-08-06T02:18:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/criticalmanufacturing/</loc>
		<lastmod>2025-08-03T09:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/mining/</loc>
		<lastmod>2021-08-06T02:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/experience-old/case-studies/</loc>
		<lastmod>2025-08-03T12:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/contact/</loc>
		<lastmod>2025-12-16T06:29:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/services/</loc>
		<lastmod>2026-01-14T10:33:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-uniqueness-delusion-why-every-ciso-believes-their-environment-is-unique/</loc>
		<lastmod>2026-03-24T04:20:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/stop-buying-security-theatre-what-real-resilience-looks-like/</loc>
		<lastmod>2026-01-08T21:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/why-protecting-everything-equally-is-a-waste-of-time-and-budget/</loc>
		<lastmod>2026-01-08T21:33:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/celebrating-15-years-of-sis-the-lessons-that-have-made-us-who-we-are/</loc>
		<lastmod>2025-12-03T10:57:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-ccrtification-trap-why-experience-outweighs-credentials-in-ot-security/</loc>
		<lastmod>2025-11-25T19:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/an-ot-nids-is-not-a-soc/</loc>
		<lastmod>2026-01-08T21:36:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/fast-security-is-fragile-security-why-ot-requires-a-methodical-approach/</loc>
		<lastmod>2026-01-08T21:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/when-capex-does-more-for-ot-security-than-your-security-budget/</loc>
		<lastmod>2026-01-08T21:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-principle-method-principle-6-ot-security-compliance/</loc>
		<lastmod>2026-01-08T21:39:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/ot-security-focussed/</loc>
		<lastmod>2026-01-14T07:36:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-principle-method-principle-4-methodical/</loc>
		<lastmod>2025-05-14T06:15:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/effective-system-security-begins-with-strategy-not-software-learn-how-to-build-a-robust-industrial-defence/</loc>
		<lastmod>2025-04-09T03:52:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/is-your-industrial-cyber-security-strategy-too-generic-learn-about-the-hidden-risks-and-how-to-avoid-them/</loc>
		<lastmod>2025-04-09T03:43:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-principle-method-principle-3-enterprise-wide/</loc>
		<lastmod>2025-03-27T03:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-principle-method-principle-2-risk-based/</loc>
		<lastmod>2025-03-27T03:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/sis-industrial-cyber-security-expands-presence-in-the-middle-east-africa/</loc>
		<lastmod>2025-03-20T22:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/people-are-the-most-critical-ingredient-to-world-class-industrial-cyber-security/</loc>
		<lastmod>2025-03-07T05:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-principle-method-principle-1-business-driven/</loc>
		<lastmod>2025-02-19T04:35:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/elevating-industrial-cyber-security-to-a-world-class-level-the-industrial-cyber-security-principle-method/</loc>
		<lastmod>2025-02-19T04:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-critical-need-for-specialised-ot-cyber-security-why-sis-exists/</loc>
		<lastmod>2025-03-07T05:21:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/how-to-achieve-world-class-industrial-cyber-security-a-proven-methodology/</loc>
		<lastmod>2024-12-18T23:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/no-ones-doing-risk-assessments-properly-heres-why/</loc>
		<lastmod>2024-04-03T03:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/clear-and-present-concerns-asd-cyber-threat-report-2022-2023/</loc>
		<lastmod>2023-12-19T23:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/dont-believe-the-hype-about-integrated-it-and-ot-security-soc/</loc>
		<lastmod>2023-02-06T00:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/what-industry-can-learn-from-medibank-and-optus-data-breaches/</loc>
		<lastmod>2024-12-18T23:14:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/report-confirms-organisations-are-moving-too-slowly-to-secure-their-ot-assets/</loc>
		<lastmod>2022-11-29T07:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/how-an-ot-soc-strengthens-your-cyber-resilience/</loc>
		<lastmod>2022-09-13T01:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/download-the-sis-industrial-cyber-security-playbook/</loc>
		<lastmod>2022-07-15T07:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/getting-the-most-out-of-your-on-premises-ot-soc/</loc>
		<lastmod>2022-06-30T00:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/why-you-should-seriously-consider-an-off-premises-ot-soc/</loc>
		<lastmod>2022-02-11T02:37:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-changing-face-of-ransomware/</loc>
		<lastmod>2021-11-29T06:09:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/industrial-cyber-security-has-a-lot-to-learn-from-workplace-safety/</loc>
		<lastmod>2021-09-07T00:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/how-to-spend-wisely-when-it-comes-to-ot-security/</loc>
		<lastmod>2021-04-17T21:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/why-people-could-be-the-secret-ingredient-in-your-industrial-cyber-security-recipe/</loc>
		<lastmod>2021-04-01T05:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/the-new-critical-infrastructure-bill-how-it-affects-you/</loc>
		<lastmod>2020-12-17T00:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/ready-to-get-serious-about-your-industrial-cyber-security-strategy-heres-what-you-should-ask-yourself/</loc>
		<lastmod>2020-11-24T03:42:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://sis-ics.com/think-your-ot-assets-are-protected-from-cyber-threats-you-may-need-to-think-again/</loc>
		<lastmod>2020-11-24T01:10:51+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
