<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.max2security.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d7fb5157-136b-41f5-8636-4128d37a6938/max-2-vciso.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/34af379a-da78-46ff-9271-0f2fc403cc09/max-2-security-reporting.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0c8aa587-1bed-4bf4-a055-62126ac47835/max-2-governance-and-risk-management.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a63e0c77-5bfc-4564-bbfe-53e3373212dc/max-2-cybersecurity-due-diligence-for-M%26A.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/afb7e8ab-bd84-417d-b3df-ab809e44fc7d/max-2-security-assessments.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f06a4d84-cf4d-4f26-b0a3-4f5e34c7b92e/max-2-compliance-services.png</image:loc>
      <image:title>HOME</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/4f0fefd9-d316-478e-aea4-a71b9441a845/max-2-dashboard-home.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/5d962209-a3e9-4d1d-b7ce-af12d79ba3e7/max-2-home-employee.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-01</lastmod>
  </url>
  <url>
    <loc>https://www.max2security.com/industries</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/3bb679eb-fc08-495b-8118-b3317bb98e88/max-2-cyber-insurers-and-litigation-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1fd0841f-1a9a-478f-971d-81654d3030b3/max-2-private-equity-and-industry.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2349a559-729b-4753-ba49-06f0f7b76734/max-2-education.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/01976126-be54-4e1f-9583-0b89177dfda4/max-2-msp-mssp.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17a6f8e2-84b7-461c-8606-36b923a59f08/max-2-government.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1e4c5b76-faa6-443b-9cfd-a4b24dc2adb1/max-2-healthcare.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d7fb5157-136b-41f5-8636-4128d37a6938/max-2-vciso.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/34af379a-da78-46ff-9271-0f2fc403cc09/max-2-security-reporting.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0c8aa587-1bed-4bf4-a055-62126ac47835/max-2-governance-and-risk-management.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a63e0c77-5bfc-4564-bbfe-53e3373212dc/max-2-cybersecurity-due-diligence-for-M%26A.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/afb7e8ab-bd84-417d-b3df-ab809e44fc7d/max-2-security-assessments.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f06a4d84-cf4d-4f26-b0a3-4f5e34c7b92e/max-2-compliance-services.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/963f8f53-07e0-458d-ba1c-87a15f2ca001/max-2-about-dawn-dunkerley-headshot.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/77f87adb-fd5a-4964-ab47-dbe0c6eaeacd/max-2-dashboard-about-1.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/95e32700-b852-40ac-be67-cd2b37f72c7f/max-2-dashboard-about-2.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/04474107-8afe-45f4-a17e-aafc0a4e3617/max-2-dashboard-about-3.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8e604536-52ee-461c-8c16-20487e812c2e/max-2-dashboard-about-4.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/vciso-virtual-chief-information-security-officer</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/327bc3dd-2963-4b6a-84aa-2f0464bcfed4/max-2-fractional-ciso-services-and-affordable-security-operations-and-monitoring.png</image:loc>
      <image:title>vCISO (Virtual Chief Information Security Officer)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/7365f57b-8b30-422a-86a8-b7ac2131d937/max-2-overhaul-and-continued-management-of-cyber-risk-for-large-municipal-government.png</image:loc>
      <image:title>vCISO (Virtual Chief Information Security Officer)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/12746e31-8381-41ad-887a-bac1863ac14a/max-2-vciso-leadership-for-local-government-cybersecurity-advancement.png</image:loc>
      <image:title>vCISO (Virtual Chief Information Security Officer)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8003ad46-a093-426b-a8de-0065125585b8/max-2-transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171.png</image:loc>
      <image:title>vCISO (Virtual Chief Information Security Officer)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d7fb5157-136b-41f5-8636-4128d37a6938/max-2-vciso.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/75031688-0c30-474b-8afc-db9bc4ae74cf/max-2-dashboard-vciso.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/threat-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b869a81e-bc23-489f-99a5-f3448a213dd3/max-2-coordinated-gdpr-compliance-across-international-operations.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/91ce759c-46ff-4591-b0e6-695cf7adb3ed/max-2-elevating-research-risk-governance-in-higher-education.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0fc91fdb-db30-4d3f-b6f6-149ab4349d19/max-2-reporting-and-governance-restructuring-following-cyber-incident-at-a-K-12.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/df9c0334-08ac-425b-b4d9-55db756eb227/max-2-providing-affordable-penetration-testing-for-education.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/46d6ecb3-128a-4859-8aa1-bd7b3ec8be7d/max-2-affordable-soc-services-for-community-college.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1702c845-e356-48cc-b657-fd8ffd9a7d1c/max-2-gaining-confidence-through-network-threat-visibility.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/af510519-f976-43eb-8c7e-0d5204026d24/max-2-surfacing-silent-threats-in-a-global-insurance-network.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/c4c26cae-b9d5-4609-a0a0-0568bed50f65/max-2-enabling-data-driven-underwriting-for-cyber-insurers.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/47dd25d8-438c-40da-a680-f9c11e6b3fa7/max-2-enhancing-cyber-insurance-outcomes-with-coordinated-post-breach-support.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b10c6ea8-4dbe-47ef-9f0a-215b7552d566/max-2-building-affordable-security-operations-centers-for-underserved-sectors.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f2d39077-118e-4a7f-b320-f634148b17b2/max-2-reducing-vendor-risk-in-critical-infrastructure.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a423ee56-3052-444a-98b0-a5857aaa24a6/max-2-providing-external-threat-intelligence-reporting.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d09f001a-1a72-41e3-8866-3e8676ddb00f/max-2-traffic-analysis-and-automated-reporting-setup.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2422c4ce-759e-4eb3-a1e6-5ac4867b0ec9/max-2-ongoing-monitoring-of-dark-web-traffic-and-network-application-vulnerabilities.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e39d0697-6e73-4a6b-a4ff-3dedd19d87c8/max-2-enabling-security-services-for-an-msp-through-strategic-partnership.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/27b40270-334e-4768-a22e-a9cad3f15c19/max-2-real-time-third-party-risk-monitoring-for-higher-ed.png</image:loc>
      <image:title>Threat Intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/34af379a-da78-46ff-9271-0f2fc403cc09/max-2-security-reporting.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2923dd63-c3dd-448d-8c94-bb0d0dcce251/max-2-dashboard-threat-intelligence.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/governance-and-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2e9f461b-387d-474f-98f2-b3469c065ee8/max-2-cmmc-compliance-without-disruption-in-higher-education.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/bfd8aa26-31ce-43ab-8a18-7528e473fb16/max-2-making-cmmc-attainable-for-small-defense-contractors.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b31b0655-b5d2-45d6-bdc4-38941e93436c/max-2-protecting-student-privacy-under-ferpa-in-digital-behavior-systems.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b869a81e-bc23-489f-99a5-f3448a213dd3/max-2-coordinated-gdpr-compliance-across-international-operations.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f67194a8-046c-4fe0-95a4-9e31fae93d70/max-2-helping-community-colleges-navigate-glba-via-consortium-model.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/6354179b-29e8-4c31-b689-d57e02f5c955/max-2-continuity-of-cyber-program-following-it-insourcing.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/4f66ae07-b3e5-4ae5-bb88-ce1fdc14ccb3/max-2-compliance-with-state-and-federal-change-management-rules-regulated-due-to-grant-requirements.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0498ff06-5434-4d3b-af22-d12225b5eb28/max-2-policy-and-governance-for-university-hospital-system.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e6fc64b0-d7e6-43a0-a3c1-65f7a04587b1/max-2-building-risk-transparency-across-portfolio-companies.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/91ce759c-46ff-4591-b0e6-695cf7adb3ed/max-2-elevating-research-risk-governance-in-higher-education.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e39d0697-6e73-4a6b-a4ff-3dedd19d87c8/max-2-enabling-security-services-for-an-msp-through-strategic-partnership.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f6ec5558-ac7b-409e-b160-0befff0bb8c9/max-2-helping-a-global-consultancy-understand-its-cyber-risk.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/ea4f9857-483c-4f2b-9504-4415addcba8d/max-2-designing-secure-and-flexible-ai-use-policies-for-higher-ed.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b9b7868c-c473-4e15-8b8a-ba3e6ab69452/max-2-simulating-crisis-response-at-a-major-research-university.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1702c845-e356-48cc-b657-fd8ffd9a7d1c/max-2-gaining-confidence-through-network-threat-visibility.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/af510519-f976-43eb-8c7e-0d5204026d24/max-2-surfacing-silent-threats-in-a-global-insurance-network.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/c4c26cae-b9d5-4609-a0a0-0568bed50f65/max-2-enabling-data-driven-underwriting-for-cyber-insurers.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/47dd25d8-438c-40da-a680-f9c11e6b3fa7/max-2-enhancing-cyber-insurance-outcomes-with-coordinated-post-breach-support.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f2d39077-118e-4a7f-b320-f634148b17b2/max-2-reducing-vendor-risk-in-critical-infrastructure.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/12746e31-8381-41ad-887a-bac1863ac14a/max-2-vciso-leadership-for-local-government-cybersecurity-advancement.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/27b40270-334e-4768-a22e-a9cad3f15c19/max-2-real-time-third-party-risk-monitoring-for-higher-ed.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/99d14af0-69a8-49e0-924a-126f68a765d6/max-2-discreet-iso-27001-assessment-for-cross-border-m%26a-success.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8003ad46-a093-426b-a8de-0065125585b8/max-2-transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17808b89-c517-46f3-a59a-5b4d1c4acd24/max-2-multi-agency-regulatory-audit-on-eight-lane-multi-state-public-private-toll-bridge-investment.png</image:loc>
      <image:title>Governance and Risk Management</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0c8aa587-1bed-4bf4-a055-62126ac47835/max-2-governance-and-risk-management.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/3ac873a9-3c64-4659-b386-b85e0aac5745/max-2-dashboard-governance-and-risk-management.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/cybersecurity-due-diligence-for-ma</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/55da286c-671a-4c7d-9487-6fbaefbaf510/max-2-minority-investment-in-multiple-port-assets.png</image:loc>
      <image:title>Cybersecurity Due Diligence for M&amp;A</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/05d401db-19e4-4012-85a1-1233c6029be4/max-2-acquisition-and-merger-of-two-airports.png</image:loc>
      <image:title>Cybersecurity Due Diligence for M&amp;A</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/99d14af0-69a8-49e0-924a-126f68a765d6/max-2-discreet-iso-27001-assessment-for-cross-border-m%26a-success.png</image:loc>
      <image:title>Cybersecurity Due Diligence for M&amp;A</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a63e0c77-5bfc-4564-bbfe-53e3373212dc/max-2-cybersecurity-due-diligence-for-M%26A.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/574d2750-4def-4a0c-a17a-fb36b4b973d6/max-2-dashboard-cybersecurity-due-diligence-for-m-and-a.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/security-assessments</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2e9f461b-387d-474f-98f2-b3469c065ee8/max-2-cmmc-compliance-without-disruption-in-higher-education.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/bfd8aa26-31ce-43ab-8a18-7528e473fb16/max-2-making-cmmc-attainable-for-small-defense-contractors.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17808b89-c517-46f3-a59a-5b4d1c4acd24/max-2-multi-agency-regulatory-audit-on-eight-lane-multi-state-public-private-toll-bridge-investment.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d09f001a-1a72-41e3-8866-3e8676ddb00f/max-2-traffic-analysis-and-automated-reporting-setup.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2422c4ce-759e-4eb3-a1e6-5ac4867b0ec9/max-2-ongoing-monitoring-of-dark-web-traffic-and-network-application-vulnerabilities.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/947d654b-67f3-43c3-a308-e6ed483fb9a6/max-2-audit-and-implementation-of-cybersecurity-practices-at-county-utility.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b31b0655-b5d2-45d6-bdc4-38941e93436c/max-2-protecting-student-privacy-under-ferpa-in-digital-behavior-systems.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f6ec5558-ac7b-409e-b160-0befff0bb8c9/max-2-helping-a-global-consultancy-understand-its-cyber-risk.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/ea4f9857-483c-4f2b-9504-4415addcba8d/max-2-designing-secure-and-flexible-ai-use-policies-for-higher-ed.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b9b7868c-c473-4e15-8b8a-ba3e6ab69452/max-2-simulating-crisis-response-at-a-major-research-university.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/99d14af0-69a8-49e0-924a-126f68a765d6/max-2-discreet-iso-27001-assessment-for-cross-border-m%26a-success.png</image:loc>
      <image:title>Security Assessments</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/afb7e8ab-bd84-417d-b3df-ab809e44fc7d/max-2-security-assessments.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b7345b11-ab28-467c-a6bc-2a47ea16e822/max-2-dashboard-security-assessments.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/compliance-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8003ad46-a093-426b-a8de-0065125585b8/max-2-transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171.png</image:loc>
      <image:title>Compliance Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f67194a8-046c-4fe0-95a4-9e31fae93d70/max-2-helping-community-colleges-navigate-glba-via-consortium-model.png</image:loc>
      <image:title>Compliance Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b31b0655-b5d2-45d6-bdc4-38941e93436c/max-2-protecting-student-privacy-under-ferpa-in-digital-behavior-systems.png</image:loc>
      <image:title>Compliance Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b869a81e-bc23-489f-99a5-f3448a213dd3/max-2-coordinated-gdpr-compliance-across-international-operations.png</image:loc>
      <image:title>Compliance Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/12746e31-8381-41ad-887a-bac1863ac14a/max-2-vciso-leadership-for-local-government-cybersecurity-advancement.png</image:loc>
      <image:title>Compliance Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f06a4d84-cf4d-4f26-b0a3-4f5e34c7b92e/max-2-compliance-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/39ca3c92-63bb-4ea0-a987-8e3bc83b68ec/max-2-dashboard-compliance-services.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/cyber-insurers-and-litigation-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/af510519-f976-43eb-8c7e-0d5204026d24/max-2-surfacing-silent-threats-in-a-global-insurance-network.png</image:loc>
      <image:title>Cyber Insurers and Litigation Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/c4c26cae-b9d5-4609-a0a0-0568bed50f65/max-2-enabling-data-driven-underwriting-for-cyber-insurers.png</image:loc>
      <image:title>Cyber Insurers and Litigation Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/3bb679eb-fc08-495b-8118-b3317bb98e88/max-2-cyber-insurers-and-litigation-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/be279d21-76f8-4afc-a6c3-aaad4c669bd1/max-2-dashboard-cyber-insurers-and-litigation-services.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/private-equity-and-industry</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e6fc64b0-d7e6-43a0-a3c1-65f7a04587b1/max-2-building-risk-transparency-across-portfolio-companies.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/af510519-f976-43eb-8c7e-0d5204026d24/max-2-surfacing-silent-threats-in-a-global-insurance-network.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/55da286c-671a-4c7d-9487-6fbaefbaf510/max-2-minority-investment-in-multiple-port-assets.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/05d401db-19e4-4012-85a1-1233c6029be4/max-2-acquisition-and-merger-of-two-airports.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/99d14af0-69a8-49e0-924a-126f68a765d6/max-2-discreet-iso-27001-assessment-for-cross-border-m%26a-success.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f6ec5558-ac7b-409e-b160-0befff0bb8c9/max-2-helping-a-global-consultancy-understand-its-cyber-risk.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b869a81e-bc23-489f-99a5-f3448a213dd3/max-2-coordinated-gdpr-compliance-across-international-operations.png</image:loc>
      <image:title>Private Equity and Industry</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1fd0841f-1a9a-478f-971d-81654d3030b3/max-2-private-equity-and-industry.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0397ac78-c368-44c2-81fa-28589a114a60/max-2-dashboard-private-equity-and-industry.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/education</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2e9f461b-387d-474f-98f2-b3469c065ee8/max-2-cmmc-compliance-without-disruption-in-higher-education.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d09f001a-1a72-41e3-8866-3e8676ddb00f/max-2-traffic-analysis-and-automated-reporting-setup.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2422c4ce-759e-4eb3-a1e6-5ac4867b0ec9/max-2-ongoing-monitoring-of-dark-web-traffic-and-network-application-vulnerabilities.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/947d654b-67f3-43c3-a308-e6ed483fb9a6/max-2-audit-and-implementation-of-cybersecurity-practices-at-county-utility.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b31b0655-b5d2-45d6-bdc4-38941e93436c/max-2-protecting-student-privacy-under-ferpa-in-digital-behavior-systems.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f67194a8-046c-4fe0-95a4-9e31fae93d70/max-2-helping-community-colleges-navigate-glba-via-consortium-model.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/6354179b-29e8-4c31-b689-d57e02f5c955/max-2-continuity-of-cyber-program-following-it-insourcing.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/4f66ae07-b3e5-4ae5-bb88-ce1fdc14ccb3/max-2-compliance-with-state-and-federal-change-management-rules-regulated-due-to-grant-requirements.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0498ff06-5434-4d3b-af22-d12225b5eb28/max-2-policy-and-governance-for-university-hospital-system.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/91ce759c-46ff-4591-b0e6-695cf7adb3ed/max-2-elevating-research-risk-governance-in-higher-education.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/ea4f9857-483c-4f2b-9504-4415addcba8d/max-2-designing-secure-and-flexible-ai-use-policies-for-higher-ed.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b9b7868c-c473-4e15-8b8a-ba3e6ab69452/max-2-simulating-crisis-response-at-a-major-research-university.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0fc91fdb-db30-4d3f-b6f6-149ab4349d19/max-2-reporting-and-governance-restructuring-following-cyber-incident-at-a-K-12.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/46d6ecb3-128a-4859-8aa1-bd7b3ec8be7d/max-2-affordable-soc-services-for-community-college.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1702c845-e356-48cc-b657-fd8ffd9a7d1c/max-2-gaining-confidence-through-network-threat-visibility.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/47dd25d8-438c-40da-a680-f9c11e6b3fa7/max-2-enhancing-cyber-insurance-outcomes-with-coordinated-post-breach-support.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b10c6ea8-4dbe-47ef-9f0a-215b7552d566/max-2-building-affordable-security-operations-centers-for-underserved-sectors.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/327bc3dd-2963-4b6a-84aa-2f0464bcfed4/max-2-fractional-ciso-services-and-affordable-security-operations-and-monitoring.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/27b40270-334e-4768-a22e-a9cad3f15c19/max-2-real-time-third-party-risk-monitoring-for-higher-ed.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8003ad46-a093-426b-a8de-0065125585b8/max-2-transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a423ee56-3052-444a-98b0-a5857aaa24a6/max-2-providing-external-threat-intelligence-reporting.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/df9c0334-08ac-425b-b4d9-55db756eb227/max-2-providing-affordable-penetration-testing-for-education.png</image:loc>
      <image:title>Education</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2349a559-729b-4753-ba49-06f0f7b76734/max-2-education.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b0c36ccc-a79c-4708-a81b-913f59bd2406/max-2-dashboard-education.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/msp-and-mssp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17808b89-c517-46f3-a59a-5b4d1c4acd24/max-2-multi-agency-regulatory-audit-on-eight-lane-multi-state-public-private-toll-bridge-investment.png</image:loc>
      <image:title>MSP and MSSP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
      <image:title>MSP and MSSP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e39d0697-6e73-4a6b-a4ff-3dedd19d87c8/max-2-enabling-security-services-for-an-msp-through-strategic-partnership.png</image:loc>
      <image:title>MSP and MSSP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
      <image:title>MSP and MSSP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/01976126-be54-4e1f-9583-0b89177dfda4/max-2-msp-mssp.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/428d91e2-21ca-4c87-9a12-7dc403247c8f/max-2-dashboard-msp-and-mssp.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/government</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b10c6ea8-4dbe-47ef-9f0a-215b7552d566/max-2-building-affordable-security-operations-centers-for-underserved-sectors.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/7365f57b-8b30-422a-86a8-b7ac2131d937/max-2-overhaul-and-continued-management-of-cyber-risk-for-large-municipal-government.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/12746e31-8381-41ad-887a-bac1863ac14a/max-2-vciso-leadership-for-local-government-cybersecurity-advancement.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/947d654b-67f3-43c3-a308-e6ed483fb9a6/max-2-audit-and-implementation-of-cybersecurity-practices-at-county-utility.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/bfd8aa26-31ce-43ab-8a18-7528e473fb16/max-2-making-cmmc-attainable-for-small-defense-contractors.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f2d39077-118e-4a7f-b320-f634148b17b2/max-2-reducing-vendor-risk-in-critical-infrastructure.png</image:loc>
      <image:title>Government</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17a6f8e2-84b7-461c-8606-36b923a59f08/max-2-government.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/5415e3c7-2344-4d21-a47b-939a1775203c/max-2-dashboard-government.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/healthcare</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
      <image:title>Healthcare</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1e4c5b76-faa6-443b-9cfd-a4b24dc2adb1/max-2-healthcare.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/05fd8945-9277-415c-96eb-c9553cd6658a/max-2-dashboard-healthcare.jpeg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/cmmc-compliance-without-disruption-in-higher-education</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2e9f461b-387d-474f-98f2-b3469c065ee8/max-2-cmmc-compliance-without-disruption-in-higher-education.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/making-cmmc-attainable-for-small-defense-contractors</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/bfd8aa26-31ce-43ab-8a18-7528e473fb16/max-2-making-cmmc-attainable-for-small-defense-contractors.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/multi-agency-regulatory-audit-on-eight-lane-multi-state-public/private-toll-bridge-investment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/17808b89-c517-46f3-a59a-5b4d1c4acd24/max-2-multi-agency-regulatory-audit-on-eight-lane-multi-state-public-private-toll-bridge-investment.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/traffic-analysis-and-automated-reporting-setup</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/d09f001a-1a72-41e3-8866-3e8676ddb00f/max-2-traffic-analysis-and-automated-reporting-setup.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/ongoing-monitoring-of-dark-web-traffic-and-network/application-vulnerabilities</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2422c4ce-759e-4eb3-a1e6-5ac4867b0ec9/max-2-ongoing-monitoring-of-dark-web-traffic-and-network-application-vulnerabilities.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/audit-and-implementation-of-cybersecurity-practices-at-county-utility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/947d654b-67f3-43c3-a308-e6ed483fb9a6/max-2-audit-and-implementation-of-cybersecurity-practices-at-county-utility.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/vetting-healthcare-risk-before-onboarding-an-msp-client</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/2ee7e113-fb73-42bf-a72f-43d91790f461/max-2-vetting-healthcare-risk-before-onboarding-an-msp-client.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/protecting-student-privacy-under-ferpa-in-digital-behavior-systems</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b31b0655-b5d2-45d6-bdc4-38941e93436c/max-2-protecting-student-privacy-under-ferpa-in-digital-behavior-systems.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/coordinated-gdpr-compliance-across-international-operations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b869a81e-bc23-489f-99a5-f3448a213dd3/max-2-coordinated-gdpr-compliance-across-international-operations.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/helping-community-colleges-navigate-glba-via-consortium-model</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f67194a8-046c-4fe0-95a4-9e31fae93d70/max-2-helping-community-colleges-navigate-glba-via-consortium-model.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/continuity-of-cyber-program-following-it-insourcing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/6354179b-29e8-4c31-b689-d57e02f5c955/max-2-continuity-of-cyber-program-following-it-insourcing.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/compliance-with-state-and-federal-change-management-rules-regulated-due-to-grant-requirements</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/4f66ae07-b3e5-4ae5-bb88-ce1fdc14ccb3/max-2-compliance-with-state-and-federal-change-management-rules-regulated-due-to-grant-requirements.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/policy-governance-for-university-hospital-system</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0498ff06-5434-4d3b-af22-d12225b5eb28/max-2-policy-and-governance-for-university-hospital-system.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/building-risk-transparency-across-portfolio-companies</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e6fc64b0-d7e6-43a0-a3c1-65f7a04587b1/max-2-building-risk-transparency-across-portfolio-companies.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/elevating-research-risk-governance-in-higher-education</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/91ce759c-46ff-4591-b0e6-695cf7adb3ed/max-2-elevating-research-risk-governance-in-higher-education.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/enabling-security-services-for-an-msp-through-strategic-partnership</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e39d0697-6e73-4a6b-a4ff-3dedd19d87c8/max-2-enabling-security-services-for-an-msp-through-strategic-partnership.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/expanding-access-to-cybersecurity-for-k12-through-msp-partnership</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/309de3f7-4d89-4b69-826e-2d770bbef1dc/max-2-expanding-access-to-cybersecurity-for-K%E2%80%9312-through-mps-partnership.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/helping-a-global-consultancy-understand-its-cyber-risk</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f6ec5558-ac7b-409e-b160-0befff0bb8c9/max-2-helping-a-global-consultancy-understand-its-cyber-risk.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/raising-cyber-maturity-and-blocking-ransomware-before-execution</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/73d4c1bc-e68c-4f03-bc92-59f6c3300be3/max-2-raising-cyber-maturity-and-blocking-ransomware-before-execution.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/designing-secure-flexible-ai-use-policies-for-higher-ed</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/ea4f9857-483c-4f2b-9504-4415addcba8d/max-2-designing-secure-and-flexible-ai-use-policies-for-higher-ed.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/simulating-crisis-response-at-a-major-research-university</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b9b7868c-c473-4e15-8b8a-ba3e6ab69452/max-2-simulating-crisis-response-at-a-major-research-university.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/reporting-governance-restructuring-following-cyber-incident-at-a-k-12</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/0fc91fdb-db30-4d3f-b6f6-149ab4349d19/max-2-reporting-and-governance-restructuring-following-cyber-incident-at-a-K-12.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/providing-affordable-penetration-testing-for-education</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/df9c0334-08ac-425b-b4d9-55db756eb227/max-2-providing-affordable-penetration-testing-for-education.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/affordable-soc-services-for-community-college</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/46d6ecb3-128a-4859-8aa1-bd7b3ec8be7d/max-2-affordable-soc-services-for-community-college.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/gaining-confidence-through-network-threat-visibility</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/1702c845-e356-48cc-b657-fd8ffd9a7d1c/max-2-gaining-confidence-through-network-threat-visibility.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/surfacing-silent-threats-in-a-global-insurance-network</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/af510519-f976-43eb-8c7e-0d5204026d24/max-2-surfacing-silent-threats-in-a-global-insurance-network.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/enabling-data-driven-underwriting-for-cyber-insurers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/c4c26cae-b9d5-4609-a0a0-0568bed50f65/max-2-enabling-data-driven-underwriting-for-cyber-insurers.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/enhancing-cyber-insurance-outcomes-with-coordinated-post-breach-support</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/47dd25d8-438c-40da-a680-f9c11e6b3fa7/max-2-enhancing-cyber-insurance-outcomes-with-coordinated-post-breach-support.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/bringing-enterprise-grade-soc-threat-hunting-to-small-institutions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/e15faa83-cb39-4c1e-bd56-3866f5178e9e/max-2-bringing-enterprise-grade-soc-and-threat-hunting-to-small-institutions.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/building-affordable-security-operations-centers-for-underserved-sectors</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/b10c6ea8-4dbe-47ef-9f0a-215b7552d566/max-2-building-affordable-security-operations-centers-for-underserved-sectors.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/reducing-vendor-risk-in-critical-infrastructure</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/f2d39077-118e-4a7f-b320-f634148b17b2/max-2-reducing-vendor-risk-in-critical-infrastructure.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/fractional-ciso-services-and-affordable-security-operations-and-monitoring</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/327bc3dd-2963-4b6a-84aa-2f0464bcfed4/max-2-fractional-ciso-services-and-affordable-security-operations-and-monitoring.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/overhaul-and-continued-management-of-cyber-risk-for-large-municipal-government</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/7365f57b-8b30-422a-86a8-b7ac2131d937/max-2-overhaul-and-continued-management-of-cyber-risk-for-large-municipal-government.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/vciso-leadership-for-local-government-cybersecurity-advancement</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/12746e31-8381-41ad-887a-bac1863ac14a/max-2-vciso-leadership-for-local-government-cybersecurity-advancement.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/real-time-third-party-risk-monitoring-for-higher-ed</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/27b40270-334e-4768-a22e-a9cad3f15c19/max-2-real-time-third-party-risk-monitoring-for-higher-ed.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/minority-investment-in-multiple-port-assets</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/55da286c-671a-4c7d-9487-6fbaefbaf510/max-2-minority-investment-in-multiple-port-assets.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/acquisition-and-merger-of-two-airports</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/05d401db-19e4-4012-85a1-1233c6029be4/max-2-acquisition-and-merger-of-two-airports.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/discreet-iso-27001-assessment-for-cross-border-ma-success</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/99d14af0-69a8-49e0-924a-126f68a765d6/max-2-discreet-iso-27001-assessment-for-cross-border-m%26a-success.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/providing-external-threat-intelligence-reporting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/a423ee56-3052-444a-98b0-a5857aaa24a6/max-2-providing-external-threat-intelligence-reporting.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/689c9162d97e534abeb74160/8003ad46-a093-426b-a8de-0065125585b8/max-2-transitioning-cybersecurity-governance-model-from-nist-sp-800-53-to-nist-sp-800-171.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.max2security.com/max2-privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-30</lastmod>
  </url>
</urlset>

