<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://imagineidentity.com/2018/06/26/security-as-trust/</loc><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2018/06/trust.png</image:loc><image:title>trust</image:title></image:image><lastmod>2018-06-26T22:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/about/</loc><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2016/04/ace.jpg</image:loc><image:title>Ace</image:title></image:image><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2016/04/grid1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2018-05-09T15:22:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://imagineidentity.com/2018/03/08/ninjas-and-accountants/</loc><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2018/03/ninja-png-picture.png</image:loc><image:title>Ninja-PNG-Picture</image:title></image:image><lastmod>2018-03-08T22:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/2018/02/15/the-myth-of-security-governance/</loc><lastmod>2018-02-15T22:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/2017/12/04/top-10-reasons-computer-security-fails/</loc><lastmod>2017-12-04T18:51:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/2017/11/20/is-it-really-so-bad/</loc><lastmod>2017-11-20T20:10:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/2017/11/13/governments-learning-from-terrorists/</loc><lastmod>2017-11-13T19:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/2017/11/08/internet-battle/</loc><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2017/11/cyberwarfare04252014.jpg</image:loc><image:title>cyberwarfare04252014</image:title></image:image><lastmod>2017-11-08T23:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://imagineidentity.com/contact/</loc><image:image><image:loc>https://imagineidentity.com/wp-content/uploads/2016/04/full-width1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2017-10-04T20:24:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://imagineidentity.com/blog/</loc><lastmod>2016-04-26T16:57:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://imagineidentity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2018-06-26T22:28:07+00:00</lastmod></url></urlset>
