<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>http://iwazirijr.com/tags/csrb/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/tags/cybersecurity/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/tags/microsoft/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/2024-10-01-microsoft-secure-future-initiative-progress-report/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/posts/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/tags/sfi/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/tags/</loc><lastmod>2024-10-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>http://iwazirijr.com/2024-08-09-microsofts-response-to-the-csrb-report/</loc><lastmod>2024-08-09T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2024-06-01-csrb-review-of-the-summer-2023-microsoft-exchange-online-intrusion/</loc><lastmod>2024-06-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/cyber-threats/</loc><lastmod>2024-06-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/incident-response/</loc><lastmod>2024-06-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2023-05-01-aligning-cyber-frameworks-regulations-and-tech-implementations/</loc><lastmod>2023-05-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/compliance/</loc><lastmod>2023-05-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/frameworks/</loc><lastmod>2023-05-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/regulations/</loc><lastmod>2023-05-01T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2023-02-05-achieve-ato-with-azure-p-ato/</loc><lastmod>2023-02-05T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/ato/</loc><lastmod>2023-02-05T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/azure/</loc><lastmod>2023-02-05T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/grc/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/usgov-rmf/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-10-09-achieving-fisma-compliance-for-federal-contractors/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-09-21-achieving-fisma-compliance-for-cloud-service-providers/</loc><lastmod>2022-09-21T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-08-25-achieving-fisma-compliance-for-defense-agencies/</loc><lastmod>2022-08-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-07-30-achieving-fisma-compliance-for-intelligence-agencies/</loc><lastmod>2022-07-30T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-06-15-achieving-fisma-compliance-for-federal-civilian-agencies/</loc><lastmod>2022-06-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2022-05-18-an-overview-of-the-us-government-cybersecurity-regulatory-landscape/</loc><lastmod>2022-05-18T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/nist/</loc><lastmod>2021-02-08T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2021-02-08-nist-sp-800-53-rev-4-vs.-rev-5/</loc><lastmod>2021-02-08T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/engineering/</loc><lastmod>2020-09-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/governance/</loc><lastmod>2020-09-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2020-09-15-the-need-to-engineer-cybersecurity-grc-for-seamless-sdlc-integration/</loc><lastmod>2020-09-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/nigeria/</loc><lastmod>2017-06-22T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-06-22-the-need-for-a-cybersecurity-agency-in-nigeria/</loc><lastmod>2017-06-22T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-05-13-cybersecurity-in-nigeria/</loc><lastmod>2017-05-13T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/ransomware/</loc><lastmod>2017-04-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-04-15-what-is-a-ransomware-and-how-to-protect-yourself/</loc><lastmod>2017-04-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/what-is/</loc><lastmod>2017-04-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-04-09-data-encryption-~-how-to-secure-your-data/</loc><lastmod>2017-04-09T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/encryption/</loc><lastmod>2017-04-09T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-03-25-password-manager--2fa-~-how-to-properly-set-up-your-password/</loc><lastmod>2017-03-25T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/password-managers/</loc><lastmod>2017-03-25T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-03-04-computer-ethics/</loc><lastmod>2017-03-04T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/ethics/</loc><lastmod>2017-03-04T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/national-security/</loc><lastmod>2017-02-25T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/readiness/</loc><lastmod>2017-02-25T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-02-25-the-next-big-threat--is-nigeria-ready/</loc><lastmod>2017-02-25T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/software-piracy/</loc><lastmod>2017-02-18T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-03-18-why-software-piracy-is-prevalent-in-nigeria/</loc><lastmod>2017-02-18T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2017-02-11-implications-of-software-piracy-in-nigeria/</loc><lastmod>2017-02-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2015-05-15-a-year-of-growth/</loc><lastmod>2015-05-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/personal-journey/</loc><lastmod>2015-05-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/ph.d/</loc><lastmod>2015-05-15T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2014-10-10-changing-my-blogging-approach-a-ph.d.-reality-check/</loc><lastmod>2014-10-10T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/firewall/</loc><lastmod>2012-10-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/how-to/</loc><lastmod>2012-10-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/virtualization/</loc><lastmod>2012-10-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2012-10-01-what-is-smoothwall-express-firewall-and-set-up-vmware-esxi/</loc><lastmod>2012-10-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2012-09-12-how-to-set-up-a-virtual-machine-after-installing-vmware-esxi-4.1/</loc><lastmod>2012-09-12T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/2012-09-11-how-to-install-vmware-esxi-4.1/</loc><lastmod>2012-09-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/tags/virtual-machines/</loc><lastmod>2012-09-11T20:55:00+08:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/about/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/activities/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>http://iwazirijr.com/categories/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>