<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://info.threatmodeler.com/real-time-attack-surface</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Real%20Attack%20.jpeg</image:loc><image:caption>RealAttack</image:caption><image:title>RealAttack</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/become-a-partner</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/SHI.webp</image:loc><image:caption>SHI</image:caption><image:title>SHI</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Optiv.webp</image:loc><image:caption>Optiv</image:caption><image:title>Optiv</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/EY.webp</image:loc><image:caption>EY</image:caption><image:title>EY</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/TheImpactTeam.webp</image:loc><image:caption>TheImpactTeam</image:caption><image:title>TheImpactTeam</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/GuidePoint%20Security.webp</image:loc><image:caption>GuidePointSecurity</image:caption><image:title>GuidePointSecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Deloitte.webp</image:loc><image:caption>Deloitte</image:caption><image:title>Deloitte</image:title></image:image><lastmod>2024-09-03</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-devsecops-should-include-continous-threat-modeling</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Screenshot%202024-02-28%20at%2013.30.36.png</image:loc><image:caption>Screenshot20240228at133036</image:caption><image:title>Screenshot20240228at133036</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Imported%20sitepage%20images/devsecops-security.png</image:loc><image:caption>devsecopssecurity</image:caption><image:title>devsecopssecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/secure-by-design-automated-for-scale-webinar</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/icon%20-%20Security%20is%20an%20ongoing%20process.webp</image:loc><image:caption>iconSecurityisanongoingprocess</image:caption><image:title>iconSecurityisanongoingprocess</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Optiv.webp</image:loc><image:caption>Optiv</image:caption><image:title>Optiv</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Deloitte.webp</image:loc><image:caption>Deloitte</image:caption><image:title>Deloitte</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/TheImpactTeam.webp</image:loc><image:caption>TheImpactTeam</image:caption><image:title>TheImpactTeam</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/HT1.jpg</image:loc><image:caption>HT1</image:caption><image:title>HT1</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/SHI.webp</image:loc><image:caption>SHI</image:caption><image:title>SHI</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%20-%20Resource%20constraints.webp</image:loc><image:caption>IconResourceconstraints</image:caption><image:title>IconResourceconstraints</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/EY.webp</image:loc><image:caption>EY</image:caption><image:title>EY</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/GuidePoint%20Security.webp</image:loc><image:caption>GuidePointSecurity</image:caption><image:title>GuidePointSecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%20-%20Architectural%20flaws.webp</image:loc><image:caption>IconArchitecturalflaws</image:caption><image:title>IconArchitecturalflaws</image:title></image:image><lastmod>2024-11-22</lastmod></url><url><loc>https://info.threatmodeler.com/download-devsecops-blueprint-for-cybersecurity-achieve-security-by-design-in-30-days-whitepaper</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20DevSecOps-%20Blueprint%20for%20Cybersecurity.webp</image:loc><image:caption>ThreatModelerDevSecOpsBlueprintforCybersecurity</image:caption><image:title>ThreatModelerDevSecOpsBlueprintforCybersecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Screenshot%202024-02-21%20at%2015.43.19.png</image:loc><image:caption>Screenshot20240221at154319</image:caption><image:title>Screenshot20240221at154319</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-7-easy-steps-for-building-a-scalable-threat-modeling-process</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Scalable%20Threat%20Modeling%20Process.webp</image:loc><image:caption>ThreatModelerScalableThreatModelingProcess</image:caption><image:title>ThreatModelerScalableThreatModelingProcess</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/7-Steps-1-1.png</image:loc><image:caption>7Steps11</image:caption><image:title>7Steps11</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/threat-modeling</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%203.webp</image:loc><image:caption>Icon3</image:caption><image:title>Icon3</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%204.webp</image:loc><image:caption>Icon4</image:caption><image:title>Icon4</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%202.webp</image:loc><image:caption>Icon2</image:caption><image:title>Icon2</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Threat%20Modeling%20LP%20banner.webp</image:loc><image:caption>ThreatModelingLPbanner</image:caption><image:title>ThreatModelingLPbanner</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%205.webp</image:loc><image:caption>Icon5</image:caption><image:title>Icon5</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Icon%201.webp</image:loc><image:caption>Icon1</image:caption><image:title>Icon1</image:title></image:image><lastmod>2024-04-05</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/strengthening-cybersecurity-strategies-for-tomorrows-threats</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Deloitte.webp</image:loc><image:caption>Deloitte</image:caption><image:title>Deloitte</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/TheImpactTeam.webp</image:loc><image:caption>TheImpactTeam</image:caption><image:title>TheImpactTeam</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/EY.webp</image:loc><image:caption>EY</image:caption><image:title>EY</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/GuidePoint%20Security.webp</image:loc><image:caption>GuidePointSecurity</image:caption><image:title>GuidePointSecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Asset%201@300x.webp</image:loc><image:caption>Asset1300x</image:caption><image:title>Asset1300x</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/SHI.webp</image:loc><image:caption>SHI</image:caption><image:title>SHI</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Asset%203@300x.webp</image:loc><image:caption>Asset3300x</image:caption><image:title>Asset3300x</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Asset%202@300x.webp</image:loc><image:caption>Asset2300x</image:caption><image:title>Asset2300x</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/HT1.jpg</image:loc><image:caption>HT1</image:caption><image:title>HT1</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Optiv.webp</image:loc><image:caption>Optiv</image:caption><image:title>Optiv</image:title></image:image><lastmod>2024-08-21</lastmod></url><url><loc>https://info.threatmodeler.com/pfds-vs-dfds-in-the-threat-modeling-whitepaper</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Process%20Flow%20Diagrams%20(PFDs)%20vs%20Data%20Flow%20Diagrams%20(DFDs)%202.webp</image:loc><image:caption>ThreatModelerProcessFlowDiagramsPFDsvsDataFlowDiagramsDFDs2</image:caption><image:title>ThreatModelerProcessFlowDiagramsPFDsvsDataFlowDiagramsDFDs2</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/white-paper-cover.webp</image:loc><image:caption>whitepapercover</image:caption><image:title>whitepapercover</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-5-steps-to-building-a-threat-modeling-program-for-aws</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Threat%20Modeling%20Program%20for%20the%20Cloud.webp</image:loc><image:caption>ThreatModelerThreatModelingProgramfortheCloud</image:caption><image:title>ThreatModelerThreatModelingProgramfortheCloud</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Portrait-book-cover-with-changeable-color_5-steps-white-paper--1.png</image:loc><image:caption>Portraitbookcoverwithchangeablecolor5stepswhitepaper1</image:caption><image:title>Portraitbookcoverwithchangeablecolor5stepswhitepaper1</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/vast-methodology-data-sheet</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/VAST-Methodology-DataSheet.png</image:loc><image:caption>VASTMethodologyDataSheet</image:caption><image:title>VASTMethodologyDataSheet</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20VAST%20threat%20modeling.webp</image:loc><image:caption>ThreatModelerVASTthreatmodeling</image:caption><image:title>ThreatModelerVASTthreatmodeling</image:title></image:image><lastmod>2024-02-21</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/contact-us</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Asset%204@2x-1.png</image:loc><image:caption>Asset42x1</image:caption><image:title>Asset42x1</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Asset%203@2x-1.png</image:loc><image:caption>Asset32x1</image:caption><image:title>Asset32x1</image:title></image:image><lastmod>2024-02-20</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/automated-threat-modeling-for-federal-companies</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Federal%20companies.webp</image:loc><image:caption>ThreatModelerFederalcompanies</image:caption><image:title>ThreatModelerFederalcompanies</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-benefits-for-the-ciso-and-stakeholders</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Benefits%20for%20CISO.webp</image:loc><image:caption>ThreatModelerBenefitsforCISO</image:caption><image:title>ThreatModelerBenefitsforCISO</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Threat-Modeling-Benefits-for-the-CISO-and-Key-Stakeholdersu200B-1-394x512-231x300-1-2.png</image:loc><image:caption>ThreatModelingBenefitsfortheCISOandKeyStakeholdersu200B1394x512231x30012</image:caption><image:title>ThreatModelingBenefitsfortheCISOandKeyStakeholdersu200B1394x512231x30012</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/threat-modeling-methodologies</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Threat_Modeling_Methodology_Comparison__1_.png</image:loc><image:caption>ThreatModelingMethodologyComparison1</image:caption><image:title>ThreatModelingMethodologyComparison1</image:title></image:image><lastmod>2024-10-29</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-support-services-datasheet</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Support%20Services.webp</image:loc><image:caption>ThreatModelerSupportServices</image:caption><image:title>ThreatModelerSupportServices</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler-Support-ServicesTM-The-Industryu2019s-Number-1-Threat-Modeling-Solution-394x512-231x300-1.png</image:loc><image:caption>ThreatModelerSupportServicesTMTheIndustryu2019sNumber1ThreatModelingSolution394x512231x3001</image:caption><image:title>ThreatModelerSupportServicesTMTheIndustryu2019sNumber1ThreatModelingSolution394x512231x3001</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/demo</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Deloitte.webp</image:loc><image:caption>Deloitte</image:caption><image:title>Deloitte</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/TheImpactTeam.webp</image:loc><image:caption>TheImpactTeam</image:caption><image:title>TheImpactTeam</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/GuidePoint%20Security.webp</image:loc><image:caption>GuidePointSecurity</image:caption><image:title>GuidePointSecurity</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/EY.webp</image:loc><image:caption>EY</image:caption><image:title>EY</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Optiv.webp</image:loc><image:caption>Optiv</image:caption><image:title>Optiv</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/SHI.webp</image:loc><image:caption>SHI</image:caption><image:title>SHI</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/SmartStart/Icons/checkmark-fancy.svg</image:loc><image:caption>Checkmark</image:caption><image:title>checkmarkfancy</image:title></image:image><lastmod>2025-01-28</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-technical-data-sheet</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler-Technical-Data-Sheet-1-394x512-231x300-1-2.png</image:loc><image:caption>ThreatModelerTechnicalDataSheet1394x512231x30012</image:caption><image:title>ThreatModelerTechnicalDataSheet1394x512231x30012</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Leader%20in%20Automated%20Threat%20Modeling.webp</image:loc><image:caption>ThreatModelerLeaderinAutomatedThreatModeling</image:caption><image:title>ThreatModelerLeaderinAutomatedThreatModeling</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-build-vs.-buy</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Overlooked-Benefits-to-Buying-Our-Automated-Platform-Over-In-Built-Tools-1-394x512-231x300-1.png</image:loc><image:caption>OverlookedBenefitstoBuyingOurAutomatedPlatformOverInBuiltTools1394x512231x3001</image:caption><image:title>OverlookedBenefitstoBuyingOurAutomatedPlatformOverInBuiltTools1394x512231x3001</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Security%20Automated%20Platform.webp</image:loc><image:caption>ThreatModelerSecurityAutomatedPlatform</image:caption><image:title>ThreatModelerSecurityAutomatedPlatform</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/driving-security-in-devops-download</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/Driving-Security-in-DevOps-1-394x512-231x300-1-2.png</image:loc><image:caption>DrivingSecurityinDevOps1394x512231x30012</image:caption><image:title>DrivingSecurityinDevOps1394x512231x30012</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-02-22</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/download-toward-threat-modeling-as-code</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/TOWARD%20THREAT%20MODELING%20AS%20CODE.png</image:loc><image:caption>TOWARDTHREATMODELINGASCODE</image:caption><image:title>TOWARDTHREATMODELINGASCODE</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Scalable%20Threat%20Modeling%20Process.webp</image:loc><image:caption>ThreatModelerScalableThreatModelingProcess</image:caption><image:title>ThreatModelerScalableThreatModelingProcess</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-03-27</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/vanguard-451-report</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/ThreatModeler%20Scalable%20Threat%20Modeling%20Process.webp</image:loc><image:caption>ThreatModelerScalableThreatModelingProcess</image:caption><image:title>ThreatModelerScalableThreatModelingProcess</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Vanguard-451-Report-Cover.png</image:loc><image:caption>Vanguard451ReportCover</image:caption><image:title>Vanguard451ReportCover</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Logos%20and%20Favicon/threatmodeler%20logo%20color.png</image:loc><image:caption>threatmodelerlogocolor</image:caption><image:title>threatmodelerlogocolor</image:title></image:image><lastmod>2024-02-28</lastmod><changefreq>daily</changefreq></url><url><loc>https://info.threatmodeler.com/threat-modeling-tools</loc><image:image><image:loc>https://info.threatmodeler.com/hubfs/TM%20logo%20mark.webp</image:loc><image:caption>TMlogomark</image:caption><image:title>TMlogomark</image:title></image:image><image:image><image:loc>https://info.threatmodeler.com/hubfs/Microsoft%20Threat%20Modeling%20Tool.webp</image:loc><image:caption>MicrosoftThreatModelingTool</image:caption><image:title>MicrosoftThreatModelingTool</image:title></image:image><lastmod>2024-02-27</lastmod><changefreq>daily</changefreq></url></urlset>