<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
        http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
  <!-- KIE Publications Sitemap — kieparis.fr -->
  <!-- Generated: 2026-05-24 by phase25 — ENTIRE /docs folder -->
  <!-- 433 docs-html + 1469 read-html + 459 PDFs + 2 hubs = 2363 URLs -->

  <!-- ++ Hub / index pages ++ -->
  <url>
    <loc>https://kieparis.fr/docs/</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.95</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/publications</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.95</priority>
  </url>

  <!-- ++ /docs/ publication landing pages ++ -->
  <url>
    <loc>https://kieparis.fr/docs/01-operationalising-ot-cyber-risk-a-board-to-plant-floor-operating-model-translating-risk-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/01_Operationalising_OT_Cyber_Risk__A_Board-to-Plant-Floor_Operating_Model_Translating_Risk_Appetite_into_PLC_Configuration__v4.1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/02-from-compliance-to-control-a-clause-by-clause-engineering-crosswalk-between-iec-62443-3.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/02_From_Compliance_to_Control__A_Clause-by-Clause_Engineering_Crosswalk_Between_IEC_62443-3-3_DORA_Chapter_III_and_NIS2_Article_21__v4.1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/03-industrial-cyber-resilience-by-design-cyber-physical-systems-under-iec-61511-functional.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/03_Industrial_Cyber_Resilience_by_Design__Cyber-Physical_Systems_Under_IEC_61511_Functional_Safety_and_Adversarial_Cyber_Stress__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/04-engineering-survivable-ot-architectures-iec-62439-3-prp-hsr-graceful-degradation-and-is.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/04_Engineering_Survivable_OT_Architectures__IEC_62439-3_PRP-HSR_Graceful_Degradation_and_Island-Mode_Under_Adversarial_Compromise__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/05-quantifying-ot-risk-a-transparent-monte-carlo-method-for-translating-scada-ics-and-dcs-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/05_Quantifying_OT_Risk__A_Transparent_Monte_Carlo_Method_for_Translating_SCADA_ICS_and_DCS_Threats_into_Defensible_Capital_Decisions__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/06-design-authority-for-industrial-networks-a-charter-operating-model-and-conflict-resolut.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/06_Design_Authority_for_Industrial_Networks__A_Charter_Operating_Model_and_Conflict-Resolution_Framework_for_IT-OT_Convergent_Network_Governance__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/07-enterprise-network-architecture-for-ot-evolving-purdue-modbus-dnp3-cip-dpi-micro-segmen.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/07_Enterprise_Network_Architecture_for_OT__Evolving_Purdue_—_Modbus-DNP3-CIP_DPI_Micro-Segmentation_and_IIoT_Vendor_Access__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/08-designing-hybrid-ot-connectivity-azure-aws-edge-and-data-centre-integration-under-laten.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/08_Designing_Hybrid_OT_Connectivity__Azure_AWS_Edge_and_Data-Centre_Integration_Under_Latency_and_Sovereignty_Constraints__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/09-governing-multi-vendor-network-architectures-in-critical-infrastructure-sboms-dora-ctpp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/09_Governing_Multi-Vendor_Network_Architectures_in_Critical_Infrastructure__SBOMs_DORA_CTPP_and_Vendor-Governance_for_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/10-industrial-network-resilience-profinet-irt-iec-61850-goose-bgp-mpls-failover-and-determ.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/10_Industrial_Network_Resilience__PROFINET_IRT_IEC_61850_GOOSE_BGP-MPLS_Failover_and_Deterministic_Networking_for_Mission-Critical_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/11-zero-trust-for-ics-in-practice-identity-aware-overlays-protocol-proxies-and-lateral-mov.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/11_Zero_Trust_for_ICS_in_Practice__Identity-Aware_Overlays_Protocol_Proxies_and_Lateral-Movement_Defeat_for_Headless_Industrial_Devices__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/12-industrial-segmentation-reimagined-static-vlans-to-software-defined-plant-networks-with.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/12_Industrial_Segmentation_Reimagined__Static_VLANs_to_Software-Defined_Plant_Networks_with_Risk-Based_OT-Aware_Peer-to-Peer_Zones__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/13-designing-the-industrial-dmz-reverse-proxies-jump-servers-dual-homed-historians-and-dat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/13_Designing_the_Industrial_DMZ__Reverse_Proxies_Jump_Servers_Dual-Homed_Historians_and_Data_Diodes_—_Engineering_the_IT-OT_Trust_Boundary__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14-400-seconds-to-comply-the-sovereign-ciso-doctrine-and-the-future-of-corporate-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14-identity-and-privileged-access-in-ot-break-glass-procedures-just-in-time-vendor-access-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14400-seconds-to-comply.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14_Identity_and_Privileged_Access_in_OT__Break-Glass_Procedures_Just-in-Time_Vendor_Access_and_the_MFA_Constraint_on_the_Plant_Floor__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/15-designing-active-active-active-architectures-for-scada-and-adms-distributed-c.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/15_SCADA_ADMS_Active-Active-Active_v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/16-failover-without-failure-engineering-sub-millisecond-continuity-in-industrial-control-s.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/16_Failover_Without_Failure__Engineering_Sub-Millisecond_Continuity_in_Industrial_Control_Systems_Using_IEC_62439-3_PRP-HSR__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/17-dependency-mapping-in-ot-systems-eliminating-hidden-single-points-of-failure-through-pa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/17_Dependency_Mapping_in_OT_Systems__Eliminating_Hidden_Single_Points_of_Failure_Through_Passive_Discovery_and_Graph_Analysis__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/18-sacda-architecture-for-modern-industry-formal-specification-of-the-safe-autonomous-conn.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/18_SACDA_Architecture_for_Modern_Industry__Formal_Specification_of_the_Safe_Autonomous_Connected_Distributed_Edge-Native_Architecture__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/19-sacda-resilience-engineering-run-time-operationalisation-of-the-autonomous-edge-local-c.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/19_SACDA_Resilience_Engineering__Run-Time_Operationalisation_of_the_Autonomous_Edge_—_Local_Control_and_Telemetry_Queuing__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/20-industrial-transformation-without-downtime-ships-in-the-night-architecture-and-choreogr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/2026-cyber-risk-reset-liability-is-the-new-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/2026-cyber-risk-reset.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/20_Industrial_Transformation_Without_Downtime__Ships-in-the-Night_Architecture_and_Choreographed_Cut-Over_for_24-7_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/21-the-unified-industrial-resilience-model-a-mathematically-specified-empirically-calibrat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/21_The_Unified_Industrial_Resilience_Model__A_Mathematically-Specified_Empirically-Calibrated_System_Unifying_the_Doctrine__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/advanced-exploitation-techniques-zero-day-research-custom-shellcode-bypass-engineering-post-exploitation-tradecraft-elite-security-operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/advanced-exploitation-techniques.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversarial-pattern-recognition-in-ai-systems-a-red-team-framework-for-emerging-web-exploitation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversarial-pattern-recognition-in-ai-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversary-simulation-in-regulated-environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversary-simulation-regulated-environments-tiber-eu-dora-tlpt-governance-architecture-financial-sector-threat-led-penetration.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/agent-sprawl-policy-drift-false-assurance-the-hidden-failure-modes-of-imperva-dam-a-field-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/agentic-ai-beyond-guardrails-adaptive-risk-architectures-for-enterprise-autonomy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/agentic-ai-beyond-guardrails.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-driven-identity-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-engineering-doctrine-extract-chunk-prompt-evaluate-the-four-phase-engineering-model-for-production-grade-government-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-engineering-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-governance-and-security-architecture-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-governance-meets-cyber-governance-the-emerging-duty-of-convergence-risk-management-and-board-accountability-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-governance-meets-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-incident-command-systems-crisis-governance-for-autonomous-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-incident-command-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-security-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-sovereignty-in-the-justice-stack-controlling-models-metadata-and-meaning-a-sovereignty-framework-for-national-control-of-judicial-ai-assets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-sovereignty-in-the-justice-stack.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-systems-cyber-doctrine-governance-and-operational-control-of-algorithmic-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-systems-cyber-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-that-survives-court-wins-the-market-the-doctrine-of-litigation-grade-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai-that-survives-court-wins-the-market.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks-compliance-driven-security-blueprint-for-regulated-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/aligning-azure-security-with-saudi-nca-caf-mcra.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/aligning-sabsa-with-eu-regulatory-frameworks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/antifragile-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/api-security-under-attack-penetration-testing-rest-graphql-grpc-interfaces-owasp-api-security-top-10-emerging-attack-vectors-flagship-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/api-security-under-attack.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-access-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-anonymous-power.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-cloud-native-ai-stacks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-the-ai-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-the-ai-native-enterprise-identity-as-infrastructure-technical-debt-as-liability-and-the-repricing-of-enterprise-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting-the-ai-native-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/assurance-under-pressure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/audit-proof-by-design-cra-nis2-compliance-without-slowing-engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/audit-proof-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/audit-proof-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/audit-ready-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/auditing-the-sabsa-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/automation-at-scale-python-ansible-rest-apis-in-cni-infrastructure-as-code-and-policy-as-code-at-scale-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/automation-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/autonomous-identity-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex-enterprises-a-risk-aligned-security-architecture-methodology.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/azure-security-by-design-architecture-risk-compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/bcp-battle-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/bcp-black-swan-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-binary-edges-how-hyperedge-structured-knowledge-graphs-eliminate-clause-fragmentation-in-llm-driven-contract-attribute-extraction.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-binary-edges.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-certification-campaigns.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-compliance-how-sabsa-transforms.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-perimeter-security-physical-cyber-convergence-in-airports-unified-physical-cyber-security-operations-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-perimeter-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-scanning-why-vulnerability-scanners-miss-68-percent-critical-security-findings-manual-penetration-testing-fills-gap-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-scanning.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-speech-to-text-end-to-end-ai-pipelines-for-transcription-and-intelligence-the-full-stack-ai-pipeline-architecture-for-judicial-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-speech-to-text.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-the-perimeter-identity-centric-security-in-azure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure-advanced-identity-security-patterns-for-transformation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-tick-box-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-aligned-ciso-blueprint-delivering-3-roi-resilience-across-nis2-dora-compliance-mandates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-aligned-ciso-blueprint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-governance-infographic.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-grade-cyber-resilience-technical-risk-to-executive-accountability-fair-quantification-and-board-reporting-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-grade-cyber-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/boardroom-collapse-in-45-seconds-the-zero-hour-command-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/boardroom-collapse-in-45-seconds.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/bridging-strategy-and-execution-security-architect-in-24x7-cni-board-risk-appetite-to-operational-defence-posture-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/bridging-strategy-and-execution.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and-response-a-complete-security-operations-centre-blueprint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-a-cloud-native-soc-on-microsoft-azure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-resilient-architectures-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-secure-azure-platforms-for-government-and-defence-cloud-environments-architecture-patterns-for-mission-critical-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/caf-in-practice.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cisco-aci-deep-dive-tenant-vrf-bridge-domain-epg-design-policy-driven-micro-segmentation-in-multi-tenant-data-centres-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cisco-aci-deep-dive.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ciso-2027-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/citrix-netscaler-and-f5-secure-application-delivery-for-aviation-waf-ssl-offload-and-load-balancing-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/citrix-netscaler-and-f5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-container-penetration-testing-aws-azure-gcp-kubernetes-security-validation-offensive-techniques-cloud-native-attack-paths-analysis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-container-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-first-identity-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-governance-at-scale-regulated-sovereign-markets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets-policy-driven-governance-for-multi-jurisdictional-compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-security-architecture-under-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/codified-intelligence-establishing-standards-for-interoperable-ai-a-standards-framework-for-ai-interoperability-across-government-departments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/codified-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/commanding-the-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/compliance-passed-security-failed-the-operational-reality-gap-between-pci-dss-sox-attestat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous-security-validation-annual-penetration-tests-automated-breach-attack-simulation-continuous-attack-surface-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous-security-validation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous-vulnerability-assessment-penetration-testing-cvapt-model-automated-scanning-manual-testing-threat-intelligence-assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous-vulnerability-assessment-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber-governance-for-the-regulated-enterprise-multi-regulatory-compliance-dora-nis2-eu-ai-act-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber-governance-for-the-regulated-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber-maturity-as-a-currency.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber-resilience-as-a-revenue-engine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber-resilience-in-operational-technology.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/data-governance-and-security-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/database-monitoring-is-broken-and-regulators-are-about-to-notice-a-dora-nis2-and-pra-align.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign-standards-a-strategic-architecture-for-regulated-organisations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/defending-the-kingdom-azure-saudi-sovereign-standards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-cyber-resilient-airport-networks-ot-it-segregation-for-airside-landside-passenger-systems-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-cyber-resilient-airport-networks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-secure-by-default-azure-architectures-for-high-sensitivity-environments-embedding-security-controls-at-the-foundation-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-ultra-high-reliability-ai-services-observability-resilience-and-devsecops-the-convergence-of-observability-resilience-and-security-for-judicial-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-ultra-high-reliability-ai-services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/digital-resilience-by-design-anti-fragile-infrastructure-architecture-that-gets-stronger-under-stress-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/digital-resilience-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/doctrine-of-digital-proof-operationalising-trust-in-ai-driven-judicial-systems-a-formal-framework-for-establishing-evidentiary-trust-in-machine-generated-transcripts.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/doctrine-of-digital-proof.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/doing-more-with-less.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dora-aligned-architecture-using-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dora-compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dora-s-ai-vendor-trap-liability-flows-capital-charges-and-board-exit-strategies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dora-will-expose-your-data-layer-are-you-ready-a-board-level-readiness-doctrine-for-databa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/doras-ai-vendor-trap.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dr-doctrine-2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/drowning-in-logs-starving-for-signals-the-dam-to-siem-crisis-inside-financial-services-eng.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/drp-weaponisation-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/end-to-end-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/engineering-truth-the-ai-pipeline-as-an-instrument-of-national-integrity-building-ai-systems-worthy-of-national-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/engineering-truth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise-firewall-modernisation-for-critical-national-infrastructure-ips-encrypted-visibility-policy-engineering-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise-firewall-modernisation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust-enforcement-building-the-secure-cloud-adoption-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise-scale-azure-security-landing-zones-to-zero-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/evidence-over-opinion.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/executive-summary-polished-final-v9.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/executive-summary-zero-hour-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fiduciary-defence-dossier-template-v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fiduciary-defence-dossier-template.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fortifying-the-pipeline-devsecops-doctrine-for-ai-enabled-judicial-services-security-first-ci-cd-for-machine-learning-in-government-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fortifying-the-pipeline.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-audit-to-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-mandate-to-competitive-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-to-command-authority.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-to-competitive-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-to-conformity-operationalising-cra-and-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-to-conformity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-compliance-to-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-findings-to-fixes-remediation-driven-penetration-testing-programme-closes-security-gap-through-governance-framework-flagship-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-findings-to-fixes.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-pentest-to-threat-intelligence-offensive-security-findings-feed-strategic-threat-intelligence-mitre-att-ck-proactive-defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-pentest-to-threat-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-playbooks-to-performance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-pov-to-production-the-blueprint-for-resilient-ai-in-public-infrastructure-crossing-the-valley-of-death-between-ai-proof-of-value-and-national-deployment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-pov-to-production.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-prototype-to-public-infrastructure-engineering-production-grade-ai-transcription-the-engineering-doctrine-for-scaling-ai-from-lab-to-live-service.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-prototype-to-public-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-regulation-to-runtime-engineering-cra-nis2-dora-into-product-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-regulation-to-runtime.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-scapegoat-to-sovereign-the-ciso-authority-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from-scapegoat-to-sovereign.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/global-identity-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing-agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing-cyber-risk-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing-machine-identities.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/hardening-the-vault-turning-imperva-logs-into-board-level-risk-intelligence-from-raw-dam-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/harmonizing-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/high-availability-and-disaster-recovery-for-mission-critical-aviation-sub-second-failover-and-zero-data-loss-recovery-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/high-availability-and-disaster-recovery.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/iam-governance-elite-v4.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/iam-governance-elite.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-first-azure-architecture-entra-id-pim-conditional-access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional-access-at-scale-designing-the-enterprise-identity-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-governance-as-infrastructure-translating-policy-into-automated-control-architecture-for-the-autonomous-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-governance-as-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-is-the-new-perimeter-zero-trust-governance-blueprint-identity-centric-security-at-enterprise-scale-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-is-the-new-perimeter.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-warehouse-to-enforcement-edge.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/implementing-sabsa-in-complex-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/information-governance-for-autonomous-metro-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/infrastructure-penetration-testing-active-directory-network-segmentation-lateral-movement-exploiting-defending-enterprise-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/infrastructure-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/institution-grade-recovery-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/institutional-dr-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/institutionalising-product-security-operating-model-cra-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/institutionalising-product-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/integrating-sabsa-across-the-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/interim-ciso.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ironclad-anonymization-deterministic-redaction-frameworks-for-the-ministry-of-justice-engineering-near-zero-leakage-pii-redaction-for-judicial-ai-at-national-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ironclad-anonymization.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/iso-27001-2025-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/it-s-just-an-agent-no-it-s-your-audit-control-why-dam-agents-are-now-regulated-infrastruct.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/joiner-mover-leaver-to-institutional-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/judicial-ai-at-scale-architecting-resilient-secure-and-governed-platforms-a-sovereign-infrastructure-blueprint-for-national-scale-judicial-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/judicial-ai-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/mergers-and-acquisitions-cyber-risk-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/modern-penetration-testers-playbook-mastering-burp-suite-pro-metasploit-custom-exploit-development-enterprise-security-engagements.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/modern-threat-detection-defender-for-cloud-sentinel-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at-scale-building-an-integrated-detection-analytics-platform.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/navigating-nca-ecc-saudi-arabia-national-cybersecurity-authority-essential-controls-penetration-testing-compliance-kingdom-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/navigating-nca-ecc-saudi-arabia.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/nis2-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/nist-800-53-rev5-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/offensive-security-in-practice-comprehensive-framework-penetration-testing-web-api-infrastructure-methodology-governance-flagship-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/offensive-security-in-practice.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-doctrine-for-responsible-ai-engineering-the-engineering-playbook-for-operationalising-ai-ethics-at-enterprise-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-doctrine-for-responsible-ai-engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-resilience-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-resilience-by-design-engineering-zero-downtime-operations-disciplined-change-management-and-validation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-resilience-by-design-the-governance-doctrine-for-essential-entity-survival.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-resilience-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-resilience-under-regulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational-technology-security-under-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security-perimeter-doctrine-level-implementation-framework-for-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operationalising-zero-trust-in-microsoft-cloud.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/owning-the-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/patch-pray-repeat-why-traditional-linux-security-fails-at-scale-engineering-cis-hardened-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/post-quantum-readiness-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/prevention-is-dead-the-rise-of-resilience-based-ai-risk-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/prevention-is-dead.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/privileged-access-as-regulated-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/privileged-users-don-t-need-malware-they-need-sql-access-the-insider-threat-doctrine-for-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/product-security-as-doctrine-board-grade-model-cra-nis2-sbom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/product-security-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/provable-autonomy-the-governance-architecture-for-mission-critical-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/provable-autonomy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/quantum-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/red-team-insights-blue-team-resilience-purple-team-methodology-closing-detection-response-gap-enterprise-security-operations-centre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/red-team-insights-blue-team-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/regulation-as-code-operationalising-cra-nis2-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/regulation-as-code.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/regulatory-confidence-engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-armageddon-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-by-design-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-command-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-reckoning-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-redlines.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilience-regime-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilient-runways-deterministic-network-architecture-for-air-traffic-fault-tolerant-network-fabrics-for-aviation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilient-runways.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption-embedding-threat-modelling-and-ma-cyber-due-diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/risk-driven-cloud-migration-secure-azure-adoption.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sabsa-centric-enterprise-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sabsa-for-supply-chain-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/saviynt-iga-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/saviynt-sod-new-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sdf-board-governance-infographic-v5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/secure-azure-platforms-for-government-defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/secure-by-default-azure-architecture-for-high-sensitivity-environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/secure-by-design-prove-by-evidence-product-security-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/secure-by-design-prove-by-evidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises-prescriptive-architecture-patterns-for-multi-subscription-estates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-azure-at-scale-zero-trust-blueprint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-generative-ai-in-schools-a-red-team-driven-framework-for-safeguarding-compliance-and-risk-reduction.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-generative-ai-in-schools.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-azure-transformation-journey-embedding-security-from-strategy-to-execution-a-comprehensive-transformation-security-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-azure-transformation-journey.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture-mcra-in-ksa-enterprises-a-practitioner-level-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-sands-mcra-implementation-in-ksa-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-skies-zero-trust-micro-segmentation-in-aviation-ot-it-policy-driven-network-isolation-for-aviation-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-skies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security-assurance-in-azure-transformation-programmes-frameworks-controls-and-governance-a-comprehensive-enterprise-assurance-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security-assurance-in-azure-transformation-programmes.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security-reporting-that-drives-action-translate-technical-penetration-test-findings-board-level-risk-decisions-executive-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security-reporting-that-drives-action.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/simulating-the-adversary-tiber-eu-dora-tlpt-threat-led-penetration-testing-financial-services-sector-architecture-framework-flagship-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/simulating-the-adversary.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure-architecture-satisfying-kingdom-sovereignty-requirements.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sovereign-cloud-security-in-saudi-arabia.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/strategic-resilience-command.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/synthetic-intelligence-as-a-service-orchestrating-the-judicial-api-ecosystem-designing-the-api-layer-for-national-judicial-intelligence-services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/synthetic-intelligence-as-a-service.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/tabletop-to-reality.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/testing-modern-attack-surface-cloud-container-api-mobile-security-validation-post-perimeter-enterprise-architecture-governance-flagship-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/testing-the-modern-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/testing-the-system-not-the-slides.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-10m-query-how-one-unmonitored-database-action-becomes-board-level-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-2035-breakpoint-ai-cryptographic-collapse-and-the-end-of-voluntary-security-models.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-2035-breakpoint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-247-soc-optimising-siem-soar-workflows-real-time-threat-detection-incident-response-financial-services-operations-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-247-soc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-4-hour-clock-board-liability-in-the-age-of-dora-nis2-and-ai-regulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-4-hour-clock.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-600-a-day-fixer-why-fragile-dam-estates-need-senior-engineering-not-more-dashboards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-ai-attack-surface-autonomous-agents-tool-misuse-and-the-rise-of-machine-speed-e.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-ai-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-ai-threat-why-database-attacks-no-longer-look-human-detecting-autonomous-sql-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-autonomy-protocol-governing-non-human-identities-in-the-autonomous-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-autonomy-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-risk-doctrine-board-level-control-of-autonomous-ai-before-it-controls-you.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-risk-doctrine-tech-specs-pdf.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-risk-doctrine-tech-specs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-agentic-risk-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ai-driven-threat-frontier.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ai-security-assurance-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-api-first-ai-state-reusable-intelligence-services-for-government-designing-composable-ai-services-for-cross-government-interoperability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-api-first-ai-state.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-architecture-of-accountability-designing-observability-and-compliance-into-ai-building-auditable-transparent-and-compliant-ai-from-the-ground-up.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-architecture-of-accountability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-audit-trail-is-now-a-battlefield-how-dam-telemetry-became-the-primary-evidence-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-auditory-record-architecting-sovereign-fidelity-in-automated-judicial-transcription-a-doctrine-level-blueprint-for-national-scale-speech-sovereignty.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-auditory-record.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-boardroom-cyber-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-breach-report-starts-with-one-missing-audit-event-how-a-single-dam-telemetry-gap-becom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ciso-autonomy-mandate-command-control-and-governance-for-agentic-ai-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ciso-autonomy-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ciso-identity-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ciso-transformation-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-conformity-advantage-product-security-as-differentiator.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-conformity-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-continuity-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-database-was-monitored-then-show-me-the-evidence-the-evidence-chain-model-for-dam-audi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-defensible-ciso-an-evidence-based-ai-risk-doctrine-for-regulatory-and-board-assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-defensible-ciso.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-future-of-privileged-access-zsp-jit-vault-architecture-securing-administrative-power-in-high-trust-environments-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-future-of-privileged-access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-governance-deficit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-governance-premium-repricing-cyber-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-governance-premium.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-control-plane-zero-trust-governance-for-agentic-ai-and-regulated-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-hegemony.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-moat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-utility-architecting-global-iam-as-foundational-gxp-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-identity-utility.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-institutional-liability-doctrine-governance-as-legal-infrastructure-in-the-autonomous-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-institutional-liability-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-integration-imperative.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-last-mile-of-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-logs-were-there-the-detection-wasn-t-closing-the-siem-to-dam-telemetry-gap-that-hides-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-modern-penetration-testers-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-n-ary-mandate-using-hyperedge-knowledge-graphs-to-eliminate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-n-ary-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-ofgem-compliance-paradox.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-regulatory-product-security-doctrine-audit-proof-software-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-regulatory-product-security-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-regulatory-readiness-playbook-cra-nis2-engineering-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-regulatory-readiness-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-resilience-mandate-engineering-stability-in-national-transcription-systems-operational-resilience-engineering-for-mission-critical-judicial-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-resilience-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-responsible-core-institutionalizing-evaluation-and-ethical-guardrails-in-government-llms-a-governance-framework-for-responsible-ai-deployment-in-public-sector.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-responsible-core.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sabsa-board-reporting-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sabsa-sovereignty-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sap-payroll-transformation-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-semantic-gavel-precision-llm-summarisation-in-high-stakes-litigation-engineering-legal-grade-ai-summarisation-for-court-proceedings.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-semantic-gavel.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-silent-breach-layer-why-banks-still-can-t-see-their-database-risk-the-hidden-cost-of-d.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-six-month-turnaround-rescuing-imperva-dam-before-it-becomes-the-risk-a-26-week-operati.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-banking-protocol-architecting-regulatory-controlled-pam-grc-autonomous-defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-banking-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-courtroom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-defensibility-framework-full.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-defensibility-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-sovereign-zero-trust-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-trust-fabric-identity-network-and-governance-in-one-security-model-converging-iam-and-policy-governance-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-trust-fabric.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-unified-shield-architecting-detection-and-response-with-microsoft-defender-and-sentinel-converging-xdr-and-siem-for-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-unified-shield-defender-sentinel-convergence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-velocity-mandate-ciso-architecture-for-the-zero-latency-agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-velocity-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-zero-hour-doctrine-how-leaders-prevent-institutional-collapse-in-the-age-of-algorithmic-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-zero-hour-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat-detection-through-offensive-testing-red-team-operations-expose-siem-gaps-harden-detection-rules-real-time-response-capability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat-detection-through-offensive-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat-intelligence-integration-within-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat-management-for-24x7-operations-networks-detection-engineering-and-soc-runbooks-for-critical-infrastructure-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat-management-for-24x7-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise-azure-environments-five-stage-quantified-assessment-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/trust-nothing-verify-everything-zero-trust-maturity-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/viewer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/we-have-imperva-good-now-prove-it-works-the-six-pillar-operational-assurance-framework-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/web-application-security-in-depth-owasp-top-10-business-logic-flaws-zero-day-discovery-penetration-testing-framework-practitioners.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/web-application-security-in-depth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/why-ai-pilots-fail-under-regulatory-scrutiny-the-90-day-control-architecture-for-enterprise-deployment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/why-ai-pilots-fail-under-regulatory-scrutiny.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/your-siem-didn-t-fail-your-data-strategy-did-rebuilding-the-detection-stack-from-the-datab.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-hour-doctrine-publisher-abstract-v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-hour-doctrine-publisher-abstract.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-latency-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-ai-architecture-securing-autonomous-agents-apis-and-decision-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-ai-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-identity-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-identity-governance-and-administration-iga.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-identity-governance-iga.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-segmentation-for-airport-24x7-operations-networks-cisco-aci-and-ngfw-reference-architecture-prof-kieran-upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-segmentation-for-airport-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust-transformation-with-sabsa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.85</priority>
  </url>

  <!-- ++ /docs/read/ full-text read-online pages ++ -->
  <url>
    <loc>https://kieparis.fr/docs/read/01-operationalising-ot-cyber-risk-a-board-to-plant-floor-operating-model-translating-risk-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/01-operationalising-ot-cyber-risk-a-board-to-plant-floor-operating-model-translating-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/01_Operationalising_OT_Cyber_Risk__A_Board-to-Plant-Floor_Operating_Model_Translating_Risk_Appetite_into_PLC_Configuration__v4.1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/02-from-compliance-to-control-a-clause-by-clause-engineering-crosswalk-between-iec-62443-3.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/02_From_Compliance_to_Control__A_Clause-by-Clause_Engineering_Crosswalk_Between_IEC_62443-3-3_DORA_Chapter_III_and_NIS2_Article_21__v4.1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/03-industrial-cyber-resilience-by-design-cyber-physical-systems-under-iec-61511-functional.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/03_Industrial_Cyber_Resilience_by_Design__Cyber-Physical_Systems_Under_IEC_61511_Functional_Safety_and_Adversarial_Cyber_Stress__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/04-engineering-survivable-ot-architectures-iec-62439-3-prp-hsr-graceful-degradation-and-is.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/04_Engineering_Survivable_OT_Architectures__IEC_62439-3_PRP-HSR_Graceful_Degradation_and_Island-Mode_Under_Adversarial_Compromise__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/05-quantifying-ot-risk-a-transparent-monte-carlo-method-for-translating-scada-ics-and-dcs-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/05-quantifying-ot-risk-a-transparent-monte-carlo-method-for-translating-scada-ics-and-dcs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/05_Quantifying_OT_Risk__A_Transparent_Monte_Carlo_Method_for_Translating_SCADA_ICS_and_DCS_Threats_into_Defensible_Capital_Decisions__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/06-design-authority-for-industrial-networks-a-charter-operating-model-and-conflict-resolut.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/06_Design_Authority_for_Industrial_Networks__A_Charter_Operating_Model_and_Conflict-Resolution_Framework_for_IT-OT_Convergent_Network_Governance__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/07-enterprise-network-architecture-for-ot-evolving-purdue-modbus-dnp3-cip-dpi-micro-segmen.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/07_Enterprise_Network_Architecture_for_OT__Evolving_Purdue_—_Modbus-DNP3-CIP_DPI_Micro-Segmentation_and_IIoT_Vendor_Access__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/08-designing-hybrid-ot-connectivity-azure-aws-edge-and-data-centre-integration-under-laten.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/08_Designing_Hybrid_OT_Connectivity__Azure_AWS_Edge_and_Data-Centre_Integration_Under_Latency_and_Sovereignty_Constraints__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/09-governing-multi-vendor-network-architectures-in-critical-infrastructure-sboms-dora-ctpp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/09_Governing_Multi-Vendor_Network_Architectures_in_Critical_Infrastructure__SBOMs_DORA_CTPP_and_Vendor-Governance_for_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/10-industrial-network-resilience-profinet-irt-iec-61850-goose-bgp-mpls-failover-and-determ.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/10_Industrial_Network_Resilience__PROFINET_IRT_IEC_61850_GOOSE_BGP-MPLS_Failover_and_Deterministic_Networking_for_Mission-Critical_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/11-zero-trust-for-ics-in-practice-identity-aware-overlays-protocol-proxies-and-lateral-mov.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/11_Zero_Trust_for_ICS_in_Practice__Identity-Aware_Overlays_Protocol_Proxies_and_Lateral-Movement_Defeat_for_Headless_Industrial_Devices__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/12-industrial-segmentation-reimagined-static-vlans-to-software-defined-plant-networks-with.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/12_Industrial_Segmentation_Reimagined__Static_VLANs_to_Software-Defined_Plant_Networks_with_Risk-Based_OT-Aware_Peer-to-Peer_Zones__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/13-designing-the-industrial-dmz-reverse-proxies-jump-servers-dual-homed-historians-and-dat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/13_Designing_the_Industrial_DMZ__Reverse_Proxies_Jump_Servers_Dual-Homed_Historians_and_Data_Diodes_—_Engineering_the_IT-OT_Trust_Boundary__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14,400 seconds to comply - the sovereign ciso doctrine and the future of corporate cyber governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14-400-seconds-to-comply-the-sovereign-ciso-doctrine-and-the-future-of.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14-identity-and-privileged-access-in-ot-break-glass-procedures-just-in-time-vendor-access-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14-identity-and-privileged-access-in-ot-break-glass-procedures-just-in-time-vendor-access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14400-seconds-to-comply-incident-response-doctrine-for-the-sovereign-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14400-seconds-to-comply-the-sovereign-ciso-doctrine-and-the-future-of-corporate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14400-seconds-to-comply.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14400_Seconds_to_Comply_Incident_Response_Doctrine_for_the_Sovereign_Enterprise_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_K_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/14_Identity_and_Privileged_Access_in_OT__Break-Glass_Procedures_Just-in-Time_Vendor_Access_and_the_MFA_Constraint_on_the_Plant_Floor__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/15-designing-active-active-active-architectures-for-scada-and-adms-distributed-c.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/15-scada-adms-active-active-active-v4-0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/15_SCADA_ADMS_Active-Active-Active_v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/16-failover-without-failure-engineering-sub-millisecond-continuity-in-industrial-control-s.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/16_Failover_Without_Failure__Engineering_Sub-Millisecond_Continuity_in_Industrial_Control_Systems_Using_IEC_62439-3_PRP-HSR__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/17-dependency-mapping-in-ot-systems-eliminating-hidden-single-points-of-failure-through-pa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/17_Dependency_Mapping_in_OT_Systems__Eliminating_Hidden_Single_Points_of_Failure_Through_Passive_Discovery_and_Graph_Analysis__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/18-sacda-architecture-for-modern-industry-formal-specification-of-the-safe-autonomous-conn.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/18_SACDA_Architecture_for_Modern_Industry__Formal_Specification_of_the_Safe_Autonomous_Connected_Distributed_Edge-Native_Architecture__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/19-sacda-resilience-engineering-run-time-operationalisation-of-the-autonomous-edge-local-c.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/19_SACDA_Resilience_Engineering__Run-Time_Operationalisation_of_the_Autonomous_Edge_—_Local_Control_and_Telemetry_Queuing__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/20-industrial-transformation-without-downtime-ships-in-the-night-architecture-and-choreogr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/2026 cyber risk reset- liability is the new attack surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/2026-cyber-risk-reset-liability-is-the-new-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/2035-breakpoint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/20_Industrial_Transformation_Without_Downtime__Ships-in-the-Night_Architecture_and_Choreographed_Cut-Over_for_24-7_Industrial_Estates__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/21-the-unified-industrial-resilience-model-a-mathematically-specified-empirically-calibrat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/21_The_Unified_Industrial_Resilience_Model__A_Mathematically-Specified_Empirically-Calibrated_System_Unifying_the_Doctrine__v4.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/4-hour-clock-board-liability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/A Pentest Finds Holes Adversary Emulation Proves Whether Defence Wakes Up - From Scope Bound Pentests To TIBER EU Threat Led Emulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/AI Governance Meets Cyber Governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/AI_Copilots_for_Compliance_What_to_Automate_What_to_Gate_What_to_Forbid_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/AI_Governance_and_Security_Architecture_Embedding_ISO42001_Within_SABSA_EU_AI_Act_High_Risk_AI_Management_System_Enterprise_Compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/AI_That_Survives_Court_Daubert_FRE_702_Defense_Doctrine_for_AI_Evidence_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/API_Shadows_and_Phantom_Queries_Securing_Non-Human_Database_Identities_in_the_Cloud_Era_Behavioural_Identity_for_Service_Accounts_APIs_and_Batch_Workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/AUDIT-PROOF RESILIENCE DOCTRINE - Engineering Verifiable NIST-Aligned Disaster Recovery for High-Trust Institutions - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Adaptive_Authentication_at_Bank-Grade__Risk-Based_MFA_Engineered_to_Real-Time_Financial_Threat_Models_-_A_Decisioning_Doctrine_for_Authentication.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Agent_Sprawl_Policy_Drift_False_Assurance_The_Hidden_Failure_Modes_of_Imperva_DAM__A_Field_Doctrine_for_Recovering_Hardening_and_Operationalising.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Alert Fatigue Is Bankrupting Cybersecurity Teams - Recapitalising Operations Through Triage Doctrine Signal Engineering and Decision Rights.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Aligning_SABSA_with_EU_Regulatory_Frameworks_Practitioner_Guide_NIS2_DORA_GDPR_Multi_Framework_Architecture_Compliance_Convergence_Strategy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Always-On_Identity__Active-Active_Federation_with_Zero_Regional_Dependency_-_A_Resilience_Doctrine_for_Tier-0_Banking_Infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Are We Exposed - The Seven Minute Board Answer When A Named CVE Or Sector Incident Lands In The Chairmans Inbox - Operational Artefacts Edition for Tier-1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Assurance Under Pressure - Delivering Regulatory-Grade Cyber Outcomes Against Fixed Deadlines in Mission-Critical Environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Attackers Dont Hack In Anymore They Log In - The Identity First Defensive Doctrine For Credentialled Intrusions - Institutional Doctrine Aligned to DORA.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Audit-Ready by Design - Embedding Continuous Compliance into High-Consequence Operating Environments Without Slowing the Business.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Audit_Response_and_v4_0_Differentiation_Specification_From_8_8_to_10_Per_Volume_Mandate_Sovereign_Doctrine_Series_Canonical_White_Paper_Edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Auditing_the_SABSA_Framework_Achieving_ISO27001_Compliance_Through_Architecture_Led_Assurance_Enterprise_Audit_Governance_Certification_Readiness.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Automation at Scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/BCP BATTLE DOCTRINE - Resilience Frameworks That Compel Executive Buy-In and Budget Allocation - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/BCP BLACK SWAN DOCTRINE - Engineering Continuity Systems That Sustain GBP 10B+ Operational Exposure Without Failure - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Beyond Perimeter Security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Beyond Tick-Box Security - Engineering Defensible Assurance Outcomes Under NIS and Ofgem Oversight at National Enterprise Scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Beyond_Compliance_How_SABSA_Transforms_Security_Architecture_into_Business_Value_ROI_Competitive_Advantage_Procurement_Board_Confidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Beyond_RBAC__Attribute-Driven_Authorisation_for_Cloud-Scale_Financial_Data_Systems_-_A_Doctrine_for_Dynamic_Entitlement_at_Petabyte_Scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Board-Grade Cyber Resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Boards Still Dont Understand Cyber Risk - Translating Operational Telemetry into Fiduciary Decision Making Under DORA NIS2 and ISO 42001.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Break-Glass_That_Never_Closed_Governing_Emergency_Database_Access_After_the_Incident_Ends_Lifecycle_Governance_for_Temporary_Privilege_and_Crisis_Exceptions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Bridging Strategy and Execution - Building Cyber Risk Governance That Holds in Energy and Utilities Regulated Operating Environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Bridging Strategy and Execution.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Building_Resilient_Architectures_SABSA_Applied_Critical_Infrastructure_Protection_NIS2_IEC62443_NIST_CSF_Operational_Continuity_Defence_Strategy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/CAF in Practice - Designing, Executing and Defending Cyber Assessment Campaigns End-to-End Under Full Regulator Oversight.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/CYBER RESILIENCE AS A REVENUE ENGINE - Converting ISO 27001 and NIST Compliance into Contract-Dominating Capability - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cisco ACI Deep Dive.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Citrix NetScaler and F5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Clinical_Data_Sovereignty_AEGIS_US_EU_UK_APAC_Conflict_Resolution_and_Arbitration_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cloud_Security_Architecture_Under_SABSA_Navigating_Multi_Cloud_Complexity_NIS2_Alignment_Enterprise_Cloud_Security_Doctrine_Regulated_Sector.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Compliance Is Not Resilience Prove The Business Can Survive - The Recoverability Mandate Doctrine Under DORA Article 11 - Polished Operational Artefact for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Compliance Wont Save You Operational Resilience Will - From Tick Box Audit to Proven Survival DORA NIS2 and Architecture of Defensible Continuity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Compliance_Passed_Security_Failed_The_Operational_Reality_Gap__The_Operational_Reality_Gap_Between_PCI_DSS_SOX_Attestations_and_Database_Threat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Continuous_Identity_Assurance__Automated_Testing_Observability_and_Runtime_Validation_of_IAM_Systems_-_A_Doctrine_for_Always-Verified_Control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cyber Governance for the Regulated Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cyber Maturity as a Currency - Redefining Assurance Through NIS2 and CAF Self-Assessment Frameworks for Regulated Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cyber Resilience in Operational Technology - Meeting Ofgem Expectations Without Slowing the Grid in Energy and Utilities Environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cyber Risk Is Now a Revenue Problem - Acquisition Velocity Underwriter Behaviour and Repricing of Cyber Posture in M and A and Capital Markets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Cybersecuritys AI Arms Race Has Already Started - Adversarial Models Defensive Reflexes and the Strategic Repricing of Cyber Risk Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/DORA_Aligned_Architecture_Using_SABSA_to_Meet_Digital_Operational_Resilience_Requirements_Financial_Sector_ICT_Risk_TLPT_Incident_Reporting.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/DORA_Will_Expose_Your_Data_Layer_Are_You_Ready__A_Board-Level_Readiness_Doctrine_for_Database_Resilience_Under_the_Digital_Operational_Resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/DR DOCTRINE 2026 - Engineer Institutional Survival or Accept Regulatory Failure - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/DRP WEAPONISATION DOCTRINE - ISO 27001-Aligned Recovery Kill-Chains That Withstand Regulatory Forensics - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Data_Governance_and_Security_Architecture_Applying_SABSA_to_GDPR_Data_Protection_Obligations_Sovereignty_Privacy_by_Design_Regulated_Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Database_Monitoring_Is_Broken_And_Regulators_Are_About_to_Notice__A_DORA_NIS2_and_PRA-Aligned_Doctrine_for_Data_Layer_Visibility_in_European.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Designing Cyber-Resilient Airport Networks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Detection Engineering Is Replacing Traditional SOC Operations - Hypothesis Led Detection Provable Coverage and Science of Adversary Specific Surfaces.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Digital Resilience by Design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Doing More With Less - Delivering Enterprise-Grade Cyber GRC in Lean and Resource-Constrained Regulated Infrastructure Teams.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Domain Admin Is Not An Entitlement It Is A Loaded Weapon - Tiered Administration And Just In Time Privileged Elevation - Institutional Doctrine Aligned to.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Dont Debate The Ransom While The Malware Is Still Running - Pre Signed Ransomware Decision Authorities And Recovery Tempo.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Drowning_in_Logs_Starving_for_Signals_The_DAM-to-SIEM_Crisis_Inside_Financial_Services__Engineering_High-Signal_Detection_Pipelines_from_Imperva_to.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Eliminating_Credentials__FIDO2_as_Primary_Authentication_in_Tier-1_Banking_-_A_Deployment_Doctrine_for_the_Post-Password_Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/End-to-End Cyber Governance - Owning Risk, Assurance and Delivery Across Regulated Infrastructure Environments with Conviction.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Enterprise Firewall Modernisation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Event-Driven_Identity__SCIM_PingIDM_and_the_Real-Time_Synchronisation_Doctrine_for_Hybrid_and_Multi-Cloud_Banking_Estates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Evidence Over Opinion - Building Cyber Programmes That Prove Rather Than Claim Compliance to Regulators, Auditors and Boards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/FROM COMPLIANCE TO COMMAND AUTHORITY - Weaponising ISO 27001 and NIST for Enterprise Disaster Recovery Supremacy - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Federation-First_Modernisation__Converting_WebSphere_and_WebLogic_Estates_into_Standards-Based_Identity_Consumers_-_A_Decommissioning_Doctrine_for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Financial-Grade_API_Security__FAPI-Compliant_OAuth2_Architectures_for_Regulated_Banking_-_A_Doctrine_for_Open-Finance-Ready_Institutions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/From Audit to Advantage - Turning NIS and CAF Compliance into Strategic Resilience Capability and Sustained Commercial Leverage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/From Compliance to Resilience - Operationalising NIS2 and CAF into Measurable Cyber Maturity for Critical National Infrastructure Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/From Playbooks to Performance - Uplifting Incident Response Capability in NIS-Regulated Environments to Operational Command Standard.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/From_DPIA_to_Decision_Engine_Machine_Readable_DPIA_Doctrine_DECIDE_Framework_Clinical_Workflow_Automation_Sovereign_Doctrine_Canonical_White_Paper.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/From_Regulation_to_Runtime_The_Sovereign_Compliance_Operating_System_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta_2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Governing_Cyber_Risk_SABSA_Based_Board_Level_Accountability_Risk_Appetite_Architecture_Governance_Regulated_Enterprise_NIS2_DORA_Oversight.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Hardening_the_Vault_Turning_Imperva_Logs_Into_Board-Level_Risk_Intelligence__From_Raw_DAM_Telemetry_to_Strategic_Risk_Reporting_for_the_Audit_and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/High-Availability and Disaster Recovery.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/INSTITUTION-GRADE RECOVERY DOCTRINE - Building ISO 27001 and NIST Systems That Secure Contracts and Withstand Systemic Failure - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/INSTITUTIONAL DR MANDATE - CISO Doctrines That Command Premium Engagements and Board-Level Authority - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ISO 27001 2025 RESILIENCE DOCTRINE - Replacing Compliance Theatre with Institutional-Grade Operational Steel - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Identity Is the New Perimeter.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Identity-as-Code__A_Doctrine_for_Versioning_Testing_and_Deploying_Federation_Infrastructure_via_CI-CD_-_From_Manual_IAM_to_Engineered_Identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Identity_as_the_Primary_Enforcement_Layer__Unifying_Endpoint_Network_and_Access_Decisioning_-_A_Doctrine_for_Policy_Singularity_Across_the.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/If The Attacker Has Automation And You Have Manual Triage Youve Already Lost Tempo - Closing The MTTD Gap - Doctrine Paper for Board CISO and Audit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Implementing_SABSA_Complex_Enterprise_Environments_Practitioners_Field_Guide_Multi_Cloud_Hybrid_Legacy_Architecture_Led_Deployment_Strategy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Integrating_SABSA_Across_the_Enterprise_Multi_Framework_Architecture_ISO27001_NIS2_IEC62443_Unified_Security_Architecture_Regulatory_Compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/It_Is_Just_an_Agent_No_It_Is_Your_Audit_Control__Why_DAM_Agents_Are_Now_Regulated_Infrastructure_Under_DORA_Article_9_and_NIS2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Kubernetes_and_the_Crown_Jewels_Modernising_Database_Monitoring_for_Containerised_Data_Platforms_Cloud-Native_Data_Telemetry_for_Dynamic_Workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/MFA That Can Be Proxied Is Not Strong Authentication - Phish Resistant FIDO2 Webauthn And Passkey Migration Doctrine - Doctrine Paper for Board CISO and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Machine_Identity_at_Scale__Governing_Non-Human_and_AI_Identities_Across_Global_Banking_Infrastructure_-_A_Doctrine_for_the_Autonomous_Estate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Mergers_and_Acquisitions_Cyber_Risk_SABSA_Based_Due_Diligence_Framework_AICE_Architecture_Integration_Security_Assessment_Deal_Lifecycle.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Most Enterprises Can Detect Threats Very Few Can Operationally Survive Them - The Recoverability Mandate Engineering Survival Velocity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Most SOCs Are Built for Yesterdays Threats - Architectural Debt Surface Migration and Re Foundationing the Operations Floor for 2027 Adversaries.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/NIST 800-53 REV.5 RESILIENCE DOCTRINE - Enforcing DORA and NIS2 Non-Negotiables at Institutional Scale - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/OPERATIONAL RESILIENCE AS DOCTRINE - Architecting Zero-Failure Enterprises Under NIST and ISO 27001 Mandate - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Operational Resilience Under Regulation - Translating CAF Assessments into Executive-Grade Decision Intelligence for Regulated Boards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Operational_Technology_Security_Under_SABSA_Bridging_IT_OT_Convergence_IEC62443_NIS2_Industrial_Control_Systems_Critical_Infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Owning the Risk - Engineering Risk Registers That Drive Board-Level Cyber Decisions in Critical National Infrastructure Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Patch_Pray_Repeat_Why_Traditional_Linux_Security_Fails_at_Scale__Engineering_CIS-Hardened_Immutable_Linux_Estates_for_Regulated_Database.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Payload_Denied_Why_Ransomware_Fails_When_the_Database_Refuses_to_Serve_The_Data_Layer_Refusal_Mechanism_for_Active_Loss_Prevention.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Policy-as-Code_at_Runtime__OGNL-Driven_Federation_Routing_and_Dynamic_Authorisation_Decisions_at_Transactional_Scale_-_A_Doctrine_for_Engineered.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Post-Merger_Identity_Consolidation__Using_Federation_to_Abstract_and_Control_Multi-Forest_Directory_Estates_-_A_Doctrine_for_MandA_Cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Post_Quantum_Readiness_Architecting_Cryptographic_Agility_with_SABSA_NIST_FIPS_203_204_205_PQC_Migration_Enterprise_Resilience_Strategy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Privacy Operations Are Becoming Frontline Cybersecurity - Data Lineage Sovereignty Subject Right Latency Privacy Resilience Convergence Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Privileged_Users_Do_Not_Need_Malware_They_Need_SQL_Access__The_Insider_Threat_Doctrine_for_Imperva_DAM_and_Privileged_Database_Activity_Monitoring.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Prohibited_vs_Restricted_TRIAGE_Classifier_Doctrine_for_DOJ_28_CFR_202_Decisions_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE ARMAGEDDON DOCTRINE - DRP Architectures for Post-CRA Institutional Survival and Continuity Supremacy - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE BY DESIGN DOCTRINE - Engineering Self-Healing Infrastructure Under NIST CSF and ISO 27001 Control Regimes - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE COMMAND DOCTRINE - NIST and ISO Aligned Disaster Recovery That Eliminates Regulatory Exposure - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE RECKONING DOCTRINE - Board-Level Mandates That Enforce Continuity Under Systemic Risk - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE REDLINES - The NIST-Aligned Survival Doctrine Every Accountable CISO Must Enforce - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RESILIENCE REGIME DOCTRINE - NIST and ISO-Aligned CISO Mandates for Elite Institutional Engagements - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Regulators Dont Care That The Spreadsheet Is Green - Why Control Attestation Without Evidence Grade Testing Fails DORA NIS2 Supervision.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Regulatory Confidence Engineering - Designing Cyber Programmes Built to Withstand NIS and Ofgem Scrutiny Without Blinking.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Resilient Runways.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/RnD_Data_Governance_in_the_Age_of_Geopolitics_Geopolitical_Doctrine_COMPASS_Framework_Compliance_as_Strategic_Capability_Sovereign_White_Paper.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/SABSA_Centric_Enterprise_Security_Architecting_NIS2_Ready_ISO27001_Aligned_Resilience_at_Scale_Institutional_Architecture_Doctrine_Regulated_Enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/SABSA_for_Supply_Chain_Security_Architecting_Resilience_Across_Third_Party_Ecosystems_NIS2_DORA_ISO27001_Vendor_Risk_Architecture_Strategy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/SOC20 Master Reference Card - Strategic Reference for Tier-1 Banks CNI Operators Insurers and Public-Sector Boards Operating Under Regulatory Scrutiny.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/STRATEGIC RESILIENCE COMMAND - Converting BCP and DRP into Executive-Level Risk Control and Revenue Protection Systems - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Securing the Skies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Security Teams Are Drowning in Telemetry - Volumetric Discipline Schema Sovereignty and Why Less Data Will Save the Modern SOC Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Shadow_Databases_Real_Liability_Discovering_and_Governing_the_Databases_Nobody_Admits_Exist_Continuous_Discovery_as_a_Board-Level_Control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Stop Sending Me 50000 Vulnerabilities Tell Me Which Five Matter - Engineering The Prioritisation Function The Board Can Sign.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/THE CONTINUITY DOCTRINE - Unifying BCP DRP and Cyber Resilience into a Single Operational Command System - Enterprise Resilience Sovereign Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Tabletop to Reality - Designing High-Fidelity Cyber Exercises That Demonstrably Improve Resilience in Regulated Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Terminology_Translation_Table__Addendum_to_Paper_21_-_Mapping_Prior-Paper_Vocabulary_Ingestion_Synchronisation_Observation_Orchestration_to_the.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Testing the System Not the Slides - Advanced Tabletop Methodologies for Operators of Essential Services Under NIS Regulatory Oversight.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Autonomous SOC Is No Longer Optional - Decision Rights Provable Autonomy and the Architecture of Trust at Machine Speed Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Board Doesnt Need Dashboards It Needs Decisions - Decision Grade Cyber Reporting For Regulated Boards And Risk Committees.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Breach Hurts The Bad Response Destroys Trust - Engineering The Disclosure And Remediation Choreography That Protects Franchise Value.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Cloud Provider Owns The Platform You Own The Misconfiguration - Operationalising Shared Responsibility - Operational Artefacts Edition for Tier-1 Banks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Death of Manual Incident Response - Closed Loop Containment Evidence First Forensics and the End of the Heroic Analyst Model Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Enterprises Winning Cybersecuritys AI Era All Operate Differently - Operating Model Doctrine for Institutions to Compound Advantage Over the Next Decade.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Future SOC Will Be Smaller Faster and AI Led - Operating Model Re Architecture for the Compressed Defence Loop Industrial Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Future of Privileged Access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Last Mile of Cyber Governance - Where NIS Programmes Fail and How to Engineer Assurance That Holds Under Regulator Pressure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Next Cyber Breach Wont Look Like the Last One - Adversary Decomposition Pattern Drift and Why Historical Playbooks Are Now a Liability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Ofgem Compliance Paradox - Moving from Checkbox Security to Measurable Risk Reduction Across Regulated Energy Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Real Cost of Weak Security Operations Its Not the Breach Its the Exposure Time - Pricing Operational Latency as a Fiduciary Loss Class.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Trust Fabric.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The Window of Exposure Is Killing Enterprise Security - Time to Detect Time to Decide Time to Recover Engineering the Three Clock Defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_36_Hour_Compliance_Model_Thirty_Six_Hour_Velocity_Doctrine_VELOCITY_Framework_for_Regulated_Decisioning_Sovereign_Doctrine_Canonical_Paper.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Agentic_AI_Attack_Surface_Attack_Surface_Doctrine_SENTINEL_Framework_for_Agentic_AI_Risk_Governance_Institution_Defining_Edition_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Agentic_AI_Threat_Why_Database_Attacks_No_Longer_Look_Human__Detecting_Autonomous_SQL_Adversaries_with_Imperva_DAM_and_Behaviour-Based_Analytics.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Audit_Trail_Is_Now_a_Battlefield__How_DAM_Telemetry_Became_the_Primary_Evidence_Surface_for_Regulator_Inquiry_and_Litigation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Authentication_Tier__Engineering_PingFederate_as_Tier-0_Financial_Infrastructure_-_A_Commercial_Doctrine_for_Sub-200ms_Federation_at_30M_Daily.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Autonomous_DBA_Is_Coming_Governing_AI-Assisted_Database_Administration_and_Self-Healing_Systems_Operational_Oversight_for_Machine-Driven_Database.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Boardroom_Ultimatum_Stop_Logging_Breaches_Start_Blocking_Loss_Active_Data-Layer_Enforcement_as_Board-Level_Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Breach_Report_Starts_With_One_Missing_Audit_Event__How_a_Single_DAM_Telemetry_Gap_Becomes_a_GBP200M_Regulatory_Settlement.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_CISOs_Ledger_Proving_Database_Security_ROI_Before_the_Breach_CFO-Ready_Loss-Aversion_Economics_for_Database_Monitoring_Investment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Canonical_Evidence_and_Reproducibility_Doctrine_What_Every_Volume_Must_Prove_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Client_Data_Trust_Premium_How_Database_Monitoring_Creates_Pricing_Power_and_Retention_Margin_Trust_as_a_Quantifiable_Database-Backed_Commercial_Asset.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Compliance_Edge_Turning_Database_Security_into_a_Sales_Weapon_Evidence-Led_Differentiation_in_Enterprise_Vendor_Reviews_and_RFP_Cycles.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Data_Heist_Kill_Chain_Mapping_Attacker_Progression_from_Identity_Compromise_to_Monetisation_An_End-to-End_Operating_Model_for_Stopping_Data_Theft.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Data_Risk_Engine_Unified_Data_Risk_Engine_Doctrine_NEXUS_Framework_for_National_Security_and_Privacy_Institution_Defining_Edition_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Data_Sovereignty_Control_Room_Operating_Model_for_Cross-Border_Data_Governance_Sovereignty_as_a_Live_Operational_Discipline_Not_a_Map.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Database_Was_Monitored_Then_Show_Me_the_Evidence__The_Evidence_Chain_Model_for_DAM_Audit_Defensibility_Before_Regulators_and_Boards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Day-Zero_M_and_A_Database_Risk_Deploying_Database_Monitoring_as_a_Day-One_Acquisition_Control_Inherited_Breach_Debt_and_the_Cyber_Due_Diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Ephemeral_Vault_Securing_Databases_That_Exist_for_Minutes_Not_Months_Continuous_Control_for_Short-Lived_Auto-Scaling_Data_Infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Exception_Became_the_Exploit_Whitelist_Debt_Bypass_Rules_and_Untested_Policy_Exceptions_Exception_Burn-Down_as_a_Continuous_Security_Function.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Extortionists_Dead_End_Killing_Data_Heists_Before_the_Ransom_Note_Pre-Exfiltration_Defence_Doctrine_for_the_Modern_Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Frictionless_Laboratory_Frictionless_Security_Doctrine_PRISM_Framework_for_Science_Preserving_Clinical_Data_Controls_Sovereign_White_Paper.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_GBP10M_Query__How_One_Unmonitored_Database_Action_Becomes_Board-Level_Risk__A_Doctrine_for_Imperva_DAM_Audit_Integrity_Financial_Services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_GBP600-a-Day_Fixer_Why_Fragile_DAM_Estates_Need_Senior_Engineering_Not_More_Dashboards__A_Contract_Engineering_Doctrine_for_Imperva_Linux_and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Global_Transfer_Impact_Doctrine_ATLAS_Framework_Mastering_Schrems_II_and_Executive_Order_14117_Sovereign_Doctrine_Canonical_White_Paper.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Governance_Premium_Pricing_Underwriting_and_Deal_Economics_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta_2026_Q2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Identity_Control_Plane_Doctrine_SPIFFE_OIDC_PAM_and_Delegated_Agent_Identity_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Identity_Control_Plane_Doctrine__The_Master_Volume_of_the_Institutional_Doctrine_Series_-_A_Parent_Doctrine_Governing_Twenty_Papers_on.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Identity_Control_Plane_One-Page_Architecture_Diagram__Addendum_to_Paper_21_-_Visual_Map_of_the_Six-Layer_Doctrine_Spanning_Integration.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Identity_Control_Plane__Federation_as_Real-Time_Banking_Infrastructure_-_A_Doctrine_for_Operating_Identity_Across_1000_Regulated_Systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Integration_Factory__A_Java_Adapter_Framework_for_Industrial-Scale_Identity_Onboarding_of_SWIFT_Murex_and_Trading_Platforms_-_A_Doctrine_for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Logs_Were_There_The_Detection_Was_Not__Closing_the_SIEM-to-DAM_Telemetry_Gap_That_Hides_Privileged_Database_Compromise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Machine_Identity_Data_Heist_When_the_Attacker_Borrows_a_Machine_Not_a_Password_Compromise_Attribution_for_Non-Human_Actors_at_the_Data_Layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Practitioners_Manifesto_FORGE_Framework_Against_Advisory_Compliance_Models_Institution_Defining_Edition_Sovereign_Doctrine_White_Paper_K_U.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Prompt-to-SQL_Control_Gap_Governing_Enterprise_AI_Copilots_at_the_Database_Boundary_Two-Actor_Accountability_for_Prompt-Driven_Query_Workflows.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Revenue_Database_Is_Now_a_Risk_Asset_Securing_the_Systems_Where_Revenue_Becomes_Fragile_Operational_Resilience_Doctrine_for_Revenue-Bearing_Databases.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_SABSA_Board_Reporting_Framework_Communicating_Cyber_Risk_at_Executive_Level_NIS2_DORA_Governance_Risk_Appetite_Metrics_Oversight.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_SABSA_Sovereignty_Model_Unifying_NIS2_GDPR_IEC62443_Defensible_Architecture_Data_Sovereignty_Regulatory_Control_Enterprise_Security_Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Silent_Breach_Layer_Why_Banks_Still_Cannot_See_Their_Database_Risk__The_Hidden_Cost_of_DAM_Drift_Agent_Sprawl_and_Policy_Decay_in_Tier_1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Six-Month_Turnaround_Rescuing_Imperva_DAM_Before_It_Becomes_the_Risk__A_26-Week_Operational_Recovery_Plan_for_Fragile_DAM_Estates_in_Financial.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Sovereign_Data_Shield_The_Definitive_DOJ_28_CFR_202_Operational_Doctrine_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_K_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Supplier_Says_Secure_The_Database_Says_Prove_It_Verifying_Third-Party_Assurance_with_Telemetry_Supplier_Assurance_Verified_at_the_Data_Layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Unified_Regulatory_Framework_Unified_Operating_Model_Doctrine_ORACLE_Framework_Global_Pharma_and_AI_Compliance_Sovereign_White_Paper_2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/The_Zero_Hour_Doctrine_Zero_Hour_Institutional_Failure_Doctrine_AEON_Framework_for_Algorithmic_Systems_Institution_Defining_Edition_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Threat Management for 24x7 Operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Threat_Intelligence_Integration_Within_SABSA_Contextual_to_Operational_Defence_MITRE_ATT_CK_NIS2_Threat_Modelling_Architecture_Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Token_Issuance_as_a_Security_Boundary__Engineering_OAuth2_and_OIDC_Pipelines_for_Financial-Grade_Systems_-_A_Control-Plane_Doctrine_for_Issued.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Visibility Without Remediation Is Just A Better View Of The Fire - Engineering Remediation Velocity And MTTR Discipline - Evidence-Based Framework for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP01_The_Extortionists_Dead_End_Killing_Data_Heists_Before_the_Ransom_Note_Pre-Exfiltration_Defence_Doctrine_for_the_Modern_Enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP01_The_Extortionists_Dead_End_Killing_Data_Heists_Before_the_Ransom_Note_Pre-Exfiltration_Defence_Doctrine_for_the_Modern_Enterprise_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP01_The_Sovereign_Estate_Protocol_Governance_Architecture_for_Secure_Intelligent_NetZero_Government_Buildings_Sovereign_Doctrine_Series_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP02_Payload_Denied_Why_Ransomware_Fails_When_the_Database_Refuses_to_Serve_The_Data_Layer_Refusal_Mechanism_for_Active_Loss_Prevention.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP02_Payload_Denied_Why_Ransomware_Fails_When_the_Database_Refuses_to_Serve_The_Data_Layer_Refusal_Mechanism_for_Active_Loss_Prevention_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP02_Smart_Buildings_at_Scale_Delivering_IoT_Enabled_Enterprise_Estates_with_Measurable_Energy_Space_Cost_Outcomes_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP03_The_Intelligent_Estate_Aligning_IoT_BMS_Digital_Twins_and_ESG_into_a_Unified_Operational_Architecture_Sovereign_Doctrine_Series_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP03_The_Prompt-to-SQL_Control_Gap_Governing_Enterprise_AI_Copilots_at_the_Database_Boundary_Two-Actor_Accountability_for_Prompt-Driven_Query_Workflows.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP03_The_Prompt-to-SQL_Control_Gap_Governing_Enterprise_AI_Copilots_at_the_Database_Boundary_Two-Actor_Accountability_for_Prompt-Driven_Query_Workflows_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP04_API_Shadows_and_Phantom_Queries_Securing_Non-Human_Database_Identities_in_the_Cloud_Era_Behavioural_Identity_for_Service_Accounts_APIs_and_Batch_Workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP04_API_Shadows_and_Phantom_Queries_Securing_Non-Human_Database_Identities_in_the_Cloud_Era_Behavioural_Identity_for_Service_Accounts_APIs_and_Batch_Workloads_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP04_Securing_the_Smart_Estate_Cyber_Assurance_Across_IoT_OT_BMS_Using_IEC_62443_and_Zero_Trust_Principles_Sovereign_Doctrine_Series_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP05_The_Machine_Identity_Data_Heist_When_the_Attacker_Borrows_a_Machine_Not_a_Password_Compromise_Attribution_for_Non-Human_Actors_at_the_Data_Layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP05_The_Machine_Identity_Data_Heist_When_the_Attacker_Borrows_a_Machine_Not_a_Password_Compromise_Attribution_for_Non-Human_Actors_at_the_Data_Layer_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP05_The_Smart_Building_Programme_Playbook_Governance_Risk_Control_and_Delivery_Assurance_for_50M_Estate_Transformation_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP06_Shadow_Databases_Real_Liability_Discovering_and_Governing_the_Databases_Nobody_Admits_Exist_Continuous_Discovery_as_a_Board-Level_Control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP06_Shadow_Databases_Real_Liability_Discovering_and_Governing_the_Databases_Nobody_Admits_Exist_Continuous_Discovery_as_a_Board-Level_Control_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP06_The_Space_Dividend_Achieving_25_to_35_Estate_Cost_Reduction_Through_Occupancy_Intelligence_and_Workplace_Analytics_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP07_Energy_Optimisation_at_Scale_HVAC_Demand_Response_and_Real_Time_Consumption_Governance_Across_Portfolio_Estates_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP07_The_Ephemeral_Vault_Securing_Databases_That_Exist_for_Minutes_Not_Months_Continuous_Control_for_Short-Lived_Auto-Scaling_Data_Infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP07_The_Ephemeral_Vault_Securing_Databases_That_Exist_for_Minutes_Not_Months_Continuous_Control_for_Short-Lived_Auto-Scaling_Data_Infrastructure_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP08_Kubernetes_and_the_Crown_Jewels_Modernising_Database_Monitoring_for_Containerised_Data_Platforms_Cloud-Native_Data_Telemetry_for_Dynamic_Workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP08_Kubernetes_and_the_Crown_Jewels_Modernising_Database_Monitoring_for_Containerised_Data_Platforms_Cloud-Native_Data_Telemetry_for_Dynamic_Workloads_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP08_The_Commercial_Edge_of_Digital_Twins_From_Demo_Asset_to_Production_Grade_Operational_Intelligence_Across_the_Estate_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP09_De_Risking_Smart_Building_Programmes_Risk_Architecture_Insurance_Posture_and_Defensibility_for_50M_Estate_Transformations_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP09_The_Day-Zero_M_and_A_Database_Risk_Deploying_Database_Monitoring_as_a_Day-One_Acquisition_Control_Inherited_Breach_Debt_and_the_Cyber_Due_Diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP09_The_Day-Zero_M_and_A_Database_Risk_Deploying_Database_Monitoring_as_a_Day-One_Acquisition_Control_Inherited_Breach_Debt_and_the_Cyber_Due_Diligence_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP10_Monetising_the_Smart_Estate_Commercial_Models_Capital_Release_and_Value_Creation_Beyond_Energy_Savings_Sovereign_Doctrine_Series_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP10_The_Supplier_Says_Secure_The_Database_Says_Prove_It_Verifying_Third-Party_Assurance_with_Telemetry_Supplier_Assurance_Verified_at_the_Data_Layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP10_The_Supplier_Says_Secure_The_Database_Says_Prove_It_Verifying_Third-Party_Assurance_with_Telemetry_Supplier_Assurance_Verified_at_the_Data_Layer_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP11_Break-Glass_That_Never_Closed_Governing_Emergency_Database_Access_After_the_Incident_Ends_Lifecycle_Governance_for_Temporary_Privilege_and_Crisis_Exceptions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP11_Break-Glass_That_Never_Closed_Governing_Emergency_Database_Access_After_the_Incident_Ends_Lifecycle_Governance_for_Temporary_Privilege_and_Crisis_Exceptions_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP11_The_Digital_Twin_Mandate_From_Static_Asset_Register_to_Live_Operational_Intelligence_Programme_Directors_Blueprint_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP12_Integrating_BMS_and_IoT_Platforms_BACnet_Modbus_KNX_and_Multi_Vendor_Convergence_Across_Legacy_and_Modern_Estates_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP12_The_Exception_Became_the_Exploit_Whitelist_Debt_Bypass_Rules_and_Untested_Policy_Exceptions_Exception_Burn-Down_as_a_Continuous_Security_Function.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP12_The_Exception_Became_the_Exploit_Whitelist_Debt_Bypass_Rules_and_Untested_Policy_Exceptions_Exception_Burn-Down_as_a_Continuous_Security_Function_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP13_Predictive_Facilities_Management_AI_Driven_Asset_Health_Sensor_Fed_Maintenance_and_the_End_of_Reactive_Estate_Operations_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP13_The_Compliance_Edge_Turning_Database_Security_into_a_Sales_Weapon_Evidence-Led_Differentiation_in_Enterprise_Vendor_Reviews_and_RFP_Cycles.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP13_The_Compliance_Edge_Turning_Database_Security_into_a_Sales_Weapon_Evidence-Led_Differentiation_in_Enterprise_Vendor_Reviews_and_RFP_Cycles_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP14_The_CISOs_Ledger_Proving_Database_Security_ROI_Before_the_Breach_CFO-Ready_Loss-Aversion_Economics_for_Database_Monitoring_Investment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP14_The_CISOs_Ledger_Proving_Database_Security_ROI_Before_the_Breach_CFO-Ready_Loss-Aversion_Economics_for_Database_Monitoring_Investment_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP14_The_Protocol_Stack_LoRaWAN_Zigbee_BLE_NB_IoT_and_Multi_Protocol_IoT_Integration_Across_Legacy_and_Modern_Estates_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP15_From_Legacy_BMS_to_Intelligent_Buildings_A_Practical_Roadmap_for_Enterprise_Estate_Modernisation_and_Digital_Transition_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP15_The_Boardroom_Ultimatum_Stop_Logging_Breaches_Start_Blocking_Loss_Active_Data-Layer_Enforcement_as_Board-Level_Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP15_The_Boardroom_Ultimatum_Stop_Logging_Breaches_Start_Blocking_Loss_Active_Data-Layer_Enforcement_as_Board-Level_Doctrine_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP16_The_Data_Sovereignty_Control_Room_Operating_Model_for_Cross-Border_Data_Governance_Sovereignty_as_a_Live_Operational_Discipline_Not_a_Map.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP16_The_Data_Sovereignty_Control_Room_Operating_Model_for_Cross-Border_Data_Governance_Sovereignty_as_a_Live_Operational_Discipline_Not_a_Map_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP16_The_Secure_Building_Protocol_IEC_62443_Alignment_OT_Network_Segmentation_and_Cyber_Assurance_for_Smart_Estates_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP17_The_OT_IT_Convergence_Blueprint_Applying_the_Purdue_Model_to_Secure_Building_Management_Systems_at_Enterprise_Scale_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP17_The_Revenue_Database_Is_Now_a_Risk_Asset_Securing_the_Systems_Where_Revenue_Becomes_Fragile_Operational_Resilience_Doctrine_for_Revenue-Bearing_Databases.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP17_The_Revenue_Database_Is_Now_a_Risk_Asset_Securing_the_Systems_Where_Revenue_Becomes_Fragile_Operational_Resilience_Doctrine_for_Revenue-Bearing_Databases_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP18_Operational_Resilience_in_Smart_Buildings_Designing_for_Zero_Material_Incidents_Failover_and_Continuity_in_Intelligent_Estates_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP18_The_Client_Data_Trust_Premium_How_Database_Monitoring_Creates_Pricing_Power_and_Retention_Margin_Trust_as_a_Quantifiable_Database-Backed_Commercial_Asset.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP18_The_Client_Data_Trust_Premium_How_Database_Monitoring_Creates_Pricing_Power_and_Retention_Margin_Trust_as_a_Quantifiable_Database-Backed_Commercial_Asset_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP19_Secure_by_Design_IoT_Infrastructure_Embedding_Identity_Trust_and_Segmentation_into_Smart_Building_Deployments_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP19_The_Autonomous_DBA_Is_Coming_Governing_AI-Assisted_Database_Administration_and_Self-Healing_Systems_Operational_Oversight_for_Machine-Driven_Database.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP19_The_Autonomous_DBA_Is_Coming_Governing_AI-Assisted_Database_Administration_and_Self-Healing_Systems_Operational_Oversight_for_Machine-Driven_Database_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP20_The_Data_Heist_Kill_Chain_Mapping_Attacker_Progression_from_Identity_Compromise_to_Monetisation_An_End-to-End_Operating_Model_for_Stopping_Data_Theft.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP20_The_Data_Heist_Kill_Chain_Mapping_Attacker_Progression_from_Identity_Compromise_to_Monetisation_An_End-to-End_Operating_Model_for_Stopping_Data_Theft_v7.0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/WP20_Zero_Carbon_by_Architecture_Delivering_Net_Zero_Through_Energy_Intelligence_ESG_Governance_and_Smart_Building_Design_v3.2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/We_Have_Imperva_Good_Now_Prove_It_Works__The_Six-Pillar_Operational_Assurance_Framework_for_DAM_Platforms_in_Tier_1_Banking_Environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/You Are Not Under Tooled You Are Over Tooled And Still Blind - Visibility Paradox And Rationalisation Doctrine - Reference Architecture for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/You Dont Need Another Security Tool You Need Control - From Tool Sprawl To Architectural Consolidation And Tool To Control Ratio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your Biggest Risk May Be Someone Just Trying To Get Work Done Faster - Designing Out Insider Friction That Drives Shortcuts And Shadow Behaviour.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your Incident Response Plan Will Fail Under Pressure - Drill Discipline Decision Rights and Why Every Plan Should Be Stress Tested Quarterly Doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your Perimeter Is Fiction Your Vendors Are Inside The Blast Radius - The Contract Control Matrix For Third Party Risk - Decision-Grade Reference for Boards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your SOC Is Already Losing - Why Conventional Security Operations Fail Against Velocity Class Adversaries and What Replaces Them.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your SOC Isnt Hunting Threats Its Drowning In Noise - Re Architecting The SOC From Triage Queue To Hunt Led Function - Strategic Reference for CNI Operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your Security Stack Is Producing Noise Not Intelligence - Signal Engineering Data Lineage Discipline and the Industrialisation of Detection Truth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Your_SIEM_Did_Not_Fail_Your_Data_Strategy_Did__Rebuilding_the_Detection_Stack_from_the_Database_Outward_for_Regulated_Enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero Trust Is Not A Slide It Is An Enforcement Model - From Architectural Rhetoric To Board Attestable Enforcement Evidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero-Secret_Architectures__Federated_Workload_Identity_Across_AWS_Azure_and_GCP_-_A_Doctrine_for_the_Elimination_of_Long-Lived_Cloud_Secrets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero-Trust Segmentation for Airport Operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero_Standing_Privilege__JIT_Access_Models_Across_Federated_and_Privileged_Identity_Systems_-_A_Doctrine_for_the_Elimination_of_Persistent.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero_Transfer_Is_a_Myth_Realistic_Transfer_Doctrine_BRIDGE_Framework_Operating_Under_EO_14117_and_GDPR_Institution_Defining_Edition_Upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/Zero_Trust_Transformation_Integrating_SABSA_Modern_Network_Security_NIST_SP800_207_BeyondCorp_Enterprise_Zero_Trust_Architecture_at_Scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/a-pentest-finds-holes-adversary-emulation-proves-whether-defence-wakes-up-from-scope-bound-pentests-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adaptive-authentication-at-bank-grade-risk-based-mfa-enginee.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adaptive-authentication-at-bank-grade-risk-based-mfa-engineered-to-real-time-fin.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adaptive-authentication-at-bank-grade.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/advanced-exploitation-techniques-zero-day-research-custom-shellcode-bypass-engineering-pos.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/advanced-exploitation-techniques-zero-day-research-custom-shellcode-bypass.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/advanced-exploitation-techniques.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/advanced_exploitation_techniques_zero_day_research_custom_shellcode_bypass_engineering_post_exploitation_tradecraft_elite_security_operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversarial pattern recognition in ai systems a red-team framework for emerging web exploitation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversarial-pattern-recognition-in-ai-systems-a-red-team-framework-for-emerging.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversarial-pattern-recognition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversary-simulation-in-regulated-environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversary-simulation-regulated-environments-tiber-eu-dora-tlpt-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/adversary_simulation_regulated_environments_tiber_eu_dora_tlpt_governance_architecture_financial_sector_threat_led_penetration.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agent-sprawl-policy-drift-false-assurance-the-hidden-failure-modes-of-imperva-dam-a-field-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic ai beyond guardrails - adaptive risk architectures for enterprise autonomy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-ai-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-ai-beyond-guardrails-adaptive-risk-architectures-for-enterprise-autonomy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-ai-beyond-guardrails.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-autonomy-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-risk-doctrine-tech-specs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/agentic-risk-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai driven identity intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai engineering doctrine - extract chunk prompt evaluate - the four-phase engineering model for production-grade government ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai governance meets cyber governance - the emerging duty of convergence risk management and board accountability - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai incident command systems - crisis governance for autonomous systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai sovereignty in the justice stack - controlling models metadata and meaning - a sovereignty framework for national control of judicial ai assets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai systems cyber doctrine- governance and operational control of algorithmic risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai that survives court wins the market - the doctrine of litigation-grade security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-control-enterprise-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-copilots-for-compliance-what-to-automate-what-to-gate-what-to-forbid.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-driven-identity-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-driven-threat-frontier.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-engineering-doctrine-extract-chunk-prompt-evaluate-the-four-phase.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-engineering-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-governance-and-security-architecture-embedding-iso42001-within-sabsa-eu-ai-ac.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-governance-and-security-architecture-embedding-iso42001-within-sabsa-eu-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-governance-meets-cyber-governance-the-emerging-duty-of-convergence-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-governance-meets-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-incident-command-systems-crisis-governance-for-autonomous-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-incident-command-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-litigation-grade-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-native-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-security-assurance-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-security-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-sovereignty-in-the-justice-stack-controlling-models-metadata-and-meaning-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-sovereignty-justice-stack.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-systems-cyber-doctrine-governance-and-operational-control-of-algorithmic-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-systems-cyber-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-that-survives-court-daubert-fre-702-defense-doctrine-for-ai-evidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ai-that-survives-court-wins-the-market-the-doctrine-of-litigation-grade-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/alert-fatigue-is-bankrupting-cybersecurity-teams-recapitalising-operations-throu.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/alert-fatigue-is-bankrupting-cybersecurity-teams-recapitalising-operations-through-triage-doctrine-s.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/alert-fatigue-is-bankrupting-cybersecurity-teams-recapitalising-operations-through-triage-doctrine-signal-engineering-and-decision-rights.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks-compliance-driven-security-blueprint-for-regulated-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/aligning-sabsa-with-eu-regulatory-frameworks-practitioner-guide-nis2-dora-gdpr-m.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/aligning-sabsa-with-eu-regulatory-frameworks-practitioner-guide-nis2-dora-gdpr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/always-on-identity-active-active-federation-with-zero-region.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/always-on-identity-active-active-federation-with-zero-regional-dependency-a-resi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/always-on-identity-active-active-federation-with-zero-regional-dependency-a-resilience-doc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/always-on-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/antifragile identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/antifragile-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/api-security-under-attack-penetration-testing-rest-graphql-grpc-interfaces.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/api-security-under-attack.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/api-shadows-and-phantom-queries-securing-non-human-database-identities-in-the-cloud-era-behavioural-identity-for-service-accounts-apis-and-batch-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/api_security_under_attack_penetration_testing_rest_graphql_grpc_interfaces_owasp_api_security_top_10_emerging_attack_vectors_flagship_edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting access by design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting anonymous power a zero-trust blueprint for senior insiders.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting cloud-native ai stacks - a strategic framework for migrating .net to python-react.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting the ai control - enterprise governance for the agentic era.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting the ai-native enterprise- identity as infrastructure, technical debt as liability, and the repricing of enterprise security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-access-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-anonymous-power-a-zero-trust-blueprint-for-senior-insiders.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-anonymous-power.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-cloud-native-ai-stacks-a-strategic-framework-for-migrating-net-to.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-the-ai-control-enterprise-governance-for-the-agentic-era.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/architecting-the-ai-native-enterprise-identity-as-infrastructure-technical-debt.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/are-we-exposed-the-seven-minute-board-answer-when-a-named-cve-or-sector-incident-lands-in-the-chairm.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/assurance-under-pressure-delivering-regulatory-grade-cyber-outcomes-against.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/attackers-dont-hack-in-anymore-they-log-in-the-identity-first-defensive-doctrine-for-credentialled-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof by design - cra nis2 compliance without slowing engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof-by-design-cra-nis2-compliance-without-slowing-engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof-resilience-doctrine-engineering-verifiable-nist-aligned-disaster-recovery-for-high-trust-institutions-enterp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof-resilience-doctrine-engineering-verifiable-nist-aligned-disaster-recovery-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-proof-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-ready-by-design-embedding-continuous-compliance-into-high-consequence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-response-and-v4-0-differentiation-specification-from-8-8-to-10-per-volume-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/audit-response-and-v4-0-differentiation-specification-from-8-8-to-10-per-volume.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/auditing-the-sabsa-framework-achieving-iso27001-compliance-through-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/automated-defence-auditable-outcomes-making-sentinel-playbooks-board-defensible-commercially-weaponised-cyber-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/automation at scale python ansible rest apis in cni - infrastructure-as-code and policy-as-code at scale - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/automation-at-scale-python-ansible-rest-apis-in-cni-infrastructure-as-code-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/automation-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/autonomous identity governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/autonomous-containment-as-a-business-guarantee-the-xdr-case-for-faster-contract-confidence-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/autonomous-identity-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/autonomous-metro-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex-enterprises-a-risk-aligned-security-architecture-methodology.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-battle-doctrine-resilience-frameworks-that-compel-executive-buy-in-and-budget-allocation-enterprise-resilience-sover.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-battle-doctrine-resilience-frameworks-that-compel-executive-buy-in-and-budget.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-battle-doctrine-resilience-frameworks-that-compel-executive-buy-in-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-black-swan-doctrine-engineering-continuity-systems-that-sustain-gbp-10b-operational-exposure-without-failure-enterpr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-black-swan-doctrine-engineering-continuity-systems-that-sustain-gbp-10b-operational.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bcp-black-swan-doctrine-engineering-continuity-systems-that-sustain-gbp-10b.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond binary edges how hyperedge-structured knowledge graphs eliminate clause fragmentation in llm-driven contract attribute extraction.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond certification campaigns.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond perimeter security physical-cyber convergence in airports - unified physical-cyber security operations - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond speech-to-text - end-to-end ai pipelines for transcription and intelligence - the full-stack ai pipeline architecture for judicial intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-binary-edges-how-hyperedge-structured-knowledge-graphs-eliminate-clause.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-certification-campaigns.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-compliance-how-sabsa-transforms-security-architecture-into-business-value.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-compliance-how-sabsa-transforms-security-architecture-into-business.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-perimeter-security-physical-cyber-convergence-in-airports-unified.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-perimeter-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-rbac-attribute-driven-authorisation-for-cloud-scale-f.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-rbac-attribute-driven-authorisation-for-cloud-scale-financial-data-system.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-rbac-attribute-driven-authorisation-for-cloud-scale-financial-data-systems-a-doctri.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-rbac.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-scanning-why-vulnerability-scanners-miss-68-percent-critical-security-findings-manu.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-scanning-why-vulnerability-scanners-miss-68-percent-critical-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-scanning.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-speech-to-text-end-to-end-ai-pipelines-for-transcription-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-speech-to-text.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure-advanced-identity-security-patterns-for-transformation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond-tick-box-security-engineering-defensible-assurance-outcomes-under-nis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/beyond_scanning_why_vulnerability_scanners_miss_68_percent_critical_security_findings_manual_penetration_testing_fills_gap_enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-aligned ciso blueprint - delivering 3× roi resilience across nis2 & dora compliance mandates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-aligned-ciso-blueprint-delivering-3-roi-resilience-across-nis2-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-aligned-ciso-blueprint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-cyber-governance-dora-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-grade cyber resilience technical risk to executive accountability - fair quantification and board reporting - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-grade-cyber-resilience-technical-risk-to-executive-accountability-fair.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/board-grade-cyber-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boardroom collapse in 45 seconds - the zero-hour command protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boardroom-collapse-45-seconds.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boardroom-collapse-in-45-seconds-the-zero-hour-command-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boardroom-cyber-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boards-still-dont-understand-cyber-risk-translating-operational-telemetry-into-f.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boards-still-dont-understand-cyber-risk-translating-operational-telemetry-into-fiduciary-decision-ma.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/boards-still-dont-understand-cyber-risk-translating-operational-telemetry-into-fiduciary-decision-making-under-dora-nis2-and-iso-42001.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/break-glass-that-never-closed-governing-emergency-database-access-after-the-incident-ends-lifecycle-governance-for-temporary-privilege-and-crisis-exceptions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bridging strategy and execution security architect in 24x7 cni - board risk appetite to operational defence posture - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bridging-strategy-and-execution-2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bridging-strategy-and-execution-building-cyber-risk-governance-that-holds-in.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bridging-strategy-and-execution-security-architect-in-24x7-cni-board-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/bridging-strategy-and-execution.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and-response-a-complete-security-operations-centre-blueprint.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-resilient-architectures-sabsa-applied-critical-infrastructure-protectio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-resilient-architectures-sabsa-applied-critical-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-secure-azure-platforms-for-government-and-defence-cloud-environments-architecture-patterns-for-mission-critical-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/building-secure-azure-platforms-for-government-and-defence-cloud-environments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/caf-in-practice-designing-executing-and-defending-cyber-assessment-campaigns.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/case-studies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cisco aci deep dive tenant vrf bridge domain epg design - policy-driven micro-segmentation in multi-tenant data centres - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cisco-aci-deep-dive-tenant-vrf-bridge-domain-epg-design-policy-driven-micro.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cisco-aci-deep-dive.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ciso-2027-playbook-sovereign-ai-resilience-quantum-proof-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ciso-2027-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ciso-autonomy-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ciso-transformation-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ciso_2027_playbook-sovereign ai resilience & quantum-proof identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/citrix netscaler and f5 secure application delivery for aviation - waf ssl offload and load balancing - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/citrix-netscaler-and-f5-secure-application-delivery-for-aviation-waf-ssl.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/citrix-netscaler-and-f5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/clinical-data-sovereignty-aegis-us-eu-uk-apac-conflict-resolution-and-arbitratio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/clinical-data-sovereignty-aegis-us-eu-uk-apac-conflict-resolution-and-arbitration-bre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud first identity governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-and-container-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-container-penetration-testing-aws-azure-gcp-kubernetes-security-validation-offensive.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-container-penetration-testing-aws-azure-gcp-kubernetes-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-first-identity-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets-policy-driven-governance-for-multi-jurisdictional-compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-native-ai-stacks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-security-architecture-under-sabsa-navigating-multi-cloud-complexity-nis2-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud-security-architecture-under-sabsa-navigating-multi-cloud-complexity-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cloud_container_penetration_testing_aws_azure_gcp_kubernetes_security_validation_offensive_techniques_cloud_native_attack_paths_analysis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/codified intelligence - establishing standards for interoperable ai - a standards framework for ai interoperability across government departments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/codified-intelligence-establishing-standards-for-interoperable-ai-a-standards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/codified-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/commanding the crisis - 90-day roadmap to boardroom confidence .html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/commanding-the-crisis-90-day-roadmap-to-boardroom-confidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/commanding-the-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-is-not-resilience-prove-the-business-can-survive-the-recoverability-mandate-doctrine-unde.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-passed-security-failed-the-operational-reality-gap-between-pci-dss-sox-attestat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-to-competitive-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-wont-save-you-operational-resilience-will-from-tick-box-audit-to-prov.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-wont-save-you-operational-resilience-will-from-tick-box-audit-to-proven-survival-dora-nis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/compliance-wont-save-you-operational-resilience-will-from-tick-box-audit-to-proven-survival-dora-nis2-and-architecture-of-defensible-continuity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/conformity-advantage.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-identity-assurance-automated-testing-observabilit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-identity-assurance-automated-testing-observability-and-runtime-valida.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-identity-assurance-automated-testing-observability-and-runtime-validation-of-ia.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-identity-assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-security-validation-annual-penetration-tests-automated-breach-attack-simulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-security-validation-annual-penetration-tests-automated-breach-attack.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-security-validation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-vulnerability-assessment-and-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous-vulnerability-assessment-penetration-testing-cvapt-model-automated.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous_security_validation_annual_penetration_tests_automated_breach_attack_simulation_continuous_attack_surface_management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/continuous_vulnerability_assessment_penetration_testing_cvapt_model_automated_scanning_manual_testing_threat_intelligence_assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber governance for the regulated enterprise - multi-regulatory compliance dora nis2 eu ai act - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-governance-for-the-regulated-enterprise-multi-regulatory-compliance-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-governance-for-the-regulated-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-governance-regulated-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-maturity-as-a-currency-redefining-assurance-through-nis2-and-caf-self.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-maturity-as-a-currency-redefining-assurance-through-nis2-and-caf.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-portfolio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-resilience-as-a-revenue-engine-converting-iso-27001-and-nist-compliance-into-contract-dominating-capability-enterp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-resilience-as-a-revenue-engine-converting-iso-27001-and-nist-compliance-into.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-resilience-as-a-revenue-engine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-resilience-in-operational-technology-meeting-ofgem-expectations-without.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-resilience-in-operational-technology.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-risk-is-now-a-revenue-problem-acquisition-velocity-underwriter-behaviour-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-risk-is-now-a-revenue-problem-acquisition-velocity-underwriter-behaviour-and-repricing-of-cybe.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-risk-is-now-a-revenue-problem-acquisition-velocity-underwriter-behaviour-and-repricing-of-cyber-posture-in-m-and-a-and-capital-markets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cyber-risk-reset-2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cybersecuritys-ai-arms-race-has-already-started-adversarial-models-defensive-ref.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cybersecuritys-ai-arms-race-has-already-started-adversarial-models-defensive-reflexes-and-the-strate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/cybersecuritys-ai-arms-race-has-already-started-adversarial-models-defensive-reflexes-and-the-strategic-repricing-of-cyber-risk-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/data-governance-and-security-architecture-applying-sabsa-to-gdpr-data-protection.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/data-governance-and-security-architecture-applying-sabsa-to-gdpr-data.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/database-monitoring-is-broken-and-regulators-are-about-to-notice-a-dora-nis2-and-pra-align.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/de-risking-smart-building-programmes-risk-architecture-insurance-posture-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/defender-xdr-and-the-evidence-graph-turning-fragmented-security-signals-into-commercial-assurance-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign-standards-a-strategic-architecture-for-regulated-organisations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/defensible-ciso.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing cyber-resilient airport networks - ot it segregation for airside landside passenger systems - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing ultra-high-reliability ai services - observability resilience and devsecops - the convergence of observability resilience and security for judicial ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-cyber-resilient-airport-networks-ot-it-segregation-for-airside.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-cyber-resilient-airport-networks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-secure-by-default-azure-architectures-for-high-sensitivity-environments-embedding-security-controls-at-the-foundation-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-secure-by-default-azure-architectures-for-high-sensitivity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-ultra-high-reliability-ai-services-observability-resilience-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/designing-ultra-high-reliability-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/detection-engineering-is-replacing-traditional-soc-operations-hypothesis-led-det.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/detection-engineering-is-replacing-traditional-soc-operations-hypothesis-led-detection-provable-cove.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/detection-engineering-is-replacing-traditional-soc-operations-hypothesis-led-detection-provable-coverage-and-science-of-adversary-specific-surfaces.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/digital resilience by design anti-fragile infrastructure - architecture that gets stronger under stress - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/digital-resilience-by-design-anti-fragile-infrastructure-architecture-that-gets.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/digital-resilience-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/doctrine of digital proof - operationalising trust in ai-driven judicial systems - a formal framework for establishing evidentiary trust in machine-generated transcripts.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/doctrine-of-digital-proof-operationalising-trust-in-ai-driven-judicial-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/doctrine-of-digital-proof.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/doing-more-with-less-delivering-enterprise-grade-cyber-grc-in-lean-and-resource.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/doing-more-with-less-delivering-enterprise-grade-cyber-grc-in-lean-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/domain-admin-is-not-an-entitlement-it-is-a-loaded-weapon-tiered-administration-and-just-in-time-priv.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dont-debate-the-ransom-while-the-malware-is-still-running-pre-signed-ransomware-decision-authorities.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora's ai vendor trap - liability flows, capital charges, and board exit strategies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-ai-vendor-trap.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-aligned-architecture-using-sabsa-to-meet-digital-operational-resilience-req.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-aligned-architecture-using-sabsa-to-meet-digital-operational-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-compliance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-s-ai-vendor-trap-liability-flows-capital-charges-and-board-exit-strategies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dora-will-expose-your-data-layer-are-you-ready-a-board-level-readiness-doctrine-for-databa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dr-doctrine-2026-engineer-institutional-survival-or-accept-regulatory-failure-enterprise-resilience-sovereign-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dr-doctrine-2026-engineer-institutional-survival-or-accept-regulatory-failure-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/dr-doctrine-2026-engineer-institutional-survival-or-accept-regulatory-failure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/drowning-in-logs-starving-for-signals-the-dam-to-siem-crisis-inside-financial-services-eng.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/drp-weaponisation-doctrine-iso-27001-aligned-recovery-kill-chains-that-withstand-regulatory-forensics-enterprise-resilie.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/drp-weaponisation-doctrine-iso-27001-aligned-recovery-kill-chains-that-withstand.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/drp-weaponisation-doctrine-iso-27001-aligned-recovery-kill-chains-that.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/eliminating-credentials-fido2-as-primary-authentication-in-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/eliminating-credentials-fido2-as-primary-authentication-in-tier-1-banking-a-depl.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/eliminating-credentials-fido2-as-primary-authentication-in-tier-1-banking-a-deployment-doc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/eliminating-credentials.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/end-to-end-cyber-governance-owning-risk-assurance-and-delivery-across-regulated.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/end-to-end-cyber-governance-owning-risk-assurance-and-delivery-across.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/energy-optimisation-at-scale-hvac-demand-response-and-real-time-consumption-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/engineering truth - the ai pipeline as an instrument of national integrity - building ai systems worthy of national trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/engineering-truth-the-ai-pipeline-as-an-instrument-of-national-integrity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/engineering-truth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/enterprise firewall modernisation for critical national infrastructure - ips encrypted visibility policy engineering - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/enterprise-firewall-modernisation-for-critical-national-infrastructure-ips.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/enterprise-firewall-modernisation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust-enforcement-building-the-secure-cloud-adoption-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/event-driven-identity-scim-pingidm-and-the-real-time-synchro.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/event-driven-identity-scim-pingidm-and-the-real-time-synchronisation-doctrine-fo.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/event-driven-identity-scim-pingidm-and-the-real-time-synchronisation-doctrine-for-hybrid-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/event-driven-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/evidence-over-opinion-building-cyber-programmes-that-prove-rather-than-claim.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/executive-summary-polished-final-v9.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/executive-summary-zero-hour.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/executive_summary_polished_final v9.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-enisa-good-practices-for-incident-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-aws-security-hub-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-beyondtrust-password-safe-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-central-bank-of-ireland-cross-industry-operational-resilience-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-check-point-quantum-security-gateways-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-cisco-secure-firewall-asa-ftd-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-cobit-2019-governance-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-crowdstrike-falcon-tech-center.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-cyberark-privileged-access-manager-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-edpb-international-data-transfers-sccs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-fca-sysc-8-outsourcing-rules.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-fortinet-fortigate-documentation-library.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-gcp-security-command-center-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-hashicorp-terraform-infrastructure-as-code-docs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-ibm-qradar-siem-knowledge-center.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-ico-personal-data-breach-notification-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-ico-uk-gdpr-records-of-processing-ropa-article-30.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-iso-iec-27001-2022-information-security-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-iso-iec-27701-2019-privacy-information-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-juniper-srx-series-firewalls-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-kubernetes-security-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-logrhythm-siem-documentation-portal.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-microsoft-defender-for-cloud-cspm-cwpp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-microsoft-defender-xdr-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-microsoft-entra-id-azure-ad-identity-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-mitre-att-ck-enterprise-matrix.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-nist-cybersecurity-framework-csf-2-0.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-nist-sp-800-61-rev-2-incident-handling-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-oasis-stix-taxii-cyber-threat-intelligence-standards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-okta-identity-cloud-developer-admin-docs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-opentext-arcsight-esm-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-owasp-top-10-web-application-security-risks.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-palo-alto-cortex-xsoar-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-palo-alto-networks-ngfw-technical-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-pci-dss-v4-payment-card-industry-data-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-qualys-vmdr-cloud-platform-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-rapid7-insightvm-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-sailpoint-identitynow-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-sentinelone-singularity-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-snort-network-ids-ips-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-splunk-enterprise-security-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-splunk-soar-phantom-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-tenable-nessus-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-fs-vmware-carbon-black-cloud-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-active-directory-domain-services-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-active-directory-federation-services-ad-fs-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-apache-tomcat-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-aws-iam-access-analyzer-user-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-aws-iam-identity-center-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-aws-security-token-service-sts-user-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-bcbs-239-principles-for-effective-risk-data-aggregation-reporting.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-beyondtrust-privileged-remote-access-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-central-bank-of-ireland-cross-industry-operational-resilience-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-cyberark-defender-privileged-access-manager-administration.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-dora-regulation-eu-2022-2554-on-digital-operational-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-ecb-srep-supervisory-review-and-evaluation-process.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-fapi-2-0-financial-grade-api-security-profile.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-fca-handbook-sysc-8-outsourcing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-ffiec-cybersecurity-assessment-tool-cat-it-examination-handbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-fido-alliance-specifications-resources.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-fido2-specifications-overview.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-frb-supervisory-letters-sr-letters-cybersecurity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-gcp-iam-conditions-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-gcp-workload-identity-federation-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-google-cloud-identity-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-gramm-leach-bliley-act-glba-safeguards-rule.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-hkma-tm-g-1-general-principles-for-technology-risk-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-iam-roles-for-service-accounts-irsa-eks-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-ibm-websphere-application-server-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-java-authentication-and-authorization-service-jaas-reference-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-java-cryptography-architecture-jca-reference-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-json-web-token-jwt-rfc-7519.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-kubernetes-rbac-authorization-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-mas-technology-risk-management-guidelines.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-microsoft-entra-id-conditional-access-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-microsoft-entra-privileged-identity-management-pim.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-mit-kerberos-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-nist-sp-800-53-rev-5-security-privacy-controls.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-nist-sp-800-63-digital-identity-guidelines.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-oauth-2-0-authorization-framework-rfc-6749.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-oauth-2-0-mutual-tls-client-authentication-rfc-8705.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-oauth-2-1-ietf-draft.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-occ-comptroller-s-handbook-information-technology.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-one-identity-manager-aveksa-heritage-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-openid-connect-core-1-0-final-specification.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-openldap-administrator-s-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-oracle-weblogic-server-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-owasp-api-security-top-10-2023.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pci-dss-v4-0-payment-card-industry-data-security-standard.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingaccess-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingdirectory-ldap-directory-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingfederate-scim-2-0-connector-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingfederate-sdk-java-integration-kit-developer-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingfederate-server-administrator-s-manual.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingid-mfa-service-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingidm-identity-management-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pingone-for-workforce-cloud-identity-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-pra-rulebook-operational-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-rsa-securid-authentication-manager-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-sailpoint-identityiq-administration-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-saml-2-0-oasis-standard.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-sarbanes-oxley-act-section-404-icfr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-saviynt-enterprise-identity-cloud-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-spring-security-reference-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-swift-customer-security-programme-csp-customer-security-controls-frame.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-symantec-vip-validation-id-protection-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-system-for-cross-domain-identity-management-scim-2-0-rfc-7644.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-web-authentication-webauthn-level-2-w3c-recommendation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ib-yubikey-developer-admin-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ico-accountability-framework-uk-gdpr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ico-data-protection-impact-assessments-dpia.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ico-dpia-template-and-practical-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ico-right-of-access-data-subject-access-request-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ico-uk-gdpr-guidance-and-resources.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-iso-iec-27001-information-security-management-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-iso-iec-27002-2022-information-security-controls.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-defender-for-cloud-cspm-and-cwpp.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-defender-xdr-unified-security-operations-platform.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-purview-data-lifecycle-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-purview-data-loss-prevention-dlp-overview.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-purview-information-protection-sensitivity-labels.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-sentinel-analytics-rules-and-detection.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-sentinel-cloud-native-siem-and-soar-overview.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-microsoft-sentinel-kql-reference-for-hunting.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-ncsc-incident-management-collection.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-nist-sp-800-61-rev-2-computer-security-incident-handling-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-aima-alternative-investment-management-association-guidance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-apache-arrow-columnar-in-memory-analytics.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-apache-kafka-distributed-event-streaming-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-apache-parquet-columnar-storage-format.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-bis-otc-derivatives-statistics-semiannual-survey.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-bloomberg-api-blpapi-developer-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-bloomberg-index-services-ltd-bisl-methodology-documents.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-boost-c-libraries-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-boston-consulting-group-organization-change-management-insights.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-calypso-cross-asset-trading-risk-platform-adenza.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-cfa-institute-factor-investing-quantitative-equity-investing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-continuous-delivery-jez-humble-david-farley-reference.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-coso-enterprise-risk-management-integrated-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-cucumber-bdd-framework-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-dask-parallel-computing-for-python.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-dora-devops-research-assessment-four-keys-metrics.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-edhec-risk-climate-impact-institute-factor-investing-research.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-esma-mifid-ii-mifir-algorithmic-high-frequency-trading-guidelines.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-fair-factor-analysis-of-information-risk-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-fca-handbook-mar-7a-algorithmic-trading.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-forrester-executive-communications-influence-research.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-gartner-it-governance-risk-compliance-research.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-google-sre-books-site-reliability-engineering-workbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-google-state-of-devops-report-accelerate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-harvard-business-review-leading-without-authority-collection.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-ieee-829-iso-iec-ieee-29119-software-test-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-isda-2021-equity-derivatives-definitions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-isda-master-agreement-schedule-csa-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-iso-31000-2018-risk-management-guidelines.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-iso-iec-25010-systems-software-quality-model-square.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-iso-iec-ieee-12207-2017-software-lifecycle-processes.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-istqb-foundation-level-syllabus-ctfl.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-k6-open-source-load-testing-tool.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-kdb-q-time-series-database-language.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-lseg-refinitiv-eikon-data-api-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-mckinsey-company-operating-models-stakeholder-alignment-insights.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-msci-index-methodology-factor-strategy-indices.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-murex-mx-3-front-to-back-trading-risk-platform.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-nist-sp-800-30-rev-1-guide-for-conducting-risk-assessments.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-nist-sp-800-39-managing-information-security-risk-organization-mission.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-numerix-crossasset-analytics-platform.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-numpy-scipy-scientific-computing-in-python.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-pandas-python-data-analysis-library.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-pmi-pmbok-guide-7th-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-pmi-stakeholder-engagement-communications-management-practice-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-postman-newman-api-testing-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-prince2-managing-successful-projects.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-pytest-python-testing-framework-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-quantlib-free-library-for-quantitative-finance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-s-p-dow-jones-indices-methodology-library.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-safe-scaled-agile-framework-big-picture-configurations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-scrum-org-the-scrum-guide-2020.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-sec-rules-on-systematic-internalisers-quantitative-trading.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-selenium-webdriver-documentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-thoughtworks-technology-radar.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-togaf-standard-10-architecture-development-method.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-tricentis-tosca-model-based-test-automation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ext-qqd-trunk-based-development-reference-site.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/federation-first-modernisation-converting-websphere-and-webl.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/federation-first-modernisation-converting-websphere-and-weblogic-estates-into-st.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/federation-first-modernisation-converting-websphere-and-weblogic-estates-into-standards-ba.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/federation-first-modernisation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fiduciary-defence-dossier-template-v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fiduciary-defence-dossier.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fiduciary_defence_dossier_template v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/financial-grade-api-security-fapi-compliant-oauth2-architect.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/financial-grade-api-security-fapi-compliant-oauth2-architectures-for-regulated-b.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/financial-grade-api-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/forbes-cyber-governance-define-next-generation-market-leaders.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fortifying the pipeline - devsecops doctrine for ai-enabled judicial services - security-first ci-cd for machine learning in government infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fortifying-the-pipeline-devsecops-doctrine-for-ai-enabled-judicial-services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/fortifying-the-pipeline.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from compliance mandate to competitive advantage in the ai era.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from compliance to competitive advantage board-level cyber governance under dora & nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from compliance to conformity - operationalising cra and nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from pov to production - the blueprint for resilient ai in public infrastructure - crossing the valley of death between ai proof-of-value and national deployment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from prototype to public infrastructure - engineering production-grade ai transcription - the engineering doctrine for scaling ai from lab to live service.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from regulation to runtime - engineering cra nis2 dora into product security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from scapegoat to sovereign - the ciso authority doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-audit-to-advantage-turning-nis-and-caf-compliance-into-strategic.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-mandate-to-competitive-advantage-in-the-ai-era.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-command-authority-weaponising-iso-27001-and-nist-for-enterprise-disaster-recovery-supremacy-enterpris.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-command-authority-weaponising-iso-27001-and-nist-for-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-command-authority.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-competitive-advantage-board-level-cyber-governance-under.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-conformity-operationalising-cra-and-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-conformity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-compliance-to-resilience-operationalising-nis2-and-caf-into-measurable.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-control-evidence-to-contract-leverage-the-new-economics-of-microsoft-security-architecture-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-data-controls-to-deal-control-how-cyber-evidence-can-reshape-enterprise-negotiation-power-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-dpia-to-decision-engine-machine-readable-dpia-doctrine-decide-framework-cli.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-dpia-to-decision-engine-machine-readable-dpia-doctrine-decide-framework-clinical.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-findings-to-fixes-remediation-driven-penetration-testing-programme-closes-security-ga.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-findings-to-fixes-remediation-driven-penetration-testing-programme-closes.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-findings-to-fixes.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-jml-to-institutional-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-legacy-bms-to-intelligent-buildings-a-practical-roadmap-for-enterprise-estate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-pentest-to-threat-intelligence-offensive-security-findings-feed-strategic.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-pentest-to-threat-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-playbooks-to-performance-uplifting-incident-response-capability-in-nis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-playbooks-to-performance-uplifting-incident-response-capability-in.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-pov-to-production-the-blueprint-for-resilient-ai-in-public-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-pov-to-production.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-prototype-to-public-infrastructure-engineering-production-grade-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-prototype-to-public-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-regulation-to-runtime-engineering-cra-nis2-dora-into-product-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-regulation-to-runtime-the-sovereign-compliance-operating-system-bre-edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-regulation-to-runtime.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-scapegoat-to-sovereign-the-ciso-authority-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from-scapegoat-to-sovereign.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from_findings_to_fixes_remediation_driven_penetration_testing_programme_closes_security_gap_through_governance_framework_flagship_edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/from_pentest_to_threat_intelligence_offensive_security_findings_feed_strategic_threat_intelligence_mitre_att_ck_proactive_defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/future-of-privileged-access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/global identity at scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/global-identity-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governance-premium.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing agentic enterprise - from shadow ai to autonomous security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing machine identities.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-agentic-enterprise-from-shadow-ai-to-autonomous-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-cyber-risk-sabsa-based-board-level-accountability-risk-appetite-archit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-cyber-risk-sabsa-based-board-level-accountability-risk-appetite.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-machine-identities.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/governing-the-agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/hardening-the-vault-turning-imperva-logs-into-board-level-risk-intelligence-from-raw-dam-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/harmonizing dora - how to stop duplicating controls and build a single resilience framework for european finserv.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/harmonizing-dora-how-to-stop-duplicating-controls-and-build-a-single-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/harmonizing-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/high-availability and disaster recovery for mission-critical aviation - sub-second failover and zero-data-loss recovery - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/high-availability-and-disaster-recovery-for-mission-critical-aviation-sub.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/high-availability-and-disaster-recovery.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/high-availability-disaster-recovery-aviation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/hyperedge-knowledge-graphs.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iam-governance-elite-v4.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iam-governance-elite.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iam_governance_elite_v4.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity as doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity governance as infrastructure - translating policy into automated control architecture for the autonomous enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity is the new perimeter zero trust governance blueprint - identity-centric security at enterprise scale - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity warehouse to enforcement edge.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-code-a-doctrine-for-versioning-testing-and-deplo.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-code-a-doctrine-for-versioning-testing-and-deploying-federation-infr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-code-a-doctrine-for-versioning-testing-and-deploying-federation-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-code.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-the-primary-enforcement-layer-unifying-endpoint-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-the-primary-enforcement-layer-unifying-endpoint-network-and-access-d.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-as-the-primary-enforcement-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional-access-at-scale-designing-the-enterprise-identity-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-governance-as-infrastructure-translating-policy-into-automated-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-governance-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-is-the-new-perimeter-zero-trust-governance-blueprint-identity-centric.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-is-the-new-perimeter.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-new-perimeter-zero-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-utility.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/identity-warehouse-to-enforcement-edge.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/if-the-attacker-has-automation-and-you-have-manual-triage-youve-already-lost-tempo-closing-the-mttd-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/implementing-sabsa-complex-enterprise-environments-practitioners-field-guide-mul.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/implementing-sabsa-complex-enterprise-environments-practitioners-field-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/index.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/information governance for autonomous metro infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/information-governance-for-autonomous-metro-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/infrastructure-penetration-testing-active-directory-network-segmentation-lateral-movement.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/infrastructure-penetration-testing-active-directory-network-segmentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/infrastructure-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/infrastructure_penetration_testing_active_directory_network_segmentation_lateral_movement_exploiting_defending_enterprise_infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institution-grade-recovery-doctrine-building-iso-27001-and-nist-systems-that-secure-contracts-and-withstand-systemic-fai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institution-grade-recovery-doctrine-building-iso-27001-and-nist-systems-that-secure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institution-grade-recovery-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutional-dr-mandate-ciso-doctrines-that-command-premium-engagements-and-board-level-authority-enterprise-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutional-dr-mandate-ciso-doctrines-that-command-premium-engagements-and-board-level.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutional-dr-mandate-ciso-doctrines-that-command-premium-engagements-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutional-liability-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutionalising product security - operating model cra nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutionalising-product-security-operating-model-cra-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/institutionalising-product-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/integrating-bms-and-iot-platforms-bacnet-modbus-knx-and-multi-vendor-convergence-across.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/integrating-sabsa-across-the-enterprise-multi-framework-architecture-iso27001-ni.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/integrating-sabsa-across-the-enterprise-multi-framework-architecture-iso27001.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/interim-ciso.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ironclad anonymization - deterministic redaction frameworks for the ministry of justice - engineering near-zero-leakage pii redaction for judicial ai at national scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ironclad-anonymization-deterministic-redaction-frameworks-for-the-ministry-of.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/ironclad-anonymization.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iso-27001-2025-resilience-doctrine-replacing-compliance-theatre-with-institutional-grade-operational-steel-enterprise-re.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iso-27001-2025-resilience-doctrine-replacing-compliance-theatre-with-institutional-grade.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/iso-27001-2025-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/it-is-just-an-agent-no-it-is-your-audit-control-why-dam-agents-are-now-regulated-infrastructure-under-dora-article-9-and-nis2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/it-s-just-an-agent-no-it-s-your-audit-control-why-dam-agents-are-now-regulated-infrastruct.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/joiner mover leaver to institutional control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/joiner-mover-leaver-institutional-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/joiner-mover-leaver-to-institutional-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/judicial ai at scale - architecting resilient secure and governed platforms - a sovereign infrastructure blueprint for national-scale judicial ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/judicial-ai-at-scale-architecting-resilient-secure-and-governed-platforms-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/judicial-ai-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/kubernetes-and-the-crown-jewels-modernising-database-monitoring-for-containerised-data-platforms-cloud-native-data-telemetry-for-dynamic-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mTLS_as_Identity__Cryptographic_Trust_for_East-West_Traffic_in_Banking_Systems_-_A_Doctrine_for_Zero-Trust_Service_Mesh_at_Institutional_Scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/machine-identity-at-scale-governing-non-human-and-ai-identit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/machine-identity-at-scale-governing-non-human-and-ai-identities-across-global-ba.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/machine-identity-at-scale-governing-non-human-and-ai-identities-across-global-banking-infr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/machine-identity-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mergers-and-acquisitions-cyber-risk-sabsa-based-due-diligence-framework-aice-arc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mergers-and-acquisitions-cyber-risk-sabsa-based-due-diligence-framework-aice.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mfa-that-can-be-proxied-is-not-strong-authentication-phish-resistant-fido2-webauthn-and-passkey-migr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/modern-penetration-testers-playbook-mastering-burp-suite-pro-metasploit-custom-exploit-dev.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/modern-penetration-testers-playbook-mastering-burp-suite-pro-metasploit-custom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at-scale-building-an-integrated-detection-analytics-platform.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/modern_penetration_testers_playbook_mastering_burp_suite_pro_metasploit_custom_exploit_development_enterprise_security_engagements.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/monetising-the-smart-estate-commercial-models-capital-release-and-value-creation-beyond.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-enterprises-can-detect-threats-very-few-can-operationally-survive-them-the-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-enterprises-can-detect-threats-very-few-can-operationally-survive-them-the-recoverability-manda.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-enterprises-can-detect-threats-very-few-can-operationally-survive-them-the-recoverability-mandate-engineering-survival-velocity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-socs-are-built-for-yesterdays-threats-architectural-debt-surface-migration-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-socs-are-built-for-yesterdays-threats-architectural-debt-surface-migration-and-re-foundationing-the-operations-floor-for-2027-adversaries.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/most-socs-are-built-for-yesterdays-threats-architectural-debt-surface-migration-and-re-foundationing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mtls-as-identity-cryptographic-trust-for-east-west-traffic-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mtls-as-identity-cryptographic-trust-for-east-west-traffic-in-banking-systems-a-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mtls-as-identity-cryptographic-trust-for-east-west-traffic-in-banking-systems-a-doctrine-f.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/mtls-as-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/n-ary-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/navigating-nca-ecc-saudi-arabia-national-cybersecurity-authority-essential.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/navigating-nca-ecc-saudi-arabia.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/navigating_nca_ecc_saudi_arabia_national_cybersecurity_authority_essential_controls_penetration_testing_compliance_kingdom_framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/nis2-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/nist-800-53-rev-5-resilience-doctrine-enforcing-dora-and-nis2-non-negotiables-at.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/nist-800-53-rev-5-resilience-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/nist-800-53-rev5-resilience-doctrine-enforcing-dora-and-nis2-non-negotiables-at-institutional-scale-enterprise-resilienc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/offensive-security-in-practice-comprehensive-framework-penetration-testing-web-api-infrast.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/offensive-security-in-practice-comprehensive-framework-penetration-testing-web.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/offensive-security-in-practice.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/offensive_security_in_practice_comprehensive_framework_penetration_testing_web_api_infrastructure_methodology_governance_flagship_edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational doctrine for responsible ai engineering - the engineering playbook for operationalising ai ethics at enterprise scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational resilience by design engineering zero-downtime operations - disciplined change management and validation - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational resilience by design the governance doctrine for essential entity survival.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-doctrine-for-responsible-ai-engineering-the-engineering-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-doctrine-responsible-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-as-doctrine-architecting-zero-failure-enterprises-under-nist-and-iso-27001-mandate-enterprise-res.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-as-doctrine-architecting-zero-failure-enterprises-under-nist-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-by-design-engineering-zero-downtime-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-by-design-the-governance-doctrine-for-essential-entity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-by-design.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-in-smart-buildings-designing-for-zero-material-incidents-failover.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-under-regulation-translating-caf-assessments-into.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-resilience-under-regulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operational-technology-security-under-sabsa-bridging-it-ot-convergence-iec62443.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security-perimeter-doctrine-level-implementation-framework-for-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/owning-the-risk-engineering-risk-registers-that-drive-board-level-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/patch-pray-repeat-why-traditional-linux-security-fails-at-scale-engineering-cis-hardened-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/payload-denied-why-ransomware-fails-when-the-database-refuses-to-serve-the-data-layer-refusal-mechanism-for-active-loss-prevention.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/policy-as-code-at-runtime-ognl-driven-federation-routing-and-dynamic-authorisati.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/policy-as-code-at-runtime-ognl-driven-federation-routing-and-dynamic-authorisation-decisio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/policy-as-code-at-runtime-ognl-driven-federation-routing-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/policy-as-code-at-runtime.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/post-merger-identity-consolidation-using-federation-to-abstr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/post-merger-identity-consolidation-using-federation-to-abstract-and-control-mult.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/post-merger-identity-consolidation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/post-quantum-readiness-architecting-cryptographic-agility-with-sabsa-nist-fips-2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/post-quantum-readiness-architecting-cryptographic-agility-with-sabsa-nist-fips.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/predictive-facilities-management-ai-driven-asset-health-sensor-fed-maintenance-and-the.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/prevention is dead the rise of resilience-based ai risk governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/prevention-is-dead-the-rise-of-resilience-based-ai-risk-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/prevention-is-dead.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privacy-operations-are-becoming-frontline-cybersecurity-data-lineage-sovereignty-subject-right-laten.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privacy-operations-are-becoming-frontline-cybersecurity-data-lineage-sovereignty-subject-right-latency-privacy-resilience-convergence-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privacy-operations-are-becoming-frontline-cybersecurity-data-lineage-sovereignty.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privileged access as regulated infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privileged-access-as-regulated-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privileged-access-regulated-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privileged-users-do-not-need-malware-they-need-sql-access-the-insider-threat-doctrine-for-imperva-dam-and-privileged-database-activity-monitoring.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/privileged-users-don-t-need-malware-they-need-sql-access-the-insider-threat-doctrine-for-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/product security as doctrine - board-grade model cra nis2 sbom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/product-security-as-doctrine-board-grade-model-cra-nis2-sbom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/product-security-as-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/prohibited-vs-restricted-triage-classifier-doctrine-for-doj-28-cfr-202-decisions-bre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/prohibited-vs-restricted-triage-classifier-doctrine-for-doj-28-cfr-202-decisions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/provable autonomy - the governance architecture for mission-critical ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/provable-autonomy-the-governance-architecture-for-mission-critical-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/provable-autonomy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/publications.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/purview-as-the-trust-ledger-turning-data-classification-into-commercial-proof-commercially-weaponised-cyber-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/quantum-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/red-team-insights-blue-team-resilience-purple-team-methodology-closing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/red-team-insights-blue-team-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/red_team_insights_blue_team_resilience_purple_team_methodology_closing_detection_response_gap_enterprise_security_operations_centre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulation as code - operationalising cra nis2 dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulation-as-code-operationalising-cra-nis2-dora.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulation-as-code.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulators-dont-care-that-the-spreadsheet-is-green-why-control-attestation-without-evidence-grade-te.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-confidence-engineering-designing-cyber-programmes-built-to-withstand-nis-and-of.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-confidence-engineering-designing-cyber-programmes-built-to-withstand.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-confidence-engineering.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-delivery.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-hub.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-product-security-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/regulatory-readiness-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-armageddon-doctrine-drp-architectures-for-post-cra-institutional-survival-and-continuity-supremacy-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-armageddon-doctrine-drp-architectures-for-post-cra-institutional-survival-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-armageddon-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-by-design-doctrine-engineering-self-healing-infrastructure-under-nist-csf-and-iso-27001-control-regimes-enter.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-by-design-doctrine-engineering-self-healing-infrastructure-under-nist-csf-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-by-design-doctrine-engineering-self-healing-infrastructure-under.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-command-doctrine-nist-and-iso-aligned-disaster-recovery-that-eliminates-regulatory-exposure-enterprise-resili.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-command-doctrine-nist-and-iso-aligned-disaster-recovery-that-eliminates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-command-doctrine-nist-and-iso-aligned-disaster-recovery-that.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-reckoning-doctrine-board-level-mandates-that-enforce-continuity-under-systemic-risk-enterprise-resilience-sov.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-reckoning-doctrine-board-level-mandates-that-enforce-continuity-under-systemic.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-reckoning-doctrine-board-level-mandates-that-enforce-continuity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-redlines-the-nist-aligned-survival-doctrine-every-accountable-ciso-must-enforce-enterprise-resilience-soverei.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-redlines-the-nist-aligned-survival-doctrine-every-accountable-ciso-must.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-redlines-the-nist-aligned-survival-doctrine-every-accountable-ciso.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-regime-doctrine-nist-and-iso-aligned-ciso-mandates-for-elite-institutional-engagements-enterprise-resilience-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-regime-doctrine-nist-and-iso-aligned-ciso-mandates-for-elite-institutional.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilience-regime-doctrine-nist-and-iso-aligned-ciso-mandates-for-elite.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilient runways deterministic network architecture for air traffic - fault-tolerant network fabrics for aviation - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilient-runways-deterministic-network-architecture-for-air-traffic-fault.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/resilient-runways.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption-embedding-threat-modelling-and-ma-cyber-due-diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/rnd-data-governance-in-the-age-of-geopolitics-geopolitical-doctrine-compass-fram.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/rnd-data-governance-in-the-age-of-geopolitics-geopolitical-doctrine-compass-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sabsa-centric-enterprise-security-architecting-nis2-ready-iso27001-aligned-resil.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sabsa-centric-enterprise-security-architecting-nis2-ready-iso27001-aligned.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sabsa-for-supply-chain-security-architecting-resilience-across-third-party-ecosy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sabsa-for-supply-chain-security-architecting-resilience-across-third-party.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sap-payroll-transformation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/saviynt iga at scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/saviynt sod new control plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/saviynt-iga-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/saviynt-sod-new-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/saviynt-sod-the-new-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sdf-board-governance-infographic-v5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sdf-board-governance-infographic.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sdf_board_governance_infographic v5.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/secure by design prove by evidence - product security doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/secure-by-design-iot-infrastructure-embedding-identity-trust-and-segmentation-into-smart.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/secure-by-design-prove-by-evidence-product-security-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/secure-by-design-prove-by-evidence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing generative ai in schools - a red team-driven framework for safeguarding, compliance, and risk reduction.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing the skies zero trust micro-segmentation in aviation ot it - policy-driven network isolation for aviation - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises-prescriptive-architecture-patterns-for-multi-subscription-estates.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-genai-in-schools.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-generative-ai-in-schools-a-red-team-driven-framework-for-safeguarding.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-azure-transformation-journey-embedding-security-from-strategy-to-execution-a-comprehensive-transformation-security-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-azure-transformation-journey-embedding-security-from-strategy-to.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture-mcra-in-ksa-enterprises-a-practitioner-level-guide.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-skies-zero-trust-micro-segmentation-in-aviation-ot-it-policy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-skies.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/securing-the-smart-estate-cyber-assurance-across-iot-ot-bms-using-iec-62443-and-zero.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-assurance-in-azure-transformation-programmes-frameworks-controls-and-governance-a-comprehensive-enterprise-assurance-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-assurance-in-azure-transformation-programmes-frameworks-controls-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-reporting-that-drives-action-translate-technical-penetration-test.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-reporting-that-drives-action.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-teams-are-drowning-in-telemetry-volumetric-discipline-schema-sovereignt.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-teams-are-drowning-in-telemetry-volumetric-discipline-schema-sovereignty-and-why-less-data-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security-teams-are-drowning-in-telemetry-volumetric-discipline-schema-sovereignty-and-why-less-data-will-save-the-modern-soc-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/security_reporting_that_drives_action_translate_technical_penetration_test_findings_board_level_risk_decisions_executive_governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sentinel-for-financially-disciplined-detection-keeping-the-evidence-without-funding-the-noise-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/shadow-ai-shadow-saas-shadow-egress-the-new-commercial-risk-layer-enterprises-cannot-ignore-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/shadow-databases-real-liability-discovering-and-governing-the-databases-nobody-admits-exist-continuous-discovery-as-a-board-level-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/simulating-the-adversary-tiber-eu-dora-tlpt-threat-led-penetration-testing-financial-servi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/simulating-the-adversary-tiber-eu-dora-tlpt-threat-led-penetration-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/simulating-the-adversary.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/simulating_the_adversary_tiber_eu_dora_tlpt_threat_led_penetration_testing_financial_services_sector_architecture_framework_flagship_edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/smart-buildings-at-scale-delivering-iot-enabled-enterprise-estates-with-measurable-energy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/soc20-master-reference-card-strategic-reference-for-tier-1-banks-cni-operators-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/soc20-master-reference-card-strategic-reference-for-tier-1-banks-cni-operators-insurers-and-public-s.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/soc20-master-reference-card-strategic-reference-for-tier-1-banks-cni-operators-insurers-and-public-sector-boards-operating-under-regulatory-scrutiny.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-banking-protocol.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure-architecture-satisfying-kingdom-sovereignty-requirements.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-courtroom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-defensibility-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/sovereign-zero-trust-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/stop-sending-me-50000-vulnerabilities-tell-me-which-five-matter-engineering-the-prioritisation-funct.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/strategic-resilience-command-converting-bcp-and-drp-into-executive-level-risk-control-and-revenue-protection-systems-ent.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/strategic-resilience-command-converting-bcp-and-drp-into-executive-level-risk-control-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/strategic-resilience-command-converting-bcp-and-drp-into-executive-level-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/synthetic intelligence as a service - orchestrating the judicial api ecosystem - designing the api layer for national judicial intelligence services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/synthetic-intelligence-as-a-service-orchestrating-the-judicial-api-ecosystem.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/synthetic-intelligence-as-a-service.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/tabletop-to-reality-designing-high-fidelity-cyber-exercises-that-demonstrably.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/terminology-translation-table-addendum-to-paper-21-mapping-p.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/terminology-translation-table-addendum-to-paper-21-mapping-prior-paper-vocabular.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/terminology-translation-table-addendum-to-paper-21-mapping-prior-paper-vocabulary-ingestio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/terminology-translation-table.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing-modern-attack-surface-cloud-container-api-mobile-security-validation-post-perimete.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing-modern-attack-surface-cloud-container-api-mobile-security-validation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing-the-modern-attack-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing-the-system-not-the-slides-advanced-tabletop-methodologies-for-operators.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing-the-system-not-the-slides.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/testing_modern_attack_surface_cloud_container_api_mobile_security_validation_post_perimeter_enterprise_architecture_governance_flagship_edition.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the 2035 breakpoint  ai, cryptographic collapse, and the end of voluntary security models.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the 4-hour clock board liability in the age of dora, nis2, and ai regulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the agentic ai attack surface - autonomous agents, tool misuse, and the rise of machine-speed e.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the agentic autonomy protocol - governing non-human identities in the autonomous enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the agentic risk doctrine - board-level control of autonomous ai before it controls you.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the agentic risk doctrine - tech specs. pdf.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the ai security - assurance crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the ai-driven threat frontier - zero trust, identity & supply chain resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the api-first ai state - reusable intelligence services for government - designing composable ai services for cross-government interoperability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the architecture of accountability - designing observability and compliance into ai - building auditable transparent and compliant ai from the ground up.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the auditory record - architecting sovereign fidelity in automated judicial transcription - a doctrine-level blueprint for national-scale speech sovereignty.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the boardroom cyber playbook - governance, resilience, and value creation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the ciso autonomy mandate - command, control, and governance for agentic ai systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the ciso identity mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the ciso_transformation_playbook from cost centre to chief trust officer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the conformity advantage - product security as differentiator.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the defensible ciso - an evidence-based ai risk doctrine for regulatory and board assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the future of privileged access zsp jit vault architecture - securing administrative power in high-trust environments - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the governance deficit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the governance premium - repricing cyber risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the identity control plane - zero-trust governance for agentic ai and regulated enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the identity hegemony.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the identity moat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the identity utility - architecting global iam as foundational gxp infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the institutional liability doctrine - governance as legal infrastructure in the autonomous a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the integration imperative.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the n-ary mandate - using hyperedge knowledge graphs to eliminate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the regulatory product security doctrine - audit-proof software at scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the regulatory readiness playbook - cra nis2 engineering control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the resilience mandate - engineering stability in national transcription systems - operational resilience engineering for mission-critical judicial ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the responsible core - institutionalizing evaluation and ethical guardrails in government llms - a governance framework for responsible ai deployment in public sector.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the sap payroll transformation playbook - mitigating risk and maximizing value in.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the semantic gavel - precision llm-summarisation in high-stakes litigation - engineering legal-grade ai summarisation for court proceedings.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the sovereign  defensibility framework full.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the sovereign banking protocol - architecting regulatory-controlled pam, grc , autonomous defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the sovereign courtroom - scaling azure ai for resilient legal operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the sovereign zero trust model - data immunity and supply chain resilience in 2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the trust fabric identity network and governance in one security model - converging iam and policy governance - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the velocity mandate -ciso architecture for the zero-latency agentic enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the zero-hour doctrine - how leaders prevent institutional collapse in the age of algorithmic crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-10m-query-how-one-unmonitored-database-action-becomes-board-level-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-2035-breakpoint-ai-cryptographic-collapse-and-the-end-of-voluntary-security.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-247-soc-optimising-siem-soar-workflows-real-time-threat-detection-incident-response-fi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-247-soc-optimising-siem-soar-workflows-real-time-threat-detection-incident.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-247-soc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-36-hour-compliance-model-thirty-six-hour-velocity-doctrine-velocity-framewor.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-36-hour-compliance-model-thirty-six-hour-velocity-doctrine-velocity-framework-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-4-hour-clock-board-liability-in-the-age-of-dora-nis2-and-ai-regulation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-600-a-day-fixer-why-fragile-dam-estates-need-senior-engineering-not-more-dashboards.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-ai-attack-surface-attack-surface-doctrine-sentinel-framework-for-age.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-ai-attack-surface-attack-surface-doctrine-sentinel-framework-for-agentic-ai.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-ai-attack-surface-autonomous-agents-tool-misuse-and-the-rise-of.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-ai-threat-why-database-attacks-no-longer-look-human-detecting-autonomous-sql-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-autonomy-protocol-governing-non-human-identities-in-the-autonomous.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-risk-doctrine-board-level-control-of-autonomous-ai-before-it.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-agentic-risk-doctrine-tech-specs-pdf.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ai-assurance-stack-protecting-regulated-data-across-copilot-saas-endpoint-and-cloud-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ai-driven-threat-frontier-zero-trust-identity-supply-chain-resilience.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ai-leakage-market-how-uncontrolled-prompts-could-become-the-next-enterprise-liability-shock-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ai-security-assurance-crisis.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-api-first-ai-state-reusable-intelligence-services-for-government-designing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-api-first-ai-state.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-architecture-of-accountability-designing-observability-and-compliance-into.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-architecture-of-accountability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-audit-trail-is-now-a-battlefield-how-dam-telemetry-became-the-primary-evidence-surface.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-auditory-record-architecting-sovereign-fidelity-in-automated-judicial.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-auditory-record.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-authentication-tier-engineering-pingfederate-as-tier-0-f.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-authentication-tier-engineering-pingfederate-as-tier-0-financial-infrastruct.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-authentication-tier-engineering-pingfederate-as-tier-0-financial-infrastructure-a-comm.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-authentication-tier.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-autonomous-dba-is-coming-governing-ai-assisted-database-administration-and-self-healing-systems-operational-oversight-for-machine-driven-database.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-autonomous-soc-is-no-longer-optional-decision-rights-provable-autonomy-and-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-autonomous-soc-is-no-longer-optional-decision-rights-provable-autonomy-and-the-architecture-of-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-autonomous-soc-is-no-longer-optional-decision-rights-provable-autonomy-and-the-architecture-of-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-autonomous-soc-is-no-longer-optional-decision-rights-provable-autonomy-and-the-architecture-of-trust-at-machine-speed-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-board-doesnt-need-dashboards-it-needs-decisions-decision-grade-cyber-reporting-for-regulated-boa.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-boardroom-cyber-playbook-governance-resilience-and-value-creation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-boardroom-data-boundary-why-privacy-dlp-and-ai-governance-are-becoming-one-buying-decision-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-boardroom-ultimatum-stop-logging-breaches-start-blocking-loss-active-data-layer-enforcement-as-board-level-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-breach-hurts-the-bad-response-destroys-trust-engineering-the-disclosure-and-remediation-choreogr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-breach-report-starts-with-one-missing-audit-event-how-a-single-dam-telemetry-gap-becom.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-canonical-evidence-and-reproducibility-doctrine-what-every-volume-must-prove-bre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-canonical-evidence-and-reproducibility-doctrine-what-every-volume-must-prove.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ciso-autonomy-mandate-command-control-and-governance-for-agentic-ai-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ciso-identity-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ciso-transformation-playbook-from-cost-centre-to-chief-trust-officer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-cisos-ledger-proving-database-security-roi-before-the-breach-cfo-ready-loss-aversion-economics-for-database-monitoring-investment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-client-data-custody-premium-how-strong-information-controls-win-high-value-enterprise-deals-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-client-data-trust-premium-how-database-monitoring-creates-pricing-power-and-retention-margin-trust-as-a-quantifiable-database-backed-commercial-asset.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-cloud-provider-owns-the-platform-you-own-the-misconfiguration-operationalising-shared-responsibi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-commercial-edge-of-digital-twins-from-demo-asset-to-production-grade-operational.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-compliance-edge-turning-database-security-into-a-sales-weapon-evidence-led-differentiation-in-enterprise-vendor-reviews-and-rfp-cycles.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-conformity-advantage-product-security-as-differentiator.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-continuity-doctrine-unifying-bcp-drp-and-cyber-resilience-into-a-single-operational-command-system-enterprise-resili.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-continuity-doctrine-unifying-bcp-drp-and-cyber-resilience-into-a-single-operational.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-continuity-doctrine-unifying-bcp-drp-and-cyber-resilience-into-a-single.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-data-escape-economy-why-enterprise-buyers-will-pay-a-premium-for-provable-information-control-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-data-heist-kill-chain-mapping-attacker-progression-from-identity-compromise-to-monetisation-an-end-to-end-operating-model-for-stopping-data-theft.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-data-risk-engine-unified-data-risk-engine-doctrine-nexus-framework-for-natio.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-data-risk-engine-unified-data-risk-engine-doctrine-nexus-framework-for-national.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-data-sovereignty-control-room-operating-model-for-cross-border-data-governance-sovereignty-as-a-live-operational-discipline-not-a-map.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-database-was-monitored-then-show-me-the-evidence-the-evidence-chain-model-for-dam-audi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-day-zero-m-and-a-database-risk-deploying-database-monitoring-as-a-day-one-acquisition-control-inherited-breach-debt-and-the-cyber-due-diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-death-of-manual-incident-response-closed-loop-containment-evidence-first-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-death-of-manual-incident-response-closed-loop-containment-evidence-first-forensics-and-the-end-o.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-death-of-manual-incident-response-closed-loop-containment-evidence-first-forensics-and-the-end-of-the-heroic-analyst-model-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-defensible-ciso-an-evidence-based-ai-risk-doctrine-for-regulatory-and-board.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-digital-twin-mandate-from-static-asset-register-to-live-operational-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-endpoint-trust-premium-why-device-integrity-is-becoming-a-contractual-asset-commercially-weaponised-cyber-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-enterprises-winning-cybersecuritys-ai-era-all-operate-differently-operating-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-enterprises-winning-cybersecuritys-ai-era-all-operate-differently-operating-model-doctrine-for-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-enterprises-winning-cybersecuritys-ai-era-all-operate-differently-operating-model-doctrine-for-institutions-to-compound-advantage-over-the-next-decade.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ephemeral-vault-securing-databases-that-exist-for-minutes-not-months-continuous-control-for-short-lived-auto-scaling-data-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-exception-became-the-exploit-whitelist-debt-bypass-rules-and-untested-policy-exceptions-exception-burn-down-as-a-continuous-security-function.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-extortionists-dead-end-killing-data-heists-before-the-ransom-note-pre-exfiltration-defence-doctrine-for-the-modern-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-frictionless-laboratory-frictionless-security-doctrine-prism-framework-for-s.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-frictionless-laboratory-frictionless-security-doctrine-prism-framework-for-science.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-future-of-privileged-access-zsp-jit-vault-architecture-securing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-future-of-privileged-access.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-future-soc-will-be-smaller-faster-and-ai-led-operating-model-re-architecture-for-the-compressed-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-future-soc-will-be-smaller-faster-and-ai-led-operating-model-re-architecture-for-the-compressed-defence-loop-industrial-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-future-soc-will-be-smaller-faster-and-ai-led-operating-model-re-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-gbp10m-query-how-one-unmonitored-database-action-becomes-board-level-risk-a-doctrine-for-imperva-dam-audit-integrity-financial-services.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-gbp600-a-day-fixer-why-fragile-dam-estates-need-senior-engineering-not-more-dashboards-a-contract-engineering-doctrine-for-imperva-linux-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-global-transfer-impact-doctrine-atlas-framework-mastering-schrems-ii-and-exe.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-global-transfer-impact-doctrine-atlas-framework-mastering-schrems-ii-and-executive.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-governance-deficit.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-governance-premium-pricing-underwriting-and-deal-economics-bre-edition-sover.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-governance-premium-pricing-underwriting-and-deal-economics-bre-edition-sovereign.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-governance-premium-repricing-cyber-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-doctrine-spiffe-oidc-pam-and-delegated-agent-identity-bre.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-doctrine-spiffe-oidc-pam-and-delegated-agent-identity.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-doctrine-the-master-volume-of-the-institutional-doctr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-doctrine-the-master-volume-of-the.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-federation-as-real-time-banking-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-federation-as-real-time-banking-infrastructure-a-doct.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-one-page-architecture-diagram-add.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-one-page-architecture-diagram-addendum-to-paper-21-vi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-one-page-architecture-diagram.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane-zero-trust-governance-for-agentic-ai-and-regulated.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-control-plane.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-hegemony.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-moat.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-identity-utility-architecting-global-iam-as-foundational-gxp-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-institutional-liability-doctrine-governance-as-legal-infrastructure-in-the.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-integration-factory-a-java-adapter-framework-for-industr.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-integration-factory-a-java-adapter-framework-for-industrial-scale-identity-o.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-integration-factory-a-java-adapter-framework-for-industrial-scale-identity-onboarding.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-integration-factory.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-integration-imperative.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-intelligent-estate-aligning-iot-bms-digital-twins-and-esg-into-a-unified-operational.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-invisible-breach-thesis-why-boards-need-threat-hunting-before-the-first-alert-fires-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-last-mile-of-cyber-governance-where-nis-programmes-fail-and-how-to-engineer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-last-mile-of-cyber-governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-logs-were-there-the-detection-was-not-closing-the-siem-to-dam-telemetry-gap-that-hides-privileged-database-compromise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-logs-were-there-the-detection-wasn-t-closing-the-siem-to-dam-telemetry-gap-that-hides-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-machine-identity-data-heist-when-the-attacker-borrows-a-machine-not-a-password-compromise-attribution-for-non-human-actors-at-the-data-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-microsoft-security-flywheel-how-purview-defender-xdr-sentinel-and-priva-compound-commercial-trust-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-modern-penetration-testers-playbook.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-n-ary-mandate-using-hyperedge-knowledge-graphs-to-eliminate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-next-cyber-breach-wont-look-like-the-last-one-adversary-decomposition-patter.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-next-cyber-breach-wont-look-like-the-last-one-adversary-decomposition-pattern-drift-and-why-his.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-next-cyber-breach-wont-look-like-the-last-one-adversary-decomposition-pattern-drift-and-why-hist.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-next-cyber-breach-wont-look-like-the-last-one-adversary-decomposition-pattern-drift-and-why-historical-playbooks-are-now-a-liability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ofgem-compliance-paradox-moving-from-checkbox-security-to-measurable-risk.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-ot-it-convergence-blueprint-applying-the-purdue-model-to-secure-building-management.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-practitioners-manifesto-forge-framework-against-advisory-compliance-models-i.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-practitioners-manifesto-forge-framework-against-advisory-compliance-models.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-prompt-to-sql-control-gap-governing-enterprise-ai-copilots-at-the-database-boundary-two-actor-accountability-for-prompt-driven-query-workflows.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-proof-of-control-advantage-why-procurement-teams-are-starting-to-buy-evidence-not-security-claims-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-protocol-stack-lorawan-zigbee-ble-nb-iot-and-multi-protocol-iot-integration-across.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-real-cost-of-weak-security-operations-its-not-the-breach-its-the-exposure-ti.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-real-cost-of-weak-security-operations-its-not-the-breach-its-the-exposure-time-pricing-operation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-real-cost-of-weak-security-operations-its-not-the-breach-its-the-exposure-time-pricing-operational-latency-as-a-fiduciary-loss-class.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-regulated-data-flightpath-mapping-how-sensitive-information-moves-before-it-becomes-a-breach-commercially-weaponised.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-regulatory-product-security-doctrine-audit-proof-software-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-regulatory-readiness-playbook-cra-nis2-engineering-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-resilience-mandate-engineering-stability-in-national-transcription-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-resilience-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-responsible-core-institutionalizing-evaluation-and-ethical-guardrails-in.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-responsible-core.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-revenue-database-is-now-a-risk-asset-securing-the-systems-where-revenue-becomes-fragile-operational-resilience-doctrine-for-revenue-bearing-databases.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sabsa-board-reporting-framework-communicating-cyber-risk-at-executive-level.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sabsa-sovereignty-model-unifying-nis2-gdpr-iec62443-defensible-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sap-payroll-transformation-playbook-mitigating-risk-and-maximizing-value-in.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-secure-building-protocol-iec-62443-alignment-ot-network-segmentation-and-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-semantic-gavel-precision-llm-summarisation-in-high-stakes-litigation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-semantic-gavel.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-siem-margin-trap-why-uncontrolled-log-growth-is-becoming-a-cybersecurity-profit-problem-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-silent-breach-layer-why-banks-still-can-t-see-their-database-risk-the-hidden-cost-of-d.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-silent-breach-layer-why-banks-still-cannot-see-their-database-risk-the-hidden-cost-of-dam-drift-agent-sprawl-and-policy-decay-in-tier-1.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-six-month-turnaround-rescuing-imperva-dam-before-it-becomes-the-risk-a-26-week-operati.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-smart-building-programme-playbook-governance-risk-control-and-delivery-assurance-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-banking-protocol-architecting-regulatory-controlled-pam-grc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-courtroom-scaling-azure-ai-for-resilient-legal-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-data-shield-the-definitive-doj-28-cfr-202-operational-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-defensibility-framework-full.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-estate-protocol-governance-architecture-for-secure-intelligent-netzero.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-sovereign-zero-trust-model-data-immunity-and-supply-chain-resilience-in-2026.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-space-dividend-achieving-25-to-35-estate-cost-reduction-through-occupancy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-supplier-says-secure-the-database-says-prove-it-verifying-third-party-assurance-with-telemetry-supplier-assurance-verified-at-the-data-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-trust-fabric-identity-network-and-governance-in-one-security-model.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-trust-fabric.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-unified-regulatory-framework-unified-operating-model-doctrine-oracle-framewo.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-unified-regulatory-framework-unified-operating-model-doctrine-oracle-framework-global.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-unified-shield-architecting-detection-and-response-with-microsoft-defender-and-sentinel-converging-xdr-and-siem-for-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-unified-shield-architecting-detection-and-response-with-microsoft-defender.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-velocity-mandate-ciso-architecture-for-the-zero-latency-agentic-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-vendor-risk-shortcut-how-xdr-evidence-can-collapse-months-of-enterprise-security-review-commercially-weaponised-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-window-of-exposure-is-killing-enterprise-security-time-to-detect-time-to-dec.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-window-of-exposure-is-killing-enterprise-security-time-to-detect-time-to-decide-time-to-recover-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-window-of-exposure-is-killing-enterprise-security-time-to-detect-time-to-decide-time-to-recover-engineering-the-three-clock-defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-zero-hour-doctrine-how-leaders-prevent-institutional-collapse-in-the-age-of.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-zero-hour-doctrine-zero-hour-institutional-failure-doctrine-aeon-framework-f.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the-zero-hour-doctrine-zero-hour-institutional-failure-doctrine-aeon-framework-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/the_247_soc_optimising_siem_soar_workflows_real_time_threat_detection_incident_response_financial_services_operations_governance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat management for 24x7 operations networks - detection engineering and soc runbooks for critical infrastructure - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-detection-through-offensive-testing-red-team-operations-expose-siem-gaps.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-detection-through-offensive-testing.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-intelligence-integration-within-sabsa-contextual-to-operational-defence-m.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-intelligence-integration-within-sabsa-contextual-to-operational-defence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-management-24x7-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-management-for-24x7-operations-networks-detection-engineering-and-soc.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-management-for-24x7-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat-radar.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/threat_detection_through_offensive_testing_red_team_operations_expose_siem_gaps_harden_detection_rules_real_time_response_capability.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/token-issuance-as-a-security-boundary-engineering-oauth2-and-oidc-pipelines-for-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/token-issuance-as-a-security-boundary-engineering-oauth2-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/token-issuance-as-a-security-boundary.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise-azure-environments-five-stage-quantified-assessment-framework.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/velocity-mandate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/viewer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/visibility-without-remediation-is-just-a-better-view-of-the-fire-engineering-remediation-velocity-an.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/we-have-imperva-good-now-prove-it-works-the-six-pillar-operational-assurance-framework-for.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/web-application-security-in-depth-owasp-top-10-business-logic-flaws-zero-day.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/web-application-security-in-depth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/web_application_security_in_depth_owasp_top_10_business_logic_flaws_zero_day_discovery_penetration_testing_framework_practitioners.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/why ai pilots fail - under regulatory scrutiny  the 90-day control architecture for enterprise deployment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/why-ai-pilots-fail-under-regulatory-scrutiny-the-90-day-control-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/why-ai-pilots-fail.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp01-the-extortionists-dead-end-killing-data-heists-before-the-ransom-note-pre-exfiltration-defence-doctrine-for-the-modern-enterprise.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp01-the-sovereign-estate-protocol-governance-architecture-for-secure-intelligent-netzero.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp02-payload-denied-why-ransomware-fails-when-the-database-refuses-to-serve-the-data-layer-refusal-mechanism-for-active-loss-prevention.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp02-smart-buildings-at-scale-delivering-iot-enabled-enterprise-estates-with-measurable.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp03-the-intelligent-estate-aligning-iot-bms-digital-twins-and-esg-into-a-unified.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp03-the-prompt-to-sql-control-gap-governing-enterprise-ai-copilots-at-the-database-boundary-two-actor-accountability-for-prompt-driven-query-workflows.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp04-api-shadows-and-phantom-queries-securing-non-human-database-identities-in-the-cloud-era-behavioural-identity-for-service-accounts-apis-and-batch-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp04-securing-the-smart-estate-cyber-assurance-across-iot-ot-bms-using-iec-62443-and-zero.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp05-the-machine-identity-data-heist-when-the-attacker-borrows-a-machine-not-a-password-compromise-attribution-for-non-human-actors-at-the-data-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp05-the-smart-building-programme-playbook-governance-risk-control-and-delivery-assurance.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp06-shadow-databases-real-liability-discovering-and-governing-the-databases-nobody-admits-exist-continuous-discovery-as-a-board-level-control.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp06-the-space-dividend-achieving-25-to-35-estate-cost-reduction-through-occupancy.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp07-energy-optimisation-at-scale-hvac-demand-response-and-real-time-consumption.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp07-the-ephemeral-vault-securing-databases-that-exist-for-minutes-not-months-continuous-control-for-short-lived-auto-scaling-data-infrastructure.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp08-kubernetes-and-the-crown-jewels-modernising-database-monitoring-for-containerised-data-platforms-cloud-native-data-telemetry-for-dynamic-workloads.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp08-the-commercial-edge-of-digital-twins-from-demo-asset-to-production-grade-operational.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp09-de-risking-smart-building-programmes-risk-architecture-insurance-posture-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp09-the-day-zero-m-and-a-database-risk-deploying-database-monitoring-as-a-day-one-acquisition-control-inherited-breach-debt-and-the-cyber-due-diligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp10-monetising-the-smart-estate-commercial-models-capital-release-and-value-creation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp10-the-supplier-says-secure-the-database-says-prove-it-verifying-third-party-assurance-with-telemetry-supplier-assurance-verified-at-the-data-layer.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp11-break-glass-that-never-closed-governing-emergency-database-access-after-the-incident-ends-lifecycle-governance-for-temporary-privilege-and-crisis-exceptions.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp11-the-digital-twin-mandate-from-static-asset-register-to-live-operational-intelligence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp12-integrating-bms-and-iot-platforms-bacnet-modbus-knx-and-multi-vendor-convergence.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp12-the-exception-became-the-exploit-whitelist-debt-bypass-rules-and-untested-policy-exceptions-exception-burn-down-as-a-continuous-security-function.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp13-predictive-facilities-management-ai-driven-asset-health-sensor-fed-maintenance-and.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp13-the-compliance-edge-turning-database-security-into-a-sales-weapon-evidence-led-differentiation-in-enterprise-vendor-reviews-and-rfp-cycles.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp14-the-cisos-ledger-proving-database-security-roi-before-the-breach-cfo-ready-loss-aversion-economics-for-database-monitoring-investment.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp14-the-protocol-stack-lorawan-zigbee-ble-nb-iot-and-multi-protocol-iot-integration.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp15-from-legacy-bms-to-intelligent-buildings-a-practical-roadmap-for-enterprise-estate.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp15-the-boardroom-ultimatum-stop-logging-breaches-start-blocking-loss-active-data-layer-enforcement-as-board-level-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp16-the-data-sovereignty-control-room-operating-model-for-cross-border-data-governance-sovereignty-as-a-live-operational-discipline-not-a-map.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp16-the-secure-building-protocol-iec-62443-alignment-ot-network-segmentation-and-cyber.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp17-the-ot-it-convergence-blueprint-applying-the-purdue-model-to-secure-building.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp17-the-revenue-database-is-now-a-risk-asset-securing-the-systems-where-revenue-becomes-fragile-operational-resilience-doctrine-for-revenue-bearing-databases.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp18-operational-resilience-in-smart-buildings-designing-for-zero-material-incidents.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp18-the-client-data-trust-premium-how-database-monitoring-creates-pricing-power-and-retention-margin-trust-as-a-quantifiable-database-backed-commercial-asset.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp19-secure-by-design-iot-infrastructure-embedding-identity-trust-and-segmentation-into.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp19-the-autonomous-dba-is-coming-governing-ai-assisted-database-administration-and-self-healing-systems-operational-oversight-for-machine-driven-database.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp20-the-data-heist-kill-chain-mapping-attacker-progression-from-identity-compromise-to-monetisation-an-end-to-end-operating-model-for-stopping-data-theft.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/wp20-zero-carbon-by-architecture-delivering-net-zero-through-energy-intelligence-esg.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/you-are-not-under-tooled-you-are-over-tooled-and-still-blind-visibility-paradox-and-rationalisation-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/you-dont-need-another-security-tool-you-need-control-from-tool-sprawl-to-architectural-consolidation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-biggest-risk-may-be-someone-just-trying-to-get-work-done-faster-designing-out-insider-friction-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-incident-response-plan-will-fail-under-pressure-drill-discipline-decision-r.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-incident-response-plan-will-fail-under-pressure-drill-discipline-decision-rights-and-why-every-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-incident-response-plan-will-fail-under-pressure-drill-discipline-decision-rights-and-why-every-plan-should-be-stress-tested-quarterly-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-perimeter-is-fiction-your-vendors-are-inside-the-blast-radius-the-contract-control-matrix-for-t.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-security-stack-is-producing-noise-not-intelligence-signal-engineering-data-.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-security-stack-is-producing-noise-not-intelligence-signal-engineering-data-lineage-discipline-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-security-stack-is-producing-noise-not-intelligence-signal-engineering-data-lineage-discipline-and-the-industrialisation-of-detection-truth.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-siem-did-not-fail-your-data-strategy-did-rebuilding-the-detection-stack-from-the-database-outward-for-regulated-enterprises.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-siem-didn-t-fail-your-data-strategy-did-rebuilding-the-detection-stack-from-the-datab.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-soc-is-already-losing-why-conventional-security-operations-fail-against-vel.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-soc-is-already-losing-why-conventional-security-operations-fail-against-velocity-class-adversar.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-soc-is-already-losing-why-conventional-security-operations-fail-against-velocity-class-adversaries-and-what-replaces-them.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/your-soc-isnt-hunting-threats-its-drowning-in-noise-re-architecting-the-soc-from-triage-queue-to-hun.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero latency trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero trust identity at scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-carbon-by-architecture-delivering-net-zero-through-energy-intelligence-esg.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-hour-doctrine-abstract.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-hour-doctrine-publisher-abstract-v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-hour-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-latency-trust-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-latency-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-secret-architectures-federated-workload-identity-across-aws-azure-and-gcp-a-doctrine.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-secret-architectures-federated-workload-identity-across-aws-azure-and-gcp-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-secret-architectures-federated-workload-identity-across.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-secret-architectures.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-standing-privilege-jit-access-models-across-federated-a.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-standing-privilege-jit-access-models-across-federated-and-privileged-identi.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-standing-privilege-jit-access-models-across-federated-and-privileged-identity-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-standing-privilege.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-transfer-is-a-myth-realistic-transfer-doctrine-bridge-framework-operating-u.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-transfer-is-a-myth-realistic-transfer-doctrine-bridge-framework-operating-under-eo.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust ai architecture - securing autonomous agents, apis, and decision systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust identity governance and administration (iga).html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust segmentation for airport 24x7 operations networks - cisco aci and ngfw reference architecture - prof kieran upadrasta.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-ai-architecture-securing-autonomous-agents-apis-and-decision-systems.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-ai-architecture.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-airport-segmentation.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-identity-at-scale.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-identity-governance-and-administration-iga.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-iga.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-is-not-a-slide-it-is-an-enforcement-model-from-architectural-rhetoric-to-board-attestable.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-segmentation-for-airport-24x7-operations-networks-cisco-aci-and-ngfw.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-segmentation-for-airport-operations.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-transformation-integrating-sabsa-modern-network-security-nist-sp800-2.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust-transformation-integrating-sabsa-modern-network-security-nist-sp800.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero-trust.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/read/zero_hour_doctrine_publisher_abstract v7.html</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.80</priority>
  </url>

  <!-- ++ /docs/ direct PDF downloads ++ -->
  <url>
    <loc>https://kieparis.fr/docs/01-operationalising-ot-cyber-risk-a-board-to-plant-floor-operating-model-translating-risk-.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/01_Operationalising_OT_Cyber_Risk__A_Board-to-Plant-Floor_Operating_Model_Translating_Risk_Appetite_into_PLC_Configuration__v4.1.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/02-from-compliance-to-control-a-clause-by-clause-engineering-crosswalk-between-iec-62443-3.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/02_From_Compliance_to_Control__A_Clause-by-Clause_Engineering_Crosswalk_Between_IEC_62443-3-3_DORA_Chapter_III_and_NIS2_Article_21__v4.1.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/03-industrial-cyber-resilience-by-design-cyber-physical-systems-under-iec-61511-functional.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/03_Industrial_Cyber_Resilience_by_Design__Cyber-Physical_Systems_Under_IEC_61511_Functional_Safety_and_Adversarial_Cyber_Stress__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/04-engineering-survivable-ot-architectures-iec-62439-3-prp-hsr-graceful-degradation-and-is.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/04_Engineering_Survivable_OT_Architectures__IEC_62439-3_PRP-HSR_Graceful_Degradation_and_Island-Mode_Under_Adversarial_Compromise__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/05-quantifying-ot-risk-a-transparent-monte-carlo-method-for-translating-scada-ics-and-dcs-.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/05_Quantifying_OT_Risk__A_Transparent_Monte_Carlo_Method_for_Translating_SCADA_ICS_and_DCS_Threats_into_Defensible_Capital_Decisions__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/06-design-authority-for-industrial-networks-a-charter-operating-model-and-conflict-resolut.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/06_Design_Authority_for_Industrial_Networks__A_Charter_Operating_Model_and_Conflict-Resolution_Framework_for_IT-OT_Convergent_Network_Governance__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/07-enterprise-network-architecture-for-ot-evolving-purdue-modbus-dnp3-cip-dpi-micro-segmen.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/07_Enterprise_Network_Architecture_for_OT__Evolving_Purdue_—_Modbus-DNP3-CIP_DPI_Micro-Segmentation_and_IIoT_Vendor_Access__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/08-designing-hybrid-ot-connectivity-azure-aws-edge-and-data-centre-integration-under-laten.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/08_Designing_Hybrid_OT_Connectivity__Azure_AWS_Edge_and_Data-Centre_Integration_Under_Latency_and_Sovereignty_Constraints__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/09-governing-multi-vendor-network-architectures-in-critical-infrastructure-sboms-dora-ctpp.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/09_Governing_Multi-Vendor_Network_Architectures_in_Critical_Infrastructure__SBOMs_DORA_CTPP_and_Vendor-Governance_for_Industrial_Estates__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/10-industrial-network-resilience-profinet-irt-iec-61850-goose-bgp-mpls-failover-and-determ.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/10_Industrial_Network_Resilience__PROFINET_IRT_IEC_61850_GOOSE_BGP-MPLS_Failover_and_Deterministic_Networking_for_Mission-Critical_Industrial_Estates__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/11-zero-trust-for-ics-in-practice-identity-aware-overlays-protocol-proxies-and-lateral-mov.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/11_Zero_Trust_for_ICS_in_Practice__Identity-Aware_Overlays_Protocol_Proxies_and_Lateral-Movement_Defeat_for_Headless_Industrial_Devices__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/12-industrial-segmentation-reimagined-static-vlans-to-software-defined-plant-networks-with.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/12_Industrial_Segmentation_Reimagined__Static_VLANs_to_Software-Defined_Plant_Networks_with_Risk-Based_OT-Aware_Peer-to-Peer_Zones__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/13-designing-the-industrial-dmz-reverse-proxies-jump-servers-dual-homed-historians-and-dat.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/13_Designing_the_Industrial_DMZ__Reverse_Proxies_Jump_Servers_Dual-Homed_Historians_and_Data_Diodes_—_Engineering_the_IT-OT_Trust_Boundary__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14,400 seconds to comply - the sovereign ciso doctrine and the future of corporate cyber governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14-identity-and-privileged-access-in-ot-break-glass-procedures-just-in-time-vendor-access-.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14400_Seconds_to_Comply_Incident_Response_Doctrine_for_the_Sovereign_Enterprise_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_K_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/14_Identity_and_Privileged_Access_in_OT__Break-Glass_Procedures_Just-in-Time_Vendor_Access_and_the_MFA_Constraint_on_the_Plant_Floor__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/15-designing-active-active-active-architectures-for-scada-and-adms-distributed-c.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/15_SCADA_ADMS_Active-Active-Active_v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/16-failover-without-failure-engineering-sub-millisecond-continuity-in-industrial-control-s.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/16_Failover_Without_Failure__Engineering_Sub-Millisecond_Continuity_in_Industrial_Control_Systems_Using_IEC_62439-3_PRP-HSR__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/17-dependency-mapping-in-ot-systems-eliminating-hidden-single-points-of-failure-through-pa.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/17_Dependency_Mapping_in_OT_Systems__Eliminating_Hidden_Single_Points_of_Failure_Through_Passive_Discovery_and_Graph_Analysis__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/18-sacda-architecture-for-modern-industry-formal-specification-of-the-safe-autonomous-conn.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/18_SACDA_Architecture_for_Modern_Industry__Formal_Specification_of_the_Safe_Autonomous_Connected_Distributed_Edge-Native_Architecture__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/19-sacda-resilience-engineering-run-time-operationalisation-of-the-autonomous-edge-local-c.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/19_SACDA_Resilience_Engineering__Run-Time_Operationalisation_of_the_Autonomous_Edge_—_Local_Control_and_Telemetry_Queuing__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/20-industrial-transformation-without-downtime-ships-in-the-night-architecture-and-choreogr.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/2026 cyber risk reset- liability is the new attack surface.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/20_Industrial_Transformation_Without_Downtime__Ships-in-the-Night_Architecture_and_Choreographed_Cut-Over_for_24-7_Industrial_Estates__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/21-the-unified-industrial-resilience-model-a-mathematically-specified-empirically-calibrat.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/21_The_Unified_Industrial_Resilience_Model__A_Mathematically-Specified_Empirically-Calibrated_System_Unifying_the_Doctrine__v4.0.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/A Pentest Finds Holes Adversary Emulation Proves Whether Defence Wakes Up - From Scope Bound Pentests To TIBER EU Threat Led Emulation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/AI Governance Meets Cyber Governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/AI_Copilots_for_Compliance_What_to_Automate_What_to_Gate_What_to_Forbid_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/AI_Governance_and_Security_Architecture_Embedding_ISO42001_Within_SABSA_EU_AI_Act_High_Risk_AI_Management_System_Enterprise_Compliance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/AI_That_Survives_Court_Daubert_FRE_702_Defense_Doctrine_for_AI_Evidence_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/API_Shadows_and_Phantom_Queries_Securing_Non-Human_Database_Identities_in_the_Cloud_Era_Behavioural_Identity_for_Service_Accounts_APIs_and_Batch_Workloads.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/AUDIT-PROOF RESILIENCE DOCTRINE - Engineering Verifiable NIST-Aligned Disaster Recovery for High-Trust Institutions - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Adaptive_Authentication_at_Bank-Grade__Risk-Based_MFA_Engineered_to_Real-Time_Financial_Threat_Models_-_A_Decisioning_Doctrine_for_Authentication.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Agent_Sprawl_Policy_Drift_False_Assurance_The_Hidden_Failure_Modes_of_Imperva_DAM__A_Field_Doctrine_for_Recovering_Hardening_and_Operationalising.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Alert Fatigue Is Bankrupting Cybersecurity Teams - Recapitalising Operations Through Triage Doctrine Signal Engineering and Decision Rights.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Aligning_SABSA_with_EU_Regulatory_Frameworks_Practitioner_Guide_NIS2_DORA_GDPR_Multi_Framework_Architecture_Compliance_Convergence_Strategy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Always-On_Identity__Active-Active_Federation_with_Zero_Regional_Dependency_-_A_Resilience_Doctrine_for_Tier-0_Banking_Infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Are We Exposed - The Seven Minute Board Answer When A Named CVE Or Sector Incident Lands In The Chairmans Inbox - Operational Artefacts Edition for Tier-1.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Assurance Under Pressure - Delivering Regulatory-Grade Cyber Outcomes Against Fixed Deadlines in Mission-Critical Environments.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Attackers Dont Hack In Anymore They Log In - The Identity First Defensive Doctrine For Credentialled Intrusions - Institutional Doctrine Aligned to DORA.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Audit-Ready by Design - Embedding Continuous Compliance into High-Consequence Operating Environments Without Slowing the Business.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Audit_Response_and_v4_0_Differentiation_Specification_From_8_8_to_10_Per_Volume_Mandate_Sovereign_Doctrine_Series_Canonical_White_Paper_Edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Auditing_the_SABSA_Framework_Achieving_ISO27001_Compliance_Through_Architecture_Led_Assurance_Enterprise_Audit_Governance_Certification_Readiness.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Automated_Defence_Auditable_Outcomes_Making_Sentinel_Playbooks_Board-Defensible_Commercially_Weaponised_Cyber_Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Automation at Scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Autonomous_Containment_as_a_Business_Guarantee_The_XDR_Case_for_Faster_Contract_Confidence_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/BCP BATTLE DOCTRINE - Resilience Frameworks That Compel Executive Buy-In and Budget Allocation - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/BCP BLACK SWAN DOCTRINE - Engineering Continuity Systems That Sustain GBP 10B+ Operational Exposure Without Failure - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Beyond Perimeter Security.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Beyond Tick-Box Security - Engineering Defensible Assurance Outcomes Under NIS and Ofgem Oversight at National Enterprise Scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Beyond_Compliance_How_SABSA_Transforms_Security_Architecture_into_Business_Value_ROI_Competitive_Advantage_Procurement_Board_Confidence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Beyond_RBAC__Attribute-Driven_Authorisation_for_Cloud-Scale_Financial_Data_Systems_-_A_Doctrine_for_Dynamic_Entitlement_at_Petabyte_Scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Board-Grade Cyber Resilience.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Boards Still Dont Understand Cyber Risk - Translating Operational Telemetry into Fiduciary Decision Making Under DORA NIS2 and ISO 42001.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Break-Glass_That_Never_Closed_Governing_Emergency_Database_Access_After_the_Incident_Ends_Lifecycle_Governance_for_Temporary_Privilege_and_Crisis_Exceptions.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Bridging Strategy and Execution - Building Cyber Risk Governance That Holds in Energy and Utilities Regulated Operating Environments.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Bridging Strategy and Execution.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Building_Resilient_Architectures_SABSA_Applied_Critical_Infrastructure_Protection_NIS2_IEC62443_NIST_CSF_Operational_Continuity_Defence_Strategy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/CAF in Practice - Designing, Executing and Defending Cyber Assessment Campaigns End-to-End Under Full Regulator Oversight.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/CYBER RESILIENCE AS A REVENUE ENGINE - Converting ISO 27001 and NIST Compliance into Contract-Dominating Capability - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cisco ACI Deep Dive.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Citrix NetScaler and F5.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Clinical_Data_Sovereignty_AEGIS_US_EU_UK_APAC_Conflict_Resolution_and_Arbitration_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cloud_Security_Architecture_Under_SABSA_Navigating_Multi_Cloud_Complexity_NIS2_Alignment_Enterprise_Cloud_Security_Doctrine_Regulated_Sector.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Compliance Is Not Resilience Prove The Business Can Survive - The Recoverability Mandate Doctrine Under DORA Article 11 - Polished Operational Artefact for.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Compliance Wont Save You Operational Resilience Will - From Tick Box Audit to Proven Survival DORA NIS2 and Architecture of Defensible Continuity.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Compliance_Passed_Security_Failed_The_Operational_Reality_Gap__The_Operational_Reality_Gap_Between_PCI_DSS_SOX_Attestations_and_Database_Threat.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Continuous_Identity_Assurance__Automated_Testing_Observability_and_Runtime_Validation_of_IAM_Systems_-_A_Doctrine_for_Always-Verified_Control.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cyber Governance for the Regulated Enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cyber Maturity as a Currency - Redefining Assurance Through NIS2 and CAF Self-Assessment Frameworks for Regulated Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cyber Resilience in Operational Technology - Meeting Ofgem Expectations Without Slowing the Grid in Energy and Utilities Environments.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cyber Risk Is Now a Revenue Problem - Acquisition Velocity Underwriter Behaviour and Repricing of Cyber Posture in M and A and Capital Markets.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Cybersecuritys AI Arms Race Has Already Started - Adversarial Models Defensive Reflexes and the Strategic Repricing of Cyber Risk Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/DORA_Aligned_Architecture_Using_SABSA_to_Meet_Digital_Operational_Resilience_Requirements_Financial_Sector_ICT_Risk_TLPT_Incident_Reporting.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/DORA_Will_Expose_Your_Data_Layer_Are_You_Ready__A_Board-Level_Readiness_Doctrine_for_Database_Resilience_Under_the_Digital_Operational_Resilience.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/DR DOCTRINE 2026 - Engineer Institutional Survival or Accept Regulatory Failure - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/DRP WEAPONISATION DOCTRINE - ISO 27001-Aligned Recovery Kill-Chains That Withstand Regulatory Forensics - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Data_Governance_and_Security_Architecture_Applying_SABSA_to_GDPR_Data_Protection_Obligations_Sovereignty_Privacy_by_Design_Regulated_Enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Database_Monitoring_Is_Broken_And_Regulators_Are_About_to_Notice__A_DORA_NIS2_and_PRA-Aligned_Doctrine_for_Data_Layer_Visibility_in_European.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Defender_XDR_and_the_Evidence_Graph_Turning_Fragmented_Security_Signals_into_Commercial_Assurance_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Designing Cyber-Resilient Airport Networks.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Detection Engineering Is Replacing Traditional SOC Operations - Hypothesis Led Detection Provable Coverage and Science of Adversary Specific Surfaces.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Digital Resilience by Design.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Doing More With Less - Delivering Enterprise-Grade Cyber GRC in Lean and Resource-Constrained Regulated Infrastructure Teams.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Domain Admin Is Not An Entitlement It Is A Loaded Weapon - Tiered Administration And Just In Time Privileged Elevation - Institutional Doctrine Aligned to.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Dont Debate The Ransom While The Malware Is Still Running - Pre Signed Ransomware Decision Authorities And Recovery Tempo.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Drowning_in_Logs_Starving_for_Signals_The_DAM-to-SIEM_Crisis_Inside_Financial_Services__Engineering_High-Signal_Detection_Pipelines_from_Imperva_to.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Eliminating_Credentials__FIDO2_as_Primary_Authentication_in_Tier-1_Banking_-_A_Deployment_Doctrine_for_the_Post-Password_Enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/End-to-End Cyber Governance - Owning Risk, Assurance and Delivery Across Regulated Infrastructure Environments with Conviction.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Enterprise Firewall Modernisation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Event-Driven_Identity__SCIM_PingIDM_and_the_Real-Time_Synchronisation_Doctrine_for_Hybrid_and_Multi-Cloud_Banking_Estates.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Evidence Over Opinion - Building Cyber Programmes That Prove Rather Than Claim Compliance to Regulators, Auditors and Boards.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/FROM COMPLIANCE TO COMMAND AUTHORITY - Weaponising ISO 27001 and NIST for Enterprise Disaster Recovery Supremacy - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Federation-First_Modernisation__Converting_WebSphere_and_WebLogic_Estates_into_Standards-Based_Identity_Consumers_-_A_Decommissioning_Doctrine_for.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Financial-Grade_API_Security__FAPI-Compliant_OAuth2_Architectures_for_Regulated_Banking_-_A_Doctrine_for_Open-Finance-Ready_Institutions.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From Audit to Advantage - Turning NIS and CAF Compliance into Strategic Resilience Capability and Sustained Commercial Leverage.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From Compliance to Resilience - Operationalising NIS2 and CAF into Measurable Cyber Maturity for Critical National Infrastructure Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From Playbooks to Performance - Uplifting Incident Response Capability in NIS-Regulated Environments to Operational Command Standard.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From_Control_Evidence_to_Contract_Leverage_The_New_Economics_of_Microsoft_Security_Architecture_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From_DPIA_to_Decision_Engine_Machine_Readable_DPIA_Doctrine_DECIDE_Framework_Clinical_Workflow_Automation_Sovereign_Doctrine_Canonical_White_Paper.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From_Data_Controls_to_Deal_Control_How_Cyber_Evidence_Can_Reshape_Enterprise_Negotiation_Power_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/From_Regulation_to_Runtime_The_Sovereign_Compliance_Operating_System_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta_2026.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Governing_Cyber_Risk_SABSA_Based_Board_Level_Accountability_Risk_Appetite_Architecture_Governance_Regulated_Enterprise_NIS2_DORA_Oversight.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Hardening_the_Vault_Turning_Imperva_Logs_Into_Board-Level_Risk_Intelligence__From_Raw_DAM_Telemetry_to_Strategic_Risk_Reporting_for_the_Audit_and.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/High-Availability and Disaster Recovery.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/INSTITUTION-GRADE RECOVERY DOCTRINE - Building ISO 27001 and NIST Systems That Secure Contracts and Withstand Systemic Failure - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/INSTITUTIONAL DR MANDATE - CISO Doctrines That Command Premium Engagements and Board-Level Authority - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ISO 27001 2025 RESILIENCE DOCTRINE - Replacing Compliance Theatre with Institutional-Grade Operational Steel - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Identity Is the New Perimeter.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Identity-as-Code__A_Doctrine_for_Versioning_Testing_and_Deploying_Federation_Infrastructure_via_CI-CD_-_From_Manual_IAM_to_Engineered_Identity.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Identity_as_the_Primary_Enforcement_Layer__Unifying_Endpoint_Network_and_Access_Decisioning_-_A_Doctrine_for_Policy_Singularity_Across_the.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/If The Attacker Has Automation And You Have Manual Triage Youve Already Lost Tempo - Closing The MTTD Gap - Doctrine Paper for Board CISO and Audit.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Implementing_SABSA_Complex_Enterprise_Environments_Practitioners_Field_Guide_Multi_Cloud_Hybrid_Legacy_Architecture_Led_Deployment_Strategy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Integrating_SABSA_Across_the_Enterprise_Multi_Framework_Architecture_ISO27001_NIS2_IEC62443_Unified_Security_Architecture_Regulatory_Compliance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/It_Is_Just_an_Agent_No_It_Is_Your_Audit_Control__Why_DAM_Agents_Are_Now_Regulated_Infrastructure_Under_DORA_Article_9_and_NIS2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Kubernetes_and_the_Crown_Jewels_Modernising_Database_Monitoring_for_Containerised_Data_Platforms_Cloud-Native_Data_Telemetry_for_Dynamic_Workloads.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/MFA That Can Be Proxied Is Not Strong Authentication - Phish Resistant FIDO2 Webauthn And Passkey Migration Doctrine - Doctrine Paper for Board CISO and.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Machine_Identity_at_Scale__Governing_Non-Human_and_AI_Identities_Across_Global_Banking_Infrastructure_-_A_Doctrine_for_the_Autonomous_Estate.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Mergers_and_Acquisitions_Cyber_Risk_SABSA_Based_Due_Diligence_Framework_AICE_Architecture_Integration_Security_Assessment_Deal_Lifecycle.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Most Enterprises Can Detect Threats Very Few Can Operationally Survive Them - The Recoverability Mandate Engineering Survival Velocity.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Most SOCs Are Built for Yesterdays Threats - Architectural Debt Surface Migration and Re Foundationing the Operations Floor for 2027 Adversaries.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/NIST 800-53 REV.5 RESILIENCE DOCTRINE - Enforcing DORA and NIS2 Non-Negotiables at Institutional Scale - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/OPERATIONAL RESILIENCE AS DOCTRINE - Architecting Zero-Failure Enterprises Under NIST and ISO 27001 Mandate - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Operational Resilience Under Regulation - Translating CAF Assessments into Executive-Grade Decision Intelligence for Regulated Boards.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Operational_Technology_Security_Under_SABSA_Bridging_IT_OT_Convergence_IEC62443_NIS2_Industrial_Control_Systems_Critical_Infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Owning the Risk - Engineering Risk Registers That Drive Board-Level Cyber Decisions in Critical National Infrastructure Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Patch_Pray_Repeat_Why_Traditional_Linux_Security_Fails_at_Scale__Engineering_CIS-Hardened_Immutable_Linux_Estates_for_Regulated_Database.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Payload_Denied_Why_Ransomware_Fails_When_the_Database_Refuses_to_Serve_The_Data_Layer_Refusal_Mechanism_for_Active_Loss_Prevention.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Policy-as-Code_at_Runtime__OGNL-Driven_Federation_Routing_and_Dynamic_Authorisation_Decisions_at_Transactional_Scale_-_A_Doctrine_for_Engineered.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Post-Merger_Identity_Consolidation__Using_Federation_to_Abstract_and_Control_Multi-Forest_Directory_Estates_-_A_Doctrine_for_MandA_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Post_Quantum_Readiness_Architecting_Cryptographic_Agility_with_SABSA_NIST_FIPS_203_204_205_PQC_Migration_Enterprise_Resilience_Strategy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Privacy Operations Are Becoming Frontline Cybersecurity - Data Lineage Sovereignty Subject Right Latency Privacy Resilience Convergence Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Privileged_Users_Do_Not_Need_Malware_They_Need_SQL_Access__The_Insider_Threat_Doctrine_for_Imperva_DAM_and_Privileged_Database_Activity_Monitoring.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Prohibited_vs_Restricted_TRIAGE_Classifier_Doctrine_for_DOJ_28_CFR_202_Decisions_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Purview_as_the_Trust_Ledger_Turning_Data_Classification_into_Commercial_Proof_Commercially_Weaponised_Cyber_Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE ARMAGEDDON DOCTRINE - DRP Architectures for Post-CRA Institutional Survival and Continuity Supremacy - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE BY DESIGN DOCTRINE - Engineering Self-Healing Infrastructure Under NIST CSF and ISO 27001 Control Regimes - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE COMMAND DOCTRINE - NIST and ISO Aligned Disaster Recovery That Eliminates Regulatory Exposure - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE RECKONING DOCTRINE - Board-Level Mandates That Enforce Continuity Under Systemic Risk - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE REDLINES - The NIST-Aligned Survival Doctrine Every Accountable CISO Must Enforce - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RESILIENCE REGIME DOCTRINE - NIST and ISO-Aligned CISO Mandates for Elite Institutional Engagements - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Regulators Dont Care That The Spreadsheet Is Green - Why Control Attestation Without Evidence Grade Testing Fails DORA NIS2 Supervision.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Regulatory Confidence Engineering - Designing Cyber Programmes Built to Withstand NIS and Ofgem Scrutiny Without Blinking.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Resilient Runways.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/RnD_Data_Governance_in_the_Age_of_Geopolitics_Geopolitical_Doctrine_COMPASS_Framework_Compliance_as_Strategic_Capability_Sovereign_White_Paper.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/SABSA_Centric_Enterprise_Security_Architecting_NIS2_Ready_ISO27001_Aligned_Resilience_at_Scale_Institutional_Architecture_Doctrine_Regulated_Enterprises.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/SABSA_for_Supply_Chain_Security_Architecting_Resilience_Across_Third_Party_Ecosystems_NIS2_DORA_ISO27001_Vendor_Risk_Architecture_Strategy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/SOC20 Master Reference Card - Strategic Reference for Tier-1 Banks CNI Operators Insurers and Public-Sector Boards Operating Under Regulatory Scrutiny.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/STRATEGIC RESILIENCE COMMAND - Converting BCP and DRP into Executive-Level Risk Control and Revenue Protection Systems - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Securing the Skies.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Security Teams Are Drowning in Telemetry - Volumetric Discipline Schema Sovereignty and Why Less Data Will Save the Modern SOC Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Sentinel_for_Financially_Disciplined_Detection_Keeping_the_Evidence_Without_Funding_the_Noise_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Shadow_AI_Shadow_SaaS_Shadow_Egress_The_New_Commercial_Risk_Layer_Enterprises_Cannot_Ignore_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Shadow_Databases_Real_Liability_Discovering_and_Governing_the_Databases_Nobody_Admits_Exist_Continuous_Discovery_as_a_Board-Level_Control.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Stop Sending Me 50000 Vulnerabilities Tell Me Which Five Matter - Engineering The Prioritisation Function The Board Can Sign.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/THE CONTINUITY DOCTRINE - Unifying BCP DRP and Cyber Resilience into a Single Operational Command System - Enterprise Resilience Sovereign Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Tabletop to Reality - Designing High-Fidelity Cyber Exercises That Demonstrably Improve Resilience in Regulated Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Terminology_Translation_Table__Addendum_to_Paper_21_-_Mapping_Prior-Paper_Vocabulary_Ingestion_Synchronisation_Observation_Orchestration_to_the.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Testing the System Not the Slides - Advanced Tabletop Methodologies for Operators of Essential Services Under NIS Regulatory Oversight.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Autonomous SOC Is No Longer Optional - Decision Rights Provable Autonomy and the Architecture of Trust at Machine Speed Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Board Doesnt Need Dashboards It Needs Decisions - Decision Grade Cyber Reporting For Regulated Boards And Risk Committees.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Breach Hurts The Bad Response Destroys Trust - Engineering The Disclosure And Remediation Choreography That Protects Franchise Value.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Cloud Provider Owns The Platform You Own The Misconfiguration - Operationalising Shared Responsibility - Operational Artefacts Edition for Tier-1 Banks.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Death of Manual Incident Response - Closed Loop Containment Evidence First Forensics and the End of the Heroic Analyst Model Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Enterprises Winning Cybersecuritys AI Era All Operate Differently - Operating Model Doctrine for Institutions to Compound Advantage Over the Next Decade.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Future SOC Will Be Smaller Faster and AI Led - Operating Model Re Architecture for the Compressed Defence Loop Industrial Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Future of Privileged Access.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Last Mile of Cyber Governance - Where NIS Programmes Fail and How to Engineer Assurance That Holds Under Regulator Pressure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Next Cyber Breach Wont Look Like the Last One - Adversary Decomposition Pattern Drift and Why Historical Playbooks Are Now a Liability.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Ofgem Compliance Paradox - Moving from Checkbox Security to Measurable Risk Reduction Across Regulated Energy Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Real Cost of Weak Security Operations Its Not the Breach Its the Exposure Time - Pricing Operational Latency as a Fiduciary Loss Class.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Trust Fabric.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The Window of Exposure Is Killing Enterprise Security - Time to Detect Time to Decide Time to Recover Engineering the Three Clock Defence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_36_Hour_Compliance_Model_Thirty_Six_Hour_Velocity_Doctrine_VELOCITY_Framework_for_Regulated_Decisioning_Sovereign_Doctrine_Canonical_Paper.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_AI_Assurance_Stack_Protecting_Regulated_Data_Across_Copilot_SaaS_Endpoint_and_Cloud_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_AI_Leakage_Market_How_Uncontrolled_Prompts_Could_Become_the_Next_Enterprise_Liability_Shock_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Agentic_AI_Attack_Surface_Attack_Surface_Doctrine_SENTINEL_Framework_for_Agentic_AI_Risk_Governance_Institution_Defining_Edition_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Agentic_AI_Threat_Why_Database_Attacks_No_Longer_Look_Human__Detecting_Autonomous_SQL_Adversaries_with_Imperva_DAM_and_Behaviour-Based_Analytics.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Audit_Trail_Is_Now_a_Battlefield__How_DAM_Telemetry_Became_the_Primary_Evidence_Surface_for_Regulator_Inquiry_and_Litigation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Authentication_Tier__Engineering_PingFederate_as_Tier-0_Financial_Infrastructure_-_A_Commercial_Doctrine_for_Sub-200ms_Federation_at_30M_Daily.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Autonomous_DBA_Is_Coming_Governing_AI-Assisted_Database_Administration_and_Self-Healing_Systems_Operational_Oversight_for_Machine-Driven_Database.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Boardroom_Data_Boundary_Why_Privacy_DLP_and_AI_Governance_Are_Becoming_One_Buying_Decision_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Boardroom_Ultimatum_Stop_Logging_Breaches_Start_Blocking_Loss_Active_Data-Layer_Enforcement_as_Board-Level_Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Breach_Report_Starts_With_One_Missing_Audit_Event__How_a_Single_DAM_Telemetry_Gap_Becomes_a_GBP200M_Regulatory_Settlement.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_CISOs_Ledger_Proving_Database_Security_ROI_Before_the_Breach_CFO-Ready_Loss-Aversion_Economics_for_Database_Monitoring_Investment.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Canonical_Evidence_and_Reproducibility_Doctrine_What_Every_Volume_Must_Prove_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Client_Data_Custody_Premium_How_Strong_Information_Controls_Win_High-Value_Enterprise_Deals_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Client_Data_Trust_Premium_How_Database_Monitoring_Creates_Pricing_Power_and_Retention_Margin_Trust_as_a_Quantifiable_Database-Backed_Commercial_Asset.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Compliance_Edge_Turning_Database_Security_into_a_Sales_Weapon_Evidence-Led_Differentiation_in_Enterprise_Vendor_Reviews_and_RFP_Cycles.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Data_Escape_Economy_Why_Enterprise_Buyers_Will_Pay_a_Premium_for_Provable_Information_Control_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Data_Heist_Kill_Chain_Mapping_Attacker_Progression_from_Identity_Compromise_to_Monetisation_An_End-to-End_Operating_Model_for_Stopping_Data_Theft.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Data_Risk_Engine_Unified_Data_Risk_Engine_Doctrine_NEXUS_Framework_for_National_Security_and_Privacy_Institution_Defining_Edition_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Data_Sovereignty_Control_Room_Operating_Model_for_Cross-Border_Data_Governance_Sovereignty_as_a_Live_Operational_Discipline_Not_a_Map.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Database_Was_Monitored_Then_Show_Me_the_Evidence__The_Evidence_Chain_Model_for_DAM_Audit_Defensibility_Before_Regulators_and_Boards.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Day-Zero_M_and_A_Database_Risk_Deploying_Database_Monitoring_as_a_Day-One_Acquisition_Control_Inherited_Breach_Debt_and_the_Cyber_Due_Diligence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Endpoint_Trust_Premium_Why_Device_Integrity_Is_Becoming_a_Contractual_Asset_Commercially_Weaponised_Cyber_Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Ephemeral_Vault_Securing_Databases_That_Exist_for_Minutes_Not_Months_Continuous_Control_for_Short-Lived_Auto-Scaling_Data_Infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Exception_Became_the_Exploit_Whitelist_Debt_Bypass_Rules_and_Untested_Policy_Exceptions_Exception_Burn-Down_as_a_Continuous_Security_Function.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Extortionists_Dead_End_Killing_Data_Heists_Before_the_Ransom_Note_Pre-Exfiltration_Defence_Doctrine_for_the_Modern_Enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Frictionless_Laboratory_Frictionless_Security_Doctrine_PRISM_Framework_for_Science_Preserving_Clinical_Data_Controls_Sovereign_White_Paper.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_GBP10M_Query__How_One_Unmonitored_Database_Action_Becomes_Board-Level_Risk__A_Doctrine_for_Imperva_DAM_Audit_Integrity_Financial_Services.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_GBP600-a-Day_Fixer_Why_Fragile_DAM_Estates_Need_Senior_Engineering_Not_More_Dashboards__A_Contract_Engineering_Doctrine_for_Imperva_Linux_and.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Global_Transfer_Impact_Doctrine_ATLAS_Framework_Mastering_Schrems_II_and_Executive_Order_14117_Sovereign_Doctrine_Canonical_White_Paper.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Governance_Premium_Pricing_Underwriting_and_Deal_Economics_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Kieran_Upadrasta_2026_Q2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Identity_Control_Plane_Doctrine_SPIFFE_OIDC_PAM_and_Delegated_Agent_Identity_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Identity_Control_Plane_Doctrine__The_Master_Volume_of_the_Institutional_Doctrine_Series_-_A_Parent_Doctrine_Governing_Twenty_Papers_on.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Identity_Control_Plane_One-Page_Architecture_Diagram__Addendum_to_Paper_21_-_Visual_Map_of_the_Six-Layer_Doctrine_Spanning_Integration.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Identity_Control_Plane__Federation_as_Real-Time_Banking_Infrastructure_-_A_Doctrine_for_Operating_Identity_Across_1000_Regulated_Systems.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Integration_Factory__A_Java_Adapter_Framework_for_Industrial-Scale_Identity_Onboarding_of_SWIFT_Murex_and_Trading_Platforms_-_A_Doctrine_for.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Invisible_Breach_Thesis_Why_Boards_Need_Threat_Hunting_Before_the_First_Alert_Fires_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Logs_Were_There_The_Detection_Was_Not__Closing_the_SIEM-to-DAM_Telemetry_Gap_That_Hides_Privileged_Database_Compromise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Machine_Identity_Data_Heist_When_the_Attacker_Borrows_a_Machine_Not_a_Password_Compromise_Attribution_for_Non-Human_Actors_at_the_Data_Layer.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Microsoft_Security_Flywheel_How_Purview_Defender_XDR_Sentinel_and_Priva_Compound_Commercial_Trust_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Practitioners_Manifesto_FORGE_Framework_Against_Advisory_Compliance_Models_Institution_Defining_Edition_Sovereign_Doctrine_White_Paper_K_U.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Prompt-to-SQL_Control_Gap_Governing_Enterprise_AI_Copilots_at_the_Database_Boundary_Two-Actor_Accountability_for_Prompt-Driven_Query_Workflows.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Proof-of-Control_Advantage_Why_Procurement_Teams_Are_Starting_to_Buy_Evidence_Not_Security_Claims_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Regulated_Data_Flightpath_Mapping_How_Sensitive_Information_Moves_Before_It_Becomes_a_Breach_Commercially_Weaponised.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Revenue_Database_Is_Now_a_Risk_Asset_Securing_the_Systems_Where_Revenue_Becomes_Fragile_Operational_Resilience_Doctrine_for_Revenue-Bearing_Databases.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_SABSA_Board_Reporting_Framework_Communicating_Cyber_Risk_at_Executive_Level_NIS2_DORA_Governance_Risk_Appetite_Metrics_Oversight.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_SABSA_Sovereignty_Model_Unifying_NIS2_GDPR_IEC62443_Defensible_Architecture_Data_Sovereignty_Regulatory_Control_Enterprise_Security_Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_SIEM_Margin_Trap_Why_Uncontrolled_Log_Growth_Is_Becoming_a_Cybersecurity_Profit_Problem_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Silent_Breach_Layer_Why_Banks_Still_Cannot_See_Their_Database_Risk__The_Hidden_Cost_of_DAM_Drift_Agent_Sprawl_and_Policy_Decay_in_Tier_1.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Six-Month_Turnaround_Rescuing_Imperva_DAM_Before_It_Becomes_the_Risk__A_26-Week_Operational_Recovery_Plan_for_Fragile_DAM_Estates_in_Financial.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Sovereign_Data_Shield_The_Definitive_DOJ_28_CFR_202_Operational_Doctrine_BRE_Edition_Sovereign_Doctrine_Canonical_White_Paper_K_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Supplier_Says_Secure_The_Database_Says_Prove_It_Verifying_Third-Party_Assurance_with_Telemetry_Supplier_Assurance_Verified_at_the_Data_Layer.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Unified_Regulatory_Framework_Unified_Operating_Model_Doctrine_ORACLE_Framework_Global_Pharma_and_AI_Compliance_Sovereign_White_Paper_2026.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Vendor-Risk_Shortcut_How_XDR_Evidence_Can_Collapse_Months_of_Enterprise_Security_Review_Commercially_Weaponised_Cyber.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/The_Zero_Hour_Doctrine_Zero_Hour_Institutional_Failure_Doctrine_AEON_Framework_for_Algorithmic_Systems_Institution_Defining_Edition_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Threat Management for 24x7 Operations.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Threat_Intelligence_Integration_Within_SABSA_Contextual_to_Operational_Defence_MITRE_ATT_CK_NIS2_Threat_Modelling_Architecture_Enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Token_Issuance_as_a_Security_Boundary__Engineering_OAuth2_and_OIDC_Pipelines_for_Financial-Grade_Systems_-_A_Control-Plane_Doctrine_for_Issued.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Visibility Without Remediation Is Just A Better View Of The Fire - Engineering Remediation Velocity And MTTR Discipline - Evidence-Based Framework for.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP01_The_Sovereign_Estate_Protocol_Governance_Architecture_for_Secure_Intelligent_NetZero_Government_Buildings_Sovereign_Doctrine_Series_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP02_Smart_Buildings_at_Scale_Delivering_IoT_Enabled_Enterprise_Estates_with_Measurable_Energy_Space_Cost_Outcomes_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP03_The_Intelligent_Estate_Aligning_IoT_BMS_Digital_Twins_and_ESG_into_a_Unified_Operational_Architecture_Sovereign_Doctrine_Series_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP04_Securing_the_Smart_Estate_Cyber_Assurance_Across_IoT_OT_BMS_Using_IEC_62443_and_Zero_Trust_Principles_Sovereign_Doctrine_Series_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP05_The_Smart_Building_Programme_Playbook_Governance_Risk_Control_and_Delivery_Assurance_for_50M_Estate_Transformation_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP06_The_Space_Dividend_Achieving_25_to_35_Estate_Cost_Reduction_Through_Occupancy_Intelligence_and_Workplace_Analytics_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP07_Energy_Optimisation_at_Scale_HVAC_Demand_Response_and_Real_Time_Consumption_Governance_Across_Portfolio_Estates_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP08_The_Commercial_Edge_of_Digital_Twins_From_Demo_Asset_to_Production_Grade_Operational_Intelligence_Across_the_Estate_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP09_De_Risking_Smart_Building_Programmes_Risk_Architecture_Insurance_Posture_and_Defensibility_for_50M_Estate_Transformations_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP10_Monetising_the_Smart_Estate_Commercial_Models_Capital_Release_and_Value_Creation_Beyond_Energy_Savings_Sovereign_Doctrine_Series_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP11_The_Digital_Twin_Mandate_From_Static_Asset_Register_to_Live_Operational_Intelligence_Programme_Directors_Blueprint_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP12_Integrating_BMS_and_IoT_Platforms_BACnet_Modbus_KNX_and_Multi_Vendor_Convergence_Across_Legacy_and_Modern_Estates_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP13_Predictive_Facilities_Management_AI_Driven_Asset_Health_Sensor_Fed_Maintenance_and_the_End_of_Reactive_Estate_Operations_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP14_The_Protocol_Stack_LoRaWAN_Zigbee_BLE_NB_IoT_and_Multi_Protocol_IoT_Integration_Across_Legacy_and_Modern_Estates_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP15_From_Legacy_BMS_to_Intelligent_Buildings_A_Practical_Roadmap_for_Enterprise_Estate_Modernisation_and_Digital_Transition_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP16_The_Secure_Building_Protocol_IEC_62443_Alignment_OT_Network_Segmentation_and_Cyber_Assurance_for_Smart_Estates_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP17_The_OT_IT_Convergence_Blueprint_Applying_the_Purdue_Model_to_Secure_Building_Management_Systems_at_Enterprise_Scale_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP18_Operational_Resilience_in_Smart_Buildings_Designing_for_Zero_Material_Incidents_Failover_and_Continuity_in_Intelligent_Estates_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP19_Secure_by_Design_IoT_Infrastructure_Embedding_Identity_Trust_and_Segmentation_into_Smart_Building_Deployments_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/WP20_Zero_Carbon_by_Architecture_Delivering_Net_Zero_Through_Energy_Intelligence_ESG_Governance_and_Smart_Building_Design_v3.2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/We_Have_Imperva_Good_Now_Prove_It_Works__The_Six-Pillar_Operational_Assurance_Framework_for_DAM_Platforms_in_Tier_1_Banking_Environments.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/You Are Not Under Tooled You Are Over Tooled And Still Blind - Visibility Paradox And Rationalisation Doctrine - Reference Architecture for.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/You Dont Need Another Security Tool You Need Control - From Tool Sprawl To Architectural Consolidation And Tool To Control Ratio.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your Biggest Risk May Be Someone Just Trying To Get Work Done Faster - Designing Out Insider Friction That Drives Shortcuts And Shadow Behaviour.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your Incident Response Plan Will Fail Under Pressure - Drill Discipline Decision Rights and Why Every Plan Should Be Stress Tested Quarterly Doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your Perimeter Is Fiction Your Vendors Are Inside The Blast Radius - The Contract Control Matrix For Third Party Risk - Decision-Grade Reference for Boards.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your SOC Is Already Losing - Why Conventional Security Operations Fail Against Velocity Class Adversaries and What Replaces Them.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your SOC Isnt Hunting Threats Its Drowning In Noise - Re Architecting The SOC From Triage Queue To Hunt Led Function - Strategic Reference for CNI Operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your Security Stack Is Producing Noise Not Intelligence - Signal Engineering Data Lineage Discipline and the Industrialisation of Detection Truth.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Your_SIEM_Did_Not_Fail_Your_Data_Strategy_Did__Rebuilding_the_Detection_Stack_from_the_Database_Outward_for_Regulated_Enterprises.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero Trust Is Not A Slide It Is An Enforcement Model - From Architectural Rhetoric To Board Attestable Enforcement Evidence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero-Secret_Architectures__Federated_Workload_Identity_Across_AWS_Azure_and_GCP_-_A_Doctrine_for_the_Elimination_of_Long-Lived_Cloud_Secrets.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero-Trust Segmentation for Airport Operations.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero_Standing_Privilege__JIT_Access_Models_Across_Federated_and_Privileged_Identity_Systems_-_A_Doctrine_for_the_Elimination_of_Persistent.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero_Transfer_Is_a_Myth_Realistic_Transfer_Doctrine_BRIDGE_Framework_Operating_Under_EO_14117_and_GDPR_Institution_Defining_Edition_Upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/Zero_Trust_Transformation_Integrating_SABSA_Modern_Network_Security_NIST_SP800_207_BeyondCorp_Enterprise_Zero_Trust_Architecture_at_Scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/advanced_exploitation_techniques_zero_day_research_custom_shellcode_bypass_engineering_post_exploitation_tradecraft_elite_security_operators.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversarial pattern recognition in ai systems a red-team framework for emerging web exploitation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/adversary_simulation_regulated_environments_tiber_eu_dora_tlpt_governance_architecture_financial_sector_threat_led_penetration.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/agentic ai beyond guardrails - adaptive risk architectures for enterprise autonomy.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai driven identity intelligence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai engineering doctrine - extract chunk prompt evaluate - the four-phase engineering model for production-grade government ai.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai governance meets cyber governance - the emerging duty of convergence risk management and board accountability - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai incident command systems - crisis governance for autonomous systems.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai sovereignty in the justice stack - controlling models metadata and meaning - a sovereignty framework for national control of judicial ai assets.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai systems cyber doctrine- governance and operational control of algorithmic risk.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ai that survives court wins the market - the doctrine of litigation-grade security.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/aligning-azure-security-architectures-with-saudi-nca-caf-and-mcra-frameworks-compliance-driven-security-blueprint-for-regulated-enterprises.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/antifragile identity.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/api_security_under_attack_penetration_testing_rest_graphql_grpc_interfaces_owasp_api_security_top_10_emerging_attack_vectors_flagship_edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting access by design.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting anonymous power a zero-trust blueprint for senior insiders.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting cloud-native ai stacks - a strategic framework for migrating .net to python-react.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting the ai control - enterprise governance for the agentic era.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/architecting the ai-native enterprise- identity as infrastructure, technical debt as liability, and the repricing of enterprise security.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/audit-proof by design - cra nis2 compliance without slowing engineering.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/automation at scale python ansible rest apis in cni - infrastructure-as-code and policy-as-code at scale - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/autonomous identity governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/azure-security-by-design-aligning-architecture-risk-and-compliance-in-complex-enterprises-a-risk-aligned-security-architecture-methodology.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond binary edges how hyperedge-structured knowledge graphs eliminate clause fragmentation in llm-driven contract attribute extraction.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond certification campaigns.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond perimeter security physical-cyber convergence in airports - unified physical-cyber security operations - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond speech-to-text - end-to-end ai pipelines for transcription and intelligence - the full-stack ai pipeline architecture for judicial intelligence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond-the-perimeter-mastering-identity-centric-security-in-microsoft-azure-advanced-identity-security-patterns-for-transformation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/beyond_scanning_why_vulnerability_scanners_miss_68_percent_critical_security_findings_manual_penetration_testing_fills_gap_enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-aligned ciso blueprint - delivering 3× roi resilience across nis2 & dora compliance mandates.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/board-grade cyber resilience technical risk to executive accountability - fair quantification and board reporting - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/boardroom collapse in 45 seconds - the zero-hour command protocol.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/bridging strategy and execution security architect in 24x7 cni - board risk appetite to operational defence posture - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-a-cloud-native-soc-on-microsoft-azure-architecture-telemetry-and-response-a-complete-security-operations-centre-blueprint.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/building-secure-azure-platforms-for-government-and-defence-cloud-environments-architecture-patterns-for-mission-critical-workloads.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cisco aci deep dive tenant vrf bridge domain epg design - policy-driven micro-segmentation in multi-tenant data centres - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ciso_2027_playbook-sovereign ai resilience & quantum-proof identity.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/citrix netscaler and f5 secure application delivery for aviation - waf ssl offload and load balancing - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud first identity governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud-governance-at-scale-securing-azure-in-regulated-and-sovereign-markets-policy-driven-governance-for-multi-jurisdictional-compliance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cloud_container_penetration_testing_aws_azure_gcp_kubernetes_security_validation_offensive_techniques_cloud_native_attack_paths_analysis.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/codified intelligence - establishing standards for interoperable ai - a standards framework for ai interoperability across government departments.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/commanding the crisis - 90-day roadmap to boardroom confidence .pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous_security_validation_annual_penetration_tests_automated_breach_attack_simulation_continuous_attack_surface_management.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/continuous_vulnerability_assessment_penetration_testing_cvapt_model_automated_scanning_manual_testing_threat_intelligence_assurance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/cyber governance for the regulated enterprise - multi-regulatory compliance dora nis2 eu ai act - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/defending-the-kingdom-aligning-azure-security-with-saudi-nca-and-sovereign-standards-a-strategic-architecture-for-regulated-organisations.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing cyber-resilient airport networks - ot it segregation for airside landside passenger systems - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing ultra-high-reliability ai services - observability resilience and devsecops - the convergence of observability resilience and security for judicial ai.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/designing-secure-by-default-azure-architectures-for-high-sensitivity-environments-embedding-security-controls-at-the-foundation-layer.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/digital resilience by design anti-fragile infrastructure - architecture that gets stronger under stress - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/doctrine of digital proof - operationalising trust in ai-driven judicial systems - a formal framework for establishing evidentiary trust in machine-generated transcripts.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/dora's ai vendor trap - liability flows, capital charges, and board exit strategies.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/engineering truth - the ai pipeline as an instrument of national integrity - building ai systems worthy of national trust.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise firewall modernisation for critical national infrastructure - ips encrypted visibility policy engineering - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/enterprise-scale-azure-security-architecture-from-landing-zones-to-zero-trust-enforcement-building-the-secure-cloud-adoption-framework.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/executive_summary_polished_final v9.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fiduciary_defence_dossier_template v7.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/fortifying the pipeline - devsecops doctrine for ai-enabled judicial services - security-first ci-cd for machine learning in government infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from compliance mandate to competitive advantage in the ai era.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from compliance to competitive advantage board-level cyber governance under dora & nis2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from compliance to conformity - operationalising cra and nis2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from pov to production - the blueprint for resilient ai in public infrastructure - crossing the valley of death between ai proof-of-value and national deployment.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from prototype to public infrastructure - engineering production-grade ai transcription - the engineering doctrine for scaling ai from lab to live service.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from regulation to runtime - engineering cra nis2 dora into product security.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from scapegoat to sovereign - the ciso authority doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from_findings_to_fixes_remediation_driven_penetration_testing_programme_closes_security_gap_through_governance_framework_flagship_edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/from_pentest_to_threat_intelligence_offensive_security_findings_feed_strategic_threat_intelligence_mitre_att_ck_proactive_defence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/global identity at scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing agentic enterprise - from shadow ai to autonomous security.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing machine identities.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/governing-the-agentic-enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/harmonizing dora - how to stop duplicating controls and build a single resilience framework for european finserv.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/high-availability and disaster recovery for mission-critical aviation - sub-second failover and zero-data-loss recovery - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/iam_governance_elite_v4.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity as doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity governance as infrastructure - translating policy into automated control architecture for the autonomous enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity is the new perimeter zero trust governance blueprint - identity-centric security at enterprise scale - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity warehouse to enforcement edge.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/identity-first-security-architecture-in-azure-entra-id-pim-and-conditional-access-at-scale-designing-the-enterprise-identity-control-plane.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/information governance for autonomous metro infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/infrastructure_penetration_testing_active_directory_network_segmentation_lateral_movement_exploiting_defending_enterprise_infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/institutionalising product security - operating model cra nis2.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/ironclad anonymization - deterministic redaction frameworks for the ministry of justice - engineering near-zero-leakage pii redaction for judicial ai at national scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/joiner mover leaver to institutional control.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/judicial ai at scale - architecting resilient secure and governed platforms - a sovereign infrastructure blueprint for national-scale judicial ai.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/mTLS_as_Identity__Cryptographic_Trust_for_East-West_Traffic_in_Banking_Systems_-_A_Doctrine_for_Zero-Trust_Service_Mesh_at_Institutional_Scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/modern-threat-detection-in-azure-integrating-defender-for-cloud-and-sentinel-at-scale-building-an-integrated-detection-analytics-platform.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/modern_penetration_testers_playbook_mastering_burp_suite_pro_metasploit_custom_exploit_development_enterprise_security_engagements.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/navigating_nca_ecc_saudi_arabia_national_cybersecurity_authority_essential_controls_penetration_testing_compliance_kingdom_framework.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/offensive_security_in_practice_comprehensive_framework_penetration_testing_web_api_infrastructure_methodology_governance_flagship_edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational doctrine for responsible ai engineering - the engineering playbook for operationalising ai ethics at enterprise scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational resilience by design engineering zero-downtime operations - disciplined change management and validation - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operational resilience by design the governance doctrine for essential entity survival.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/operationalising-zero-trust-in-microsoft-cloud-identity-as-the-new-security-perimeter-doctrine-level-implementation-framework-for-enterprises.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/prevention is dead the rise of resilience-based ai risk governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/privileged access as regulated infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/product security as doctrine - board-grade model cra nis2 sbom.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/provable autonomy - the governance architecture for mission-critical ai.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/red_team_insights_blue_team_resilience_purple_team_methodology_closing_detection_response_gap_enterprise_security_operations_centre.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/regulation as code - operationalising cra nis2 dora.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/resilient runways deterministic network architecture for air traffic - fault-tolerant network fabrics for aviation - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/risk-driven-cloud-migration-secure-architecture-patterns-for-azure-adoption-embedding-threat-modelling-and-ma-cyber-due-diligence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/saviynt iga at scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/saviynt sod new control plane.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sdf_board_governance_infographic v5.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/secure by design prove by evidence - product security doctrine.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing generative ai in schools - a red team-driven framework for safeguarding, compliance, and risk reduction.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing the skies zero trust micro-segmentation in aviation ot it - policy-driven network isolation for aviation - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-azure-at-scale-a-zero-trust-blueprint-for-regulated-enterprises-prescriptive-architecture-patterns-for-multi-subscription-estates.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-azure-transformation-journey-embedding-security-from-strategy-to-execution-a-comprehensive-transformation-security-framework.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/securing-the-sands-implementing-microsoft-cybersecurity-reference-architecture-mcra-in-ksa-enterprises-a-practitioner-level-guide.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security-assurance-in-azure-transformation-programmes-frameworks-controls-and-governance-a-comprehensive-enterprise-assurance-model.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/security_reporting_that_drives_action_translate_technical_penetration_test_findings_board_level_risk_decisions_executive_governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/simulating_the_adversary_tiber_eu_dora_tlpt_threat_led_penetration_testing_financial_services_sector_architecture_framework_flagship_edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/sovereign-cloud-security-in-saudi-arabia-data-residency-governance-and-azure-architecture-satisfying-kingdom-sovereignty-requirements.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/synthetic intelligence as a service - orchestrating the judicial api ecosystem - designing the api layer for national judicial intelligence services.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/testing_modern_attack_surface_cloud_container_api_mobile_security_validation_post_perimeter_enterprise_architecture_governance_flagship_edition.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the 2035 breakpoint  ai, cryptographic collapse, and the end of voluntary security models.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the 4-hour clock board liability in the age of dora, nis2, and ai regulation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the agentic ai attack surface - autonomous agents, tool misuse, and the rise of machine-speed e.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the agentic autonomy protocol - governing non-human identities in the autonomous enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the agentic risk doctrine - board-level control of autonomous ai before it controls you.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the agentic risk doctrine - tech specs. pdf.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the ai security - assurance crisis.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the ai-driven threat frontier - zero trust, identity & supply chain resilience.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the api-first ai state - reusable intelligence services for government - designing composable ai services for cross-government interoperability.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the architecture of accountability - designing observability and compliance into ai - building auditable transparent and compliant ai from the ground up.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the auditory record - architecting sovereign fidelity in automated judicial transcription - a doctrine-level blueprint for national-scale speech sovereignty.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the boardroom cyber playbook - governance, resilience, and value creation.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the ciso autonomy mandate - command, control, and governance for agentic ai systems.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the ciso identity mandate.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the ciso_transformation_playbook from cost centre to chief trust officer.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the conformity advantage - product security as differentiator.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the defensible ciso - an evidence-based ai risk doctrine for regulatory and board assurance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the future of privileged access zsp jit vault architecture - securing administrative power in high-trust environments - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the governance deficit.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the governance premium - repricing cyber risk.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the identity control plane - zero-trust governance for agentic ai and regulated enterprises.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the identity hegemony.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the identity moat.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the identity utility - architecting global iam as foundational gxp infrastructure.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the institutional liability doctrine - governance as legal infrastructure in the autonomous a.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the integration imperative.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the n-ary mandate - using hyperedge knowledge graphs to eliminate.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the regulatory product security doctrine - audit-proof software at scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the regulatory readiness playbook - cra nis2 engineering control.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the resilience mandate - engineering stability in national transcription systems - operational resilience engineering for mission-critical judicial ai.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the responsible core - institutionalizing evaluation and ethical guardrails in government llms - a governance framework for responsible ai deployment in public sector.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the sap payroll transformation playbook - mitigating risk and maximizing value in.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the semantic gavel - precision llm-summarisation in high-stakes litigation - engineering legal-grade ai summarisation for court proceedings.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the sovereign  defensibility framework full.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the sovereign banking protocol - architecting regulatory-controlled pam, grc , autonomous defence.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the sovereign courtroom - scaling azure ai for resilient legal operations.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the sovereign zero trust model - data immunity and supply chain resilience in 2026.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the trust fabric identity network and governance in one security model - converging iam and policy governance - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the velocity mandate -ciso architecture for the zero-latency agentic enterprise.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the zero-hour doctrine - how leaders prevent institutional collapse in the age of algorithmic crisis.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the-unified-shield-architecting-detection-and-response-with-microsoft-defender-and-sentinel-converging-xdr-and-siem-for-operations.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/the_247_soc_optimising_siem_soar_workflows_real_time_threat_detection_incident_response_financial_services_operations_governance.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat management for 24x7 operations networks - detection engineering and soc runbooks for critical infrastructure - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/threat_detection_through_offensive_testing_red_team_operations_expose_siem_gaps_harden_detection_rules_real_time_response_capability.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/trust-nothing-verify-everything-a-zero-trust-maturity-model-for-enterprise-azure-environments-five-stage-quantified-assessment-framework.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/web_application_security_in_depth_owasp_top_10_business_logic_flaws_zero_day_discovery_penetration_testing_framework_practitioners.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/why ai pilots fail - under regulatory scrutiny  the 90-day control architecture for enterprise deployment.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero latency trust.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero trust identity at scale.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust ai architecture - securing autonomous agents, apis, and decision systems.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust identity governance and administration (iga).pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero-trust segmentation for airport 24x7 operations networks - cisco aci and ngfw reference architecture - prof kieran upadrasta.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>
  <url>
    <loc>https://kieparis.fr/docs/zero_hour_doctrine_publisher_abstract v7.pdf</loc>
    <lastmod>2026-05-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.75</priority>
  </url>

</urlset>