<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//reasonablesecurity.org.au/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://reasonablesecurity.org.au/</loc>
		<lastmod>2025-06-17T00:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/FairIns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/Impact-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/positive-risk-1-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/06/CPA-202506.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/1527418528052-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/christopher-gower-m_HRfLhgABo-unsplash-1024x682.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/muhammad-faiz-zulkeflee-alw-CwGFmwQ-unsplash1-819x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/peak.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/FairIns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/Sevenrules.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/CRFQ2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/Cybergreen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/B.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/BlackDiamondRisk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/BohemiaD.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/why-choose-us/</loc>
		<lastmod>2025-04-28T03:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/who-we-are/</loc>
		<lastmod>2025-04-28T03:05:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/case-study/</loc>
		<lastmod>2025-04-28T03:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/services/</loc>
		<lastmod>2025-04-28T03:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/governance-risk-compliance/</loc>
		<lastmod>2025-04-28T03:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/cybersecurity-resilience/</loc>
		<lastmod>2025-04-28T03:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/pen-testing/</loc>
		<lastmod>2025-04-28T03:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/managed-services-providers/</loc>
		<lastmod>2025-04-28T03:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/reasonable-security-micro/</loc>
		<lastmod>2025-04-28T03:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/cybersecurity-frameworks/</loc>
		<lastmod>2025-04-28T03:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/fractional-ciso-vciso/</loc>
		<lastmod>2025-04-28T03:08:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/legislative-compliance/</loc>
		<lastmod>2025-04-28T03:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/cybersecurity-improvement-roadmaps/</loc>
		<lastmod>2025-04-28T03:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/cybersecurity-audit-assessment/</loc>
		<lastmod>2025-04-28T03:09:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/business-continuity-planning/</loc>
		<lastmod>2025-04-28T03:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/disaster-recovery/</loc>
		<lastmod>2025-04-28T03:10:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/cyber-incident-response-plan/</loc>
		<lastmod>2025-04-28T03:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/scenario-design-dr-cirp-testing/</loc>
		<lastmod>2025-04-28T03:11:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/security-awareness-training/</loc>
		<lastmod>2025-04-28T03:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/privacy-policy/</loc>
		<lastmod>2025-04-28T04:41:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/disclaimer/</loc>
		<lastmod>2025-04-28T04:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/terms-2/</loc>
		<lastmod>2025-04-28T04:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/newsletters/</loc>
		<lastmod>2025-05-05T04:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/home-dennys-draft/home-2/</loc>
		<lastmod>2025-05-18T07:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2016/04/john-schnobrich-FlPc9_VocJ4-unsplash11-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/1527418528052-300x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/christopher-gower-m_HRfLhgABo-unsplash-1024x682.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/muhammad-faiz-zulkeflee-alw-CwGFmwQ-unsplash1-819x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/FairInstitute.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/BlackDiamondRisk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/CRFQ2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/B.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/Sevenrules.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/Cybergreen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/BohemiaD.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/05/peak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/about/</loc>
		<lastmod>2025-06-14T08:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/contact/</loc>
		<lastmod>2025-06-16T10:42:36+00:00</lastmod>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/04/3-1-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://reasonablesecurity.org.au/events/</loc>
		<lastmod>2025-06-16T11:22:54+00:00</lastmod>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/06/CBA-Australia.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://reasonablesecurity.org.au/wp-content/uploads/2025/06/ISACA-Sydney-Chapter.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->