<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://jtwernicke.com/2022/06/26/how-i-got-into-information-security-part-1/</loc><lastmod>2022-07-16T00:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/how-i-got-into-information-security-part-2/</loc><lastmod>2022-07-15T02:45:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/about-me/</loc><lastmod>2022-07-14T00:11:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://jtwernicke.com/blogs/</loc><lastmod>2022-07-14T00:09:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://jtwernicke.com/2022/07/01/attack-surface-analysis-reduction/</loc><lastmod>2022-07-13T23:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/30/ssdlc-part-4-the-security-advisor/</loc><lastmod>2022-07-13T23:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/30/the-cissp-certification-continuous-education/</loc><lastmod>2022-07-01T01:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/30/ssdlc-part-5-security-testing-scanning/</loc><lastmod>2022-07-01T00:19:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/secure-sdlc-part-2-the-bug-bar/</loc><lastmod>2022-06-30T00:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/my-first-job-in-information-security/</loc><lastmod>2022-06-29T23:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/secure-sdlc-part-2-the-threat-model/</loc><lastmod>2022-06-29T23:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/secure-sdlc-part-1-the-secure-sdlc/</loc><lastmod>2022-06-29T23:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com/2022/06/29/my-second-and-current-job-in-information-security/</loc><lastmod>2022-06-29T23:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://jtwernicke.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-07-16T00:11:18+00:00</lastmod></url></urlset>
