<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://resiliently.ai/</loc></url><url><loc>https://resiliently.ai/about/</loc></url><url><loc>https://resiliently.ai/advertise/</loc></url><url><loc>https://resiliently.ai/assessments/</loc></url><url><loc>https://resiliently.ai/assessments/accumulation-visualizer/</loc></url><url><loc>https://resiliently.ai/assessments/accumulation/</loc></url><url><loc>https://resiliently.ai/assessments/backup-recovery/</loc></url><url><loc>https://resiliently.ai/assessments/breach-cost/</loc></url><url><loc>https://resiliently.ai/assessments/breach-timeline/</loc></url><url><loc>https://resiliently.ai/assessments/compliance-checker/</loc></url><url><loc>https://resiliently.ai/assessments/compliance/</loc></url><url><loc>https://resiliently.ai/assessments/coverage-gap/</loc></url><url><loc>https://resiliently.ai/assessments/coverage/</loc></url><url><loc>https://resiliently.ai/assessments/cyber-risk-calculator/</loc></url><url><loc>https://resiliently.ai/assessments/cyber-risk/</loc></url><url><loc>https://resiliently.ai/assessments/deepfake-quiz/</loc></url><url><loc>https://resiliently.ai/assessments/deepfake/</loc></url><url><loc>https://resiliently.ai/assessments/domain-exposure/</loc></url><url><loc>https://resiliently.ai/assessments/domain/</loc></url><url><loc>https://resiliently.ai/assessments/dora-readiness/</loc></url><url><loc>https://resiliently.ai/assessments/dora/</loc></url><url><loc>https://resiliently.ai/assessments/incident-cost/</loc></url><url><loc>https://resiliently.ai/assessments/insurance-readiness/</loc></url><url><loc>https://resiliently.ai/assessments/iot-attack-surface/</loc></url><url><loc>https://resiliently.ai/assessments/iot/</loc></url><url><loc>https://resiliently.ai/assessments/nis2-checker/</loc></url><url><loc>https://resiliently.ai/assessments/nis2/</loc></url><url><loc>https://resiliently.ai/assessments/ransomware-readiness/</loc></url><url><loc>https://resiliently.ai/assessments/ransomware/</loc></url><url><loc>https://resiliently.ai/assessments/risk-calculator/</loc></url><url><loc>https://resiliently.ai/assessments/scan/</loc></url><url><loc>https://resiliently.ai/assessments/security-scan/</loc></url><url><loc>https://resiliently.ai/assessments/supply-chain-mapper/</loc></url><url><loc>https://resiliently.ai/assessments/supply-chain/</loc></url><url><loc>https://resiliently.ai/assessments/threat-intel/</loc></url><url><loc>https://resiliently.ai/assessments/threat/</loc></url><url><loc>https://resiliently.ai/assessments/zero-trust/</loc></url><url><loc>https://resiliently.ai/authors/</loc></url><url><loc>https://resiliently.ai/authors/michael-guiao/</loc></url><url><loc>https://resiliently.ai/blog/</loc></url><url><loc>https://resiliently.ai/blog/breaking/</loc></url><url><loc>https://resiliently.ai/blog/category/ai-ops-automation/</loc></url><url><loc>https://resiliently.ai/blog/category/compliance/</loc></url><url><loc>https://resiliently.ai/blog/category/cyber-insurance/</loc></url><url><loc>https://resiliently.ai/blog/category/cyber-loss-scenarios/</loc></url><url><loc>https://resiliently.ai/blog/category/cyber-risk/</loc></url><url><loc>https://resiliently.ai/blog/category/underwriting-ai/</loc></url><url><loc>https://resiliently.ai/blog/featured/</loc></url><url><loc>https://resiliently.ai/blog/index-2/</loc></url><url><loc>https://resiliently.ai/blog/subs-only/</loc></url><url><loc>https://resiliently.ai/blog/tags/</loc></url><url><loc>https://resiliently.ai/blog/tags/agentic-ai/</loc></url><url><loc>https://resiliently.ai/blog/tags/ai-ops/</loc></url><url><loc>https://resiliently.ai/blog/tags/ai-security/</loc></url><url><loc>https://resiliently.ai/blog/tags/ai/</loc></url><url><loc>https://resiliently.ai/blog/tags/attack-surface/</loc></url><url><loc>https://resiliently.ai/blog/tags/audit/</loc></url><url><loc>https://resiliently.ai/blog/tags/bec/</loc></url><url><loc>https://resiliently.ai/blog/tags/best%20cyber%20insurance%20policy/</loc></url><url><loc>https://resiliently.ai/blog/tags/brokers/</loc></url><url><loc>https://resiliently.ai/blog/tags/bsi/</loc></url><url><loc>https://resiliently.ai/blog/tags/business%20interruption/</loc></url><url><loc>https://resiliently.ai/blog/tags/checklist/</loc></url><url><loc>https://resiliently.ai/blog/tags/claims/</loc></url><url><loc>https://resiliently.ai/blog/tags/classification/</loc></url><url><loc>https://resiliently.ai/blog/tags/compare%20cyber%20insurance/</loc></url><url><loc>https://resiliently.ai/blog/tags/compliance/</loc></url><url><loc>https://resiliently.ai/blog/tags/coverage%20gaps/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber-coverage/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber-insurance/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber-risk/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20insurance/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20insurance%20comparison/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20insurance%20coverage/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20insurance%20providers%20comparison/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20liability/</loc></url><url><loc>https://resiliently.ai/blog/tags/cyber%20risk/</loc></url><url><loc>https://resiliently.ai/blog/tags/cybersecurity/</loc></url><url><loc>https://resiliently.ai/blog/tags/cybersecurity%20compliance/</loc></url><url><loc>https://resiliently.ai/blog/tags/cybersecurity%20incident%20reporting%20EU/</loc></url><url><loc>https://resiliently.ai/blog/tags/data%20breach%20insurance/</loc></url><url><loc>https://resiliently.ai/blog/tags/deepfakes/</loc></url><url><loc>https://resiliently.ai/blog/tags/domain-exposure/</loc></url><url><loc>https://resiliently.ai/blog/tags/enforcement/</loc></url><url><loc>https://resiliently.ai/blog/tags/essential-entities/</loc></url><url><loc>https://resiliently.ai/blog/tags/essential%20entities/</loc></url><url><loc>https://resiliently.ai/blog/tags/eu-cybersecurity/</loc></url><url><loc>https://resiliently.ai/blog/tags/eu-regulation/</loc></url><url><loc>https://resiliently.ai/blog/tags/eu%20regulation/</loc></url><url><loc>https://resiliently.ai/blog/tags/exclusions/</loc></url><url><loc>https://resiliently.ai/blog/tags/fines/</loc></url><url><loc>https://resiliently.ai/blog/tags/first-party%20coverage/</loc></url><url><loc>https://resiliently.ai/blog/tags/germany/</loc></url><url><loc>https://resiliently.ai/blog/tags/how%20to%20comply%20with%20nis2/</loc></url><url><loc>https://resiliently.ai/blog/tags/important-entities/</loc></url><url><loc>https://resiliently.ai/blog/tags/important%20entities/</loc></url><url><loc>https://resiliently.ai/blog/tags/insurance-buying-guide/</loc></url><url><loc>https://resiliently.ai/blog/tags/insurance%20claims/</loc></url><url><loc>https://resiliently.ai/blog/tags/intelligence/</loc></url><url><loc>https://resiliently.ai/blog/tags/learning-in-public/</loc></url><url><loc>https://resiliently.ai/blog/tags/newsletter/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2/</loc></url><url><loc>https://resiliently.ai/blog/tags/NIS2/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20compliance%20checklist/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20compliance%20requirements/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20deadline%202026/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20enforcement/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20fines/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20incident%20reporting/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20non-compliance/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20notification%20timeline/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20penalties/</loc></url><url><loc>https://resiliently.ai/blog/tags/nis2%20requirements/</loc></url><url><loc>https://resiliently.ai/blog/tags/penalties/</loc></url><url><loc>https://resiliently.ai/blog/tags/premiums/</loc></url><url><loc>https://resiliently.ai/blog/tags/pricing/</loc></url><url><loc>https://resiliently.ai/blog/tags/privacy%20liability/</loc></url><url><loc>https://resiliently.ai/blog/tags/ransomware/</loc></url><url><loc>https://resiliently.ai/blog/tags/risk-pricing/</loc></url><url><loc>https://resiliently.ai/blog/tags/risk%20assessment/</loc></url><url><loc>https://resiliently.ai/blog/tags/risk%20management/</loc></url><url><loc>https://resiliently.ai/blog/tags/smb-security/</loc></url><url><loc>https://resiliently.ai/blog/tags/SME/</loc></url><url><loc>https://resiliently.ai/blog/tags/third-party%20coverage/</loc></url><url><loc>https://resiliently.ai/blog/tags/threat-intelligence/</loc></url><url><loc>https://resiliently.ai/blog/tags/underwriting/</loc></url><url><loc>https://resiliently.ai/blog/tags/what%20does%20cyber%20insurance%20cover/</loc></url><url><loc>https://resiliently.ai/blog/top-stories/</loc></url><url><loc>https://resiliently.ai/calculator/</loc></url><url><loc>https://resiliently.ai/contact/</loc></url><url><loc>https://resiliently.ai/free/nis2-checklist/</loc></url><url><loc>https://resiliently.ai/helpcenter/</loc></url><url><loc>https://resiliently.ai/jobs/</loc></url><url><loc>https://resiliently.ai/jobs/apply/</loc></url><url><loc>https://resiliently.ai/journal/</loc></url><url><loc>https://resiliently.ai/legal/cookies/</loc></url><url><loc>https://resiliently.ai/legal/dpa/</loc></url><url><loc>https://resiliently.ai/legal/faq/</loc></url><url><loc>https://resiliently.ai/legal/privacy/</loc></url><url><loc>https://resiliently.ai/legal/terms/</loc></url><url><loc>https://resiliently.ai/membership/</loc></url><url><loc>https://resiliently.ai/newsletter/</loc></url><url><loc>https://resiliently.ai/newsletter/confirm/</loc></url><url><loc>https://resiliently.ai/newsletter/unsubscribe/</loc></url><url><loc>https://resiliently.ai/podcast/</loc></url><url><loc>https://resiliently.ai/podcast/featured/</loc></url><url><loc>https://resiliently.ai/podcast/guests/</loc></url><url><loc>https://resiliently.ai/podcast/series/</loc></url><url><loc>https://resiliently.ai/podcast/subs-only/</loc></url><url><loc>https://resiliently.ai/podcast/tags/</loc></url><url><loc>https://resiliently.ai/premium/</loc></url><url><loc>https://resiliently.ai/premium/download/</loc></url><url><loc>https://resiliently.ai/premium/success/</loc></url><url><loc>https://resiliently.ai/pricing/</loc></url><url><loc>https://resiliently.ai/reset/</loc></url><url><loc>https://resiliently.ai/resources/50-controls-checklist/</loc></url><url><loc>https://resiliently.ai/resources/ai-prompts-for-brokers/</loc></url><url><loc>https://resiliently.ai/resources/cyber-claims-cheat-sheet/</loc></url><url><loc>https://resiliently.ai/resources/cyber-conversation-starter-kit/</loc></url><url><loc>https://resiliently.ai/resources/cyber-insurance-buyers-guide/</loc></url><url><loc>https://resiliently.ai/resources/nis2-compliance-checklist/</loc></url><url><loc>https://resiliently.ai/sign-in/</loc></url><url><loc>https://resiliently.ai/sign-up/</loc></url><url><loc>https://resiliently.ai/sponsor/</loc></url><url><loc>https://resiliently.ai/subscribe/</loc></url><url><loc>https://resiliently.ai/system/buttons/</loc></url><url><loc>https://resiliently.ai/system/colors/</loc></url><url><loc>https://resiliently.ai/system/links/</loc></url><url><loc>https://resiliently.ai/system/overview/</loc></url><url><loc>https://resiliently.ai/system/typography/</loc></url><url><loc>https://resiliently.ai/tools/</loc></url><url><loc>https://resiliently.ai/tools/accumulation-visualizer/</loc></url><url><loc>https://resiliently.ai/tools/breach-cost-calculator/</loc></url><url><loc>https://resiliently.ai/tools/breach-timeline/</loc></url><url><loc>https://resiliently.ai/tools/compliance-timeline/</loc></url><url><loc>https://resiliently.ai/tools/coverage-gap/</loc></url><url><loc>https://resiliently.ai/tools/cyber-risk-calculator/</loc></url><url><loc>https://resiliently.ai/tools/deepfake-quiz/</loc></url><url><loc>https://resiliently.ai/tools/domain-exposure/</loc></url><url><loc>https://resiliently.ai/tools/incident-cost/</loc></url><url><loc>https://resiliently.ai/tools/iot-attack-surface/</loc></url><url><loc>https://resiliently.ai/tools/loss-exceedance-curve/</loc></url><url><loc>https://resiliently.ai/tools/nis2-checker/</loc></url><url><loc>https://resiliently.ai/tools/pentest-request/</loc></url><url><loc>https://resiliently.ai/tools/pre-submission-checker/</loc></url><url><loc>https://resiliently.ai/tools/readiness/backup-recovery/</loc></url><url><loc>https://resiliently.ai/tools/readiness/dora/</loc></url><url><loc>https://resiliently.ai/tools/readiness/insurance/</loc></url><url><loc>https://resiliently.ai/tools/readiness/ransomware/</loc></url><url><loc>https://resiliently.ai/tools/readiness/zero-trust/</loc></url><url><loc>https://resiliently.ai/tools/scan-history/</loc></url><url><loc>https://resiliently.ai/tools/security-chat/</loc></url><url><loc>https://resiliently.ai/tools/security-scan/</loc></url><url><loc>https://resiliently.ai/tools/security-trends/</loc></url><url><loc>https://resiliently.ai/tools/supply-chain-mapper/</loc></url><url><loc>https://resiliently.ai/tools/templates/</loc></url><url><loc>https://resiliently.ai/tools/threat-intel/</loc></url></urlset>