<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.heightscg.com/blog</loc>
    <changefreq>daily</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-detection-platforms-for-regulated-industries-6</loc>
    <lastmod>2026-04-27T00:19:36.921Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/executive-guide-to-incident-response-advanced-strategies</loc>
    <lastmod>2026-04-25T05:07:46.411Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/business-aligned-security-turn-cyber-risk-into-opportunity</loc>
    <lastmod>2026-04-26T02:00:54.892Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/ai-integration-transforming-healthcare-security</loc>
    <lastmod>2026-04-25T01:00:52.877Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-monitoring-guide-executives-advanced-strategies</loc>
    <lastmod>2026-04-24T00:30:55.198Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-assess-endpoint-security-guide-for-leaders</loc>
    <lastmod>2026-04-23T01:01:03.433Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-it-governance-align-security-business-goals</loc>
    <lastmod>2026-04-22T00:30:53.335Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/strategic-advantages-threat-hunting-cisos</loc>
    <lastmod>2026-04-21T00:30:56.772Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/top-advantages-managed-security-strategic-leaders</loc>
    <lastmod>2026-04-18T01:22:44.187Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-ai-security-guide-regulated-industries</loc>
    <lastmod>2026-04-20T01:01:05.655Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-continuous-monitoring-matters-cybersecurity-leaders</loc>
    <lastmod>2026-04-17T04:05:50.715Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/executive-leadership-security-strategic-roles-impact</loc>
    <lastmod>2026-04-16T19:25:32.720Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-checklist-executives-2025-strategies</loc>
    <lastmod>2026-04-16T03:00:26.390Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/step-by-step-incident-response-plan-executives-2026</loc>
    <lastmod>2026-04-15T02:41:28.337Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-follow-nist-standards-compliance-resilience</loc>
    <lastmod>2026-04-14T02:51:09.149Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/top-cybersecurity-trends-healthcare-2025</loc>
    <lastmod>2026-04-13T02:31:11.804Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-automation-strategic-benefits-executives</loc>
    <lastmod>2026-04-12T01:09:00.615Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/align-cybersecurity-with-business-objectives-guide</loc>
    <lastmod>2026-04-11T01:14:34.714Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/mastering-regulatory-compliance-guide-it-leaders</loc>
    <lastmod>2026-04-10T03:27:23.506Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-detection-platforms-for-healthcare-5</loc>
    <lastmod>2026-04-09T04:31:06.125Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/high-impact-threat-hunting-workflow-executives</loc>
    <lastmod>2026-04-08T03:00:11.238Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-audits-compliance-cyber-risk-reduction</loc>
    <lastmod>2026-04-07T02:58:41.915Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-drives-digital-transformation-success</loc>
    <lastmod>2026-04-06T03:50:19.736Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/types-of-cyber-threats-c-level-leaders-need-to-know</loc>
    <lastmod>2026-04-05T01:08:06.045Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/types-cybersecurity-controls-strategic-guide-executives</loc>
    <lastmod>2026-04-04T03:09:57.227Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/compliance-management-tools-6</loc>
    <lastmod>2026-04-03T09:12:37.109Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/endpoint-detection-strategy-guide-executives-2026</loc>
    <lastmod>2026-04-02T05:46:28.548Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/integrate-cybersecurity-with-business-strategic-growth</loc>
    <lastmod>2026-04-01T01:19:55.882Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cisos-regulatory-compliance-success-key-roles</loc>
    <lastmod>2026-03-31T07:21:29.881Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/essential-cybersecurity-trends-leaders-need-to-know</loc>
    <lastmod>2026-03-30T01:20:44.672Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-cmmc-cybersecurity-maturity-compliance-guide</loc>
    <lastmod>2026-03-29T03:46:45.925Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/developing-ai-security-strategy-executive-compliance-guide</loc>
    <lastmod>2026-03-28T01:04:09.905Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cmmc-requirements-executive-guide-compliance</loc>
    <lastmod>2026-03-27T04:16:30.947Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/top-threat-detection-platforms-4</loc>
    <lastmod>2026-03-26T09:22:40.891Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/defining-supply-chain-cyber-risk-guide-for-executives</loc>
    <lastmod>2026-03-25T03:44:13.185Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/compliance-framework-implementation-5-steps-to-success</loc>
    <lastmod>2026-03-24T03:45:50.276Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/board-level-cybersecurity-reporting-guide-for-executives</loc>
    <lastmod>2026-03-23T05:09:45.013Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-essential-healthcare-2026</loc>
    <lastmod>2026-03-22T03:35:09.100Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/advantages-of-ai-in-cybersecurity-for-executives</loc>
    <lastmod>2026-03-21T04:43:40.102Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-security-advisory-expert-guide-cyber-leaders</loc>
    <lastmod>2026-03-20T03:08:14.031Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/regulatory-compliance-checklist-2026-essential-steps-for-executives</loc>
    <lastmod>2026-03-19T11:31:28.373Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-of-security-advisory-in-strategic-cybersecurity-for-2026</loc>
    <lastmod>2026-03-18T05:41:44.896Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-cybersecurity-is-a-business-priority-in-2026</loc>
    <lastmod>2026-03-17T05:04:45.521Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/incident-response-tips-c-level-executives-2026</loc>
    <lastmod>2026-03-16T01:34:05.062Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-management-workflow-guide-cybersecurity-leaders-2026</loc>
    <lastmod>2026-03-15T03:47:52.296Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-compliance-cloud-security-2026</loc>
    <lastmod>2026-03-14T05:50:59.294Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-cyber-insurance-2026-guide-for-executives</loc>
    <lastmod>2026-03-13T09:56:48.223Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/strategic-role-security-monitoring-2026</loc>
    <lastmod>2026-03-12T04:48:11.735Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/hipaa-compliance-essential-executive-guide-2026</loc>
    <lastmod>2026-03-11T04:55:50.855Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/guide-managed-cybersecurity-compliance-2026</loc>
    <lastmod>2026-03-10T05:13:02.263Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/incident-response-solutions-comparison-4</loc>
    <lastmod>2026-03-09T04:22:17.172Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-build-incident-response-plan-regulated-industries</loc>
    <lastmod>2026-03-08T04:23:18.990Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/emerging-tech-security-executive-guide-2026</loc>
    <lastmod>2026-03-07T04:43:29.895Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-vulnerability-assessment-strategic-guide-executives-2026</loc>
    <lastmod>2026-03-06T03:38:29.034Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-tips-2026-zero-trust-risk-reduction</loc>
    <lastmod>2026-03-05T06:52:21.502Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-hunting-checklist-2026-cut-dwell-time-85</loc>
    <lastmod>2026-03-04T05:40:55.542Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/best-cybersecurity-tools-2025-8</loc>
    <lastmod>2026-03-03T04:31:28.913Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/ir-teams-cut-healthcare-breach-costs-28-2026</loc>
    <lastmod>2026-03-02T03:17:04.988Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-business-needs-cybersecurity-breach-cost</loc>
    <lastmod>2026-03-01T05:33:11.698Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cyber-defense-roi-cut-breach-costs-36-percent-boost-resilience</loc>
    <lastmod>2026-02-28T05:42:24.689Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/importance-incident-response</loc>
    <lastmod>2026-02-27T01:47:00.174Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-management-tips-healthcare-cisos</loc>
    <lastmod>2026-02-26T01:36:23.638Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/endpoint-security-best-practices-risk-reduction</loc>
    <lastmod>2026-02-25T01:44:31.043Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-use-managed-cybersecurity</loc>
    <lastmod>2026-02-24T01:39:43.896Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-intelligence-tools-for-cisos-6</loc>
    <lastmod>2026-02-23T01:46:58.450Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-assessments-hipaa-cisos</loc>
    <lastmod>2026-02-22T07:14:35.830Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/optimize-risk-assessment-workflow-healthcare</loc>
    <lastmod>2026-02-21T01:29:48.574Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-governance-guide-healthcare</loc>
    <lastmod>2026-02-20T08:53:29.663Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-intelligence-healthcare-cisos</loc>
    <lastmod>2026-02-19T06:55:17.620Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-tips-for-healthcare-cisos</loc>
    <lastmod>2026-02-18T05:29:13.814Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-compliance-frameworks-healthcare</loc>
    <lastmod>2026-02-17T03:41:02.239Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/7-effective-threat-hunting-strategies-list</loc>
    <lastmod>2026-02-16T08:20:40.721Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-use-vulnerability-assessments</loc>
    <lastmod>2026-02-15T05:23:16.663Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/integrate-cybersecurity-strategy-healthcare</loc>
    <lastmod>2026-02-15T16:30:04.873Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-management-best-practices-healthcare-cisos</loc>
    <lastmod>2026-02-14T08:07:13.571Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-hunting-process-guide-cisos-healthcare</loc>
    <lastmod>2026-02-12T09:54:40.302Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-in-business-strategy</loc>
    <lastmod>2026-02-11T13:30:55.876Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/soc-2-requirements-healthcare-security</loc>
    <lastmod>2026-02-10T05:27:09.533Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-regulated-industries-compliance</loc>
    <lastmod>2026-02-09T02:54:13.220Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/threat-hunting-cyber-resilience-cisos</loc>
    <lastmod>2026-02-08T07:40:23.895Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-leadership-workflow-compliance-success</loc>
    <lastmod>2026-02-07T02:36:03.717Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/managed-detection-and-response-tools-8</loc>
    <lastmod>2026-02-06T03:46:49.396Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-frameworks-compliance</loc>
    <lastmod>2026-02-05T03:51:36.499Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-implement-nist-framework</loc>
    <lastmod>2026-02-04T03:02:24.078Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/leadership-cyber-risk-healthcare</loc>
    <lastmod>2026-02-03T02:50:23.916Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cloud-security-checklist-healthcare-7-steps</loc>
    <lastmod>2026-02-02T03:25:55.284Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/examples-of-security-frameworks-for-cisos</loc>
    <lastmod>2026-04-03T16:21:58.076Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/best-cybersecurity-platforms-2025-4</loc>
    <lastmod>2026-01-31T02:29:55.504Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/technical-cybersecurity-consulting-explained</loc>
    <lastmod>2026-01-30T03:28:49.590Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/regulatory-compliance-cybersecurity</loc>
    <lastmod>2026-01-29T06:37:22.881Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-risk-management-matters-healthcare</loc>
    <lastmod>2026-01-28T02:56:12.819Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-of-incident-response</loc>
    <lastmod>2026-01-27T06:19:42.510Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/7-effective-threat-detection-examples-healthcare-cisos</loc>
    <lastmod>2026-01-26T08:29:06.181Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/guide-to-risk-assessment-cybersecurity</loc>
    <lastmod>2026-01-25T02:41:15.020Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/nist-framework-healthcare-cybersecurity</loc>
    <lastmod>2026-01-24T07:52:51.874Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/best-cybersecurity-compliance-tools-5</loc>
    <lastmod>2026-01-23T06:52:12.086Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/managed-security-healthcare-cyber-risk</loc>
    <lastmod>2026-01-22T10:43:50.613Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-build-cybersecurity-strategy</loc>
    <lastmod>2026-01-21T08:10:31.936Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-build-cybersecurity-roadmap</loc>
    <lastmod>2026-01-20T07:25:35.914Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-posture-regulated-organizations</loc>
    <lastmod>2026-01-19T08:58:18.160Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-compliance-tips-healthcare-cisos</loc>
    <lastmod>2026-01-18T06:09:08.030Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-cyber-resilience-healthcare</loc>
    <lastmod>2026-01-17T05:36:24.603Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cmmc-compliance-checklist-7-key-steps</loc>
    <lastmod>2026-01-16T06:07:08.015Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/governance-in-cybersecurity-role</loc>
    <lastmod>2026-01-15T06:03:30.693Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/benefits-cybersecurity-frameworks-healthcare</loc>
    <lastmod>2026-01-14T10:44:56.455Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/7-government-cybersecurity-best-practices-for-cisos</loc>
    <lastmod>2026-01-13T07:11:47.231Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-establish-security-governance-compliance</loc>
    <lastmod>2026-01-12T06:07:54.315Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/ai-in-cybersecurity-us-healthcare</loc>
    <lastmod>2026-01-11T06:17:07.995Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/defining-cyber-maturity-healthcare</loc>
    <lastmod>2026-01-10T06:07:39.884Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/role-cybersecurity-strategy-healthcare</loc>
    <lastmod>2026-01-09T03:18:29.012Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cyber-risk-financial-services</loc>
    <lastmod>2026-01-08T03:02:41.662Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/step-by-step-cyber-risk-assessment-healthcare</loc>
    <lastmod>2026-01-07T03:16:37.106Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/best-cybersecurity-consulting-firms-2025-comparison</loc>
    <lastmod>2026-01-06T04:36:35.822Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-assessment-healthcare-cybersecurity</loc>
    <lastmod>2026-01-05T03:29:59.183Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-roadmap-for-executives</loc>
    <lastmod>2026-01-04T03:55:22.623Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-risk-assessment-healthcare</loc>
    <lastmod>2026-01-03T04:53:21.550Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cyber-risk-management-list-key-strategies</loc>
    <lastmod>2026-01-02T09:24:33.967Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/7-steps-cyber-risk-assessment-checklist</loc>
    <lastmod>2026-01-01T06:59:36.844Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cyber-risk-management-platforms-comparison</loc>
    <lastmod>2025-12-31T08:43:29.922Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-soc-2-compliance</loc>
    <lastmod>2025-12-30T14:13:29.614Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-compliance-healthcare-cisos</loc>
    <lastmod>2025-12-29T18:03:04.495Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/security-operations-center-explained</loc>
    <lastmod>2025-12-29T07:59:46.124Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/what-is-cyber-risk-healthcare</loc>
    <lastmod>2025-12-27T04:03:36.128Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-compliance-checklist-7-steps-healthcare</loc>
    <lastmod>2025-12-26T09:46:21.229Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cybersecurity-governance-guide-healthcare-cisos</loc>
    <lastmod>2025-12-25T05:08:37.900Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/why-perform-security-assessments</loc>
    <lastmod>2025-12-24T09:44:51.683Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/managed-security-services-comparison</loc>
    <lastmod>2025-12-23T17:32:17.996Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/vulnerability-management-business-resilience</loc>
    <lastmod>2025-12-22T12:43:56.353Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/cyber-risk-management-steps-secure-organizations</loc>
    <lastmod>2025-12-21T08:56:57.414Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/how-to-achieve-soc-2-compliance</loc>
    <lastmod>2025-12-20T08:28:52.993Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/risk-management-business-security</loc>
    <lastmod>2025-12-19T16:38:05.143Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/types-of-cyber-risk-assessments</loc>
    <lastmod>2025-12-17T11:46:58.562Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
  <url>
    <loc>https://blog.heightscg.com/blog/executive-cybersecurity-leadership-role</loc>
    <lastmod>2025-12-17T11:37:13.163Z</lastmod>
    <changefreq>weekly</changefreq>
  </url>
</urlset>