<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://igicybersecurity.com/press-releases</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-and-omega-atc-announce-technology-alliance-leveraging-nodeware-to-deliver-pci-dss-v401-compliant-authenticated-vulnerability-scanning-for-multi-location-retailers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/f844dd7d-e720-4183-b0e4-a8b8e8725596/nodeware-omega-pr.png</image:loc>
      <image:title>IGI Press Releases - IGI Cybersecurity and Omega ATC Announce Technology Alliance Leveraging Nodeware® to Deliver PCI DSS v4.0.1 Compliant Authenticated Vulnerability Scanning for Multi-Location Retailers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-adds-patch-management-for-windows-enhancing-its-vulnerability-management-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-by-igi-cyberlabs-achieves-certified-psa-integration-through-connectwise-invent-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/f4ba063f-c16f-410b-9637-02bad686b19f/nw-invent-psa.png</image:loc>
      <image:title>IGI Press Releases - Nodeware® by IGI CyberLabs Achieves Certified PSA Integration through ConnectWise Invent Program - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-by-igi-cyberlabs-and-vciotoolbox-forge-strategic-partnership-for-enhanced-cybersecurity-solution-for-msps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-by-igi-cyberlabs-selected-as-finalist-in-connectwises-2023-pitchit-accelerator-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-by-igi-cyberlabs-to-introduce-automated-patching-and-remediation-in-upcoming-q4-release-taking-vulnerability-management-to-the-next-level</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-by-igi-cyberlabs-continues-to-make-waves-in-the-channel-and-empower-msps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-among-participants-selected-for-connectwises-pitchit-class-of-2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-24</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-named-best-security-product-at-smb-techfest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-28</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/infinite-group-inc-announces-implementation-of-reverse-stock-split-in-preparation-for-planned-uplisting-to-nasdaq</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-to-sponsor-three-events-during-cybersecurity-awareness-month</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-announces-commitment-to-growing-global-cybersecurity-success-by-becoming-a-cybersecurity-awareness-month-2022-champion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-supports-stronger-msp-ecosystem-through-strategic-integration-partnerships</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-partners-with-gradient-msp-to-support-eight-of-the-top-psas-in-the-it-channel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-to-sponsor-2022-telarus-partner-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/nodeware-and-securitystudio-integration-brought-to-market-by-xerox-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-partners-with-threatadvice-to-include-nodeware-solution-in-breach-prevention-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igis-jim-ambrosini-recognized-for-achievements-in-cybersecurity-with-isacas-2022-joseph-j-wasserman-award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-now-offering-nodeware-through-large-nationwide-managed-service-provider-integris</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-partners-with-cowbell-cyber-to-bring-nodeware-solution-to-cyber-insurance-customers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-09</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-and-socsoter-integrate-platforms-to-streamline-continuous-monitoring-solutions-for-smbs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/infinite-group-inc-igi-enters-into-definitive-agreement-to-acquire-information-security-company-pratum-inc-pratum</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-27</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-introduces-new-penlogic-penetration-testing-servicenbspfor-proactive-ongoing-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-partners-with-securitystudio-to-simplify-information-security-for-underserved-markets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-releases-automatic-update-to-its-nodeware-solution-that-identifies-log4j-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-enhances-nodeware-solution-with-new-features-adds-api-integrations-grouping-amp-tagging-and-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-introduces-ciso-team-as-a-service-to-meet-growing-industry-demands-for-cybersecurity-expertise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cyberlabs-adds-linux-agent-other-enhancements-to-its-nodeware-vulnerability-management-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/h72gl0n043gdzm32ord7b2memfl24u</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-announces-commitment-to-global-efforts-advocating-for-cybersecurity-and-online-behavior-change-during-cybersecurity-awareness-month</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-to-sponsor-2021-telarus-partner-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-creates-subsidiary-igi-cyberlabsnames-stuart-cohen-as-president</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-moves-to-otcqb-venture-markets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-receives-first-patent-for-nodewarevulnerability-management-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/igi-cybersecurity-adds-macos-agent-to-its-nodeware-vulnerability-management-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/infinite-group-inc-announces-new-look</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/infinite-group-inc-grows-cybersecurity-team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2021/02/03/2021-2-3-imci-igi-cybersecurity-issues-shareholder-letter-and-provides-corporate-update</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/10/13/2020-10-13-iginbspannouncesnbspcommitment-to-global-efforts-supporting-online-safety-and-privacy-for-cybersecurity-awareness-monthnbsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-11</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/10/07/cyberxchange</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/09/16/2020-9-16-igi-names-former-wegmans-cio-don-reeve-chairman-of-the-board-current-coo-andrew-hoyen-made-president</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/07/22/2020-7-21-igi-announcesnbspnodeware-cybersecurity-solution-now-available-as-windows-app-moves-to-asset-based-pricing-modelnbsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/03/04/2020-3-4-igi-announces-new-patent-pending-technology-for-nodeware-network-security-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/02/25/2020-2-25-igi-nodeware-win-infosec-awards-at-rsa-conference-2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2020/01/30/2020-1-30-igi-and-security-101-donate-security-products-and-services-to-camp-good-days</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2019/11/06/2019-11-6-igi-partners-with-joval-continuous-monitoring-to-power-its-nodeware-vulnerability-scanning-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2019/10/15/2019-10-15-igi-partners-with-staples-to-bring-cutting-edge-cybersecurity-solution-nodeware-to-businesses-nationwide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2019/10/01/2019-10-1-igi-enhances-cybersecurity-offerings-through-agreement-with-technology-distribution-leader-synnex-corporation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2019/09/24/2019-9-24-igi-to-exhibit-as-platinum-sponsor-of-2019-rochester-security-summit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-18</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2019/08/14/2019-newnodewareplatform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2018/06/04/2018-12-19-infinite-group-to-sponsor-new-york-state-cyber-security-conference-june-5-6</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2018/06/01/2018-12-19-infinite-group-inc-to-exhibit-at-nysasbos-70th-annual-education-summit-amp-expo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2018/05/15/2018-12-19-infinite-group-inc-announces-sponsorship-of-nyslgitda-spring-conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2018/03/20/2018-12-19-infinite-group-inc-offers-free-trials-of-nodeware-cybersecurity-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2018/01/16/2018-12-19-igi-introduces-credentialed-scanning-andnbspplus-optionnbspfor-itsnbspnodeware-security-solutionnbsp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2017/10/10/2018-12-19-nodeware-joins-telarus-supplier-team-with-niche-cybersecurity-product</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2017/09/19/2018-12-19-infinite-group-inc-launches-new-version-of-nodeware-cybersecurity-solution-now-available-as-virtual-machine</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2017/03/22/2018-12-19-channelpro-names-infinite-group-inc-a-2017-vendor-on-the-vanguard</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/2016/11/14/2018-12-19-infinite-group-inc-introduces-nodeware-vulnerability-management-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-09-12</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/category/Press+Release</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/press-releases/category/Uncategorized</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/channel-partner-bluesky-it-partners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758637636941-AOJAM5ZPW0PYRLLOK94R/igi-case-study-channel-partner.png</image:loc>
      <image:title>Case Studies - Channel Partner Case Study</image:title>
      <image:caption>IGI’s Channel Partner, BlueSky IT Partners, leverages IGI’s cybersecurity expertise to help clients solve security problems and protect themselves from cyber attacks. But, when BlueSky was the target of an attack themselves, they partnered with IGI in a whole new way.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/financial-owasp-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758638176356-TI7CLCFKIERNQNWP2ZXJ/igi-case-study-financial-pen-test.png</image:loc>
      <image:title>Case Studies - Financial Industry / Penetration Testing Case Study</image:title>
      <image:caption>When small organizations partner with large firms, they are often subject to cybersecurity requirements and requests put forth by their partners. This was the case for one small business who found themselves needing to fulfill such requests in order to maintain their partnerships.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/retail-incident-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758637080707-SYH9445GE8HW2U59H7V8/igi-case-study-retail-incident-response.png</image:loc>
      <image:title>Case Studies - Retail Industry / Incident Response Case Study</image:title>
      <image:caption>IGI worked with our partner, Dicar Networks, to help a large electronics company recover from multiple ransomware incidents and bolster its security posture to prevent future attacks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/legal-nodeware-vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758638476829-DRVS128WJ0BBBGIX2F3U/igi-case-study-legal-nodeware-vulnerability-management.png</image:loc>
      <image:title>Case Studies - Legal Industry / Nodeware® Case Study</image:title>
      <image:caption>An established law firm based in Rochester, NY, with locations in several U.S. cities, is changing the way it protects its information with Nodeware vulnerability management and cybersecurity services from IGI. The firm has been in businesses for over 100 years, a tenure that was not earned by keeping the status quo, but by staying ahead of the curve with the latest security technology. From their perspective, taking extra measures to protect client information is not only an ethical duty, but a standard of care for the firm.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/financial-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758655401368-7F7K3YU0DBODFGAT7O42/igi-case-study-credit-union-pen-test.png</image:loc>
      <image:title>Case Studies - Financial Industry / Penetration Testing Case Study - For a trusted Federal Credit Union that has been in business for more than 80 years, cybersecurity has to be a top priority. That’s why this Upstate New York credit union chose IGI to help evaluate its security state, identify security gaps, and improve overall security posture. This IGI customer is dedicated to not only meeting the necessary cybersecurity requirements for compliance, but also taking extra steps to protect client information in an industry where data breaches are all too common.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/power-incident-response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758639521453-D1K9OQWQ2ZMNGPC7CLVK/igi-case-study-power-energy-IR.png</image:loc>
      <image:title>Case Studies - Power Industry / Incident Response Case Study</image:title>
      <image:caption>A power generation organization with 10 remote sites and more than 100 workers at each site was facing unique challenges in cybersecurity. The organization was owned by a parent company that oversaw operations, meaning that Information Technology and Security was largely independent at each of the remote sites. Read more about how IGI streamlined their security and solved critical issues.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/manufacturing-vciso</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758646478032-4YF3BBMJJK39WGL39U1W/igi-case-study-manufacturing-vciso.png</image:loc>
      <image:title>Case Studies - Manufacturing Industry / vCISO Case Study</image:title>
      <image:caption>When a wholesale building products retailer with multiple locations was faced with a ransomware attack, they reached out to their trusted technology partner, Streamline Communications, which turned to IGI Cybersecurity to help their client face this security incident.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1614712303301-87UVH4YGFYCOEIXY4975/image-asset.png</image:loc>
      <image:title>Case Studies - Manufacturing Industry / vCISO Case Study - Streamline Communications</image:title>
      <image:caption>17 Vine Street Murray, UT 84107</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/government-nodeware-vulnerability-management</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1758654354864-EH77RHF3LBJSCRHIDU6S/igi-case-study-government-nodeware.png</image:loc>
      <image:title>Case Studies - Government / Nodeware® Case Study</image:title>
      <image:caption>IGI Cybersecurity helped a Texas municipality find a cybersecurity solution that complemented its existing security posture, helped it easily manage its network, and protect its valuable data. With a town comprised of nearly 80,000 people with more than 600 employees across 14 different buildings, including police and fire, the IT team knew they needed to go beyond the basics—so they turned to a cutting-edge cybersecurity software that gave them more ownership over their network security without breaking the bank.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1614711452876-JRA1K6R0EJADEO9OM721/Blue%2BReef%2BLogo%2BNew.jpg</image:loc>
      <image:title>Case Studies - Government / Nodeware® Case Study - Blue Reef Networks</image:title>
      <image:caption>17304 Preston Road Suite 800 Dallas, TX 75252</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/category/Incident+Response</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/category/Nodeware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/category/vCISO</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/case-studies/category/Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://igicybersecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1612538440852-EJFSVY0Z1PTZLKWL8SJW/office-backdrop.jpg</image:loc>
      <image:title>IGI Cybersecurity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1612538440852-EJFSVY0Z1PTZLKWL8SJW/office-backdrop.jpg</image:loc>
      <image:title>IGI Cybersecurity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1612538440852-EJFSVY0Z1PTZLKWL8SJW/office-backdrop.jpg</image:loc>
      <image:title>IGI Cybersecurity</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/9c360209-a494-4542-ba6e-4740d83ac249/igi-cybersecurity-services-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-05</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/careers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/newsroom</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/investors</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-09</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-10</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/ethics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
  </url>
  <url>
    <loc>https://igicybersecurity.com/ciso-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8251d131-99fc-462b-8faf-3234a566beaf/igi-ciso-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8972ae9b-e66e-477d-b73c-0602435024f5/igi-ciso-services-diagram.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/bd8febe5-f27b-4a27-a16e-8f0d67195cf1/igi-ciso-services-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/fe8db37c-5548-4f7a-80f8-35ce0caf8ae4/igi-ciso-services-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/770c2481-7537-4b2d-bb83-143741986c3d/igi-ciso-services-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/7e7104b1-b269-453b-9753-12b95773ebe8/igi-ciso-services-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/272876f2-8eda-4c76-b26d-0858acda2e18/igi-penetration-testing-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/677367b4-705b-4bab-986b-149bc27fb422/igi-compliance-readiness-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/ab8d20ee-3ccb-4da2-ba67-54b36a2f2392/igi-risk-management-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1614356737745-91LMP2F07LKS1BKL0ADL/IGI_Image_01.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/third-party-risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/83dd133d-553d-43b4-a3cf-fc4ba354fe3e/igi-vendor-secure-tprm.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/487dc2d0-b90a-454f-9689-90f7cf30114a/igi-third-party-risk-management.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/cmmc-readiness</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2c2080df-642d-4602-8634-60c20fccb346/igi-cmmc-pre-assessment-services-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/a4a07dfb-cd71-44dd-8357-38aaadedb68a/cmmc-rpa-badge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/4d6fa8a7-d87f-4deb-986d-e072d2f97130/ccp-badge.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/5adce3af-1ea4-4759-a284-824f5c254e98/cca-badge.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/ebb131e2-3af1-4856-95ee-6c6816d3b3a5/igi-penetration-testing-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/c016c876-25eb-47d8-9c94-81582ead1525/igi-penetration-testing-diagram.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2d016977-b1d3-43e8-97b0-1e0d3a8a4319/igi-penetration-testing-services-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/3e72d125-aaa7-493f-afca-c87c994855e7/igi-penetration-testing-services-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/d3b11447-cc14-4a52-b700-e7483ca480a0/igi-penetration-testing-services-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/27ea1771-2d80-4377-9531-c84d06615384/igi-penetration-testing-services-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/fe253e0c-e859-47cc-a06e-225d789cbf1f/igi-ciso-services-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/677367b4-705b-4bab-986b-149bc27fb422/igi-compliance-readiness-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/ab8d20ee-3ccb-4da2-ba67-54b36a2f2392/igi-risk-management-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1612373748217-351G7XNGUA6TA9E4C0HZ/IGI_Image_03.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/free-consultation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/527f64c9-cef6-458c-9d5d-2c972d32051d/IGI+Cybersecurity+Logo+White.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/compliance-readiness</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2790a65f-e0f5-4844-9f3c-8618b7cfe98e/igi-compliance-readiness.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2e7a0734-bded-412b-b2b8-4c9f4d8f2068/igi-compliance-readiness-diagram.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/c55b1962-759f-4a0a-971a-fccdb4f22748/igi-compliance-readiness-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2a987e68-ca9d-4875-8892-463fa0d6595b/igi-compliance-readiness-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/08091148-a56f-4ad9-99aa-b38d3b46cd4a/igi-compliance-readiness-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/a9cfd6a4-08ef-4927-876d-bbffe9de760a/igi-compliance-readiness-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/6dc64214-daf4-4b01-ab4d-323f79ffb822/igi-cmmc-readiness-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/272876f2-8eda-4c76-b26d-0858acda2e18/igi-penetration-testing-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/fe253e0c-e859-47cc-a06e-225d789cbf1f/igi-ciso-services-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/18e53e37-0f9d-45eb-9c7f-0914f030dfaf/IGI_Image_09.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/risk-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/24a1ab9b-b447-4f49-bf8f-a770ef103273/igi-risk-management-services.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/01cdda1b-871d-420a-8829-3b672cae3934/igi-risk-management-diagram.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/33c34feb-26fd-458a-8f15-2a245ed00a8f/igi-risk-management-services-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/418ef6aa-f9aa-4e49-855b-acbf90501258/igi-risk-management-services-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/5f256fae-7374-4e2f-ac6b-077a8235edc3/igi-risk-management-services-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/7e4769dc-9ff5-4a96-b0b7-b2f7b1e58be0/igi-risk-management-services-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/fe253e0c-e859-47cc-a06e-225d789cbf1f/igi-ciso-services-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/677367b4-705b-4bab-986b-149bc27fb422/igi-compliance-readiness-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/272876f2-8eda-4c76-b26d-0858acda2e18/igi-penetration-testing-button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/1613592299188-M3IAALCJQKIMLIMKS7GK/IGI_Image_05.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/our-approach</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/b1a44406-39c6-473d-8ac7-8c29690dd801/our-approach-graphic-with-text.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/dc26f601-cc32-4b14-8700-46fc2a411b38/igi-our-approach-2.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/7fd5797e-858a-4dc4-9bcf-3a8d833869d4/igi-our-approach-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/dea0ba42-17c8-4aaf-918e-281a9a5b73be/igi-our-approach-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/c34b01f1-ae27-4a73-8032-c7e37e3e6d12/igi-our-approach-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/far-clause-cybersecurity-readiness</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8bfa61e1-4c57-416b-9268-24056856040c/igi-far-clause-cybersecurity-assessment.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/efd12fd2-56ee-410c-b2d6-f0b375a29e98/igi-far-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/16bd151c-4d94-4764-af20-077f46b0e4f4/igi-far-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/cfc5a532-1711-414c-bf8d-00f95de743a2/igi-far-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/3f238291-5d4c-4a1b-8f61-1e3a4d7aedaa/igi-far-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/5d4e49d5-ceef-4169-8bab-ef6c7d6c5086/igi-far-clause-cybersecurity-assessment-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/cc0e5bba-aee8-4086-b9a6-b1ad9c825293/far-clause-cybersecurity-assessment-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8251d131-99fc-462b-8faf-3234a566beaf/igi-ciso-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/ebb131e2-3af1-4856-95ee-6c6816d3b3a5/igi-penetration-testing-services.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2790a65f-e0f5-4844-9f3c-8618b7cfe98e/igi-compliance-readiness.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/24a1ab9b-b447-4f49-bf8f-a770ef103273/igi-risk-management-services.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/vulnerability-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/58d8c3ab-c2ea-42ad-bb6f-30fdc908ff5d/igi-continuous-vulnerability-management.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/ed5a5816-9968-4877-a3f3-f7bd84e88638/nodeware-logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/d8ecd625-4993-40e0-985c-87d4c37b48bd/nw-dashboard-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8d89eb9e-2f3d-4866-9051-edaeb041864b/bullet-point-igi.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/8cfa9a22-26da-45af-9c31-8aff6589286e/igi-continuous-vulnerability-management-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/fd3298ea-62a2-41a7-9167-2450ebc02072/igi-continuous-vulnerability-management-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/052078d0-4672-4200-beed-e13b77fd960d/igi-continuous-vulnerability-management-3.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/b0b71450-4e62-4aa1-a006-6da7ac92cff5/igi-continuous-vulnerability-management-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/2263a293-0bfd-4170-ae27-e7daa7274bf3/IGI_Image_07.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://igicybersecurity.com/schedule-a-demo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6006f8b53294c7562436b4e0/527f64c9-cef6-458c-9d5d-2c972d32051d/IGI+Cybersecurity+Logo+White.png</image:loc>
    </image:image>
  </url>
</urlset>

