<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://macropraxis.org/</loc></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/a-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/aws-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/azure-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/b-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/c-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/cisco-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/coro-security-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/crowdstrike-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/gcp-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/ibm-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/palo-alto-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/a-team-zero-trust-framework/x-mapping</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/about</loc><lastmod>2026-03-02T21:42:17.356Z</lastmod></url><url><loc>https://macropraxis.org/about/alexis-aguirre</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/anthony-alfonso</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/bobby-boughton</loc></url><url><loc>https://macropraxis.org/about/chris-hughes-cissp</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/chris-hughes-cissp/bt-security-interview</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/julie-bloecher-cissp</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/larry-johnson</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/mark-piffl</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/regina-kelly</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/about/stephan-mabry</loc><lastmod>2026-03-02T21:42:01.788Z</lastmod></url><url><loc>https://macropraxis.org/account-planning</loc><lastmod>2025-12-15T17:36:25.425Z</lastmod></url><url><loc>https://macropraxis.org/blocks</loc></url><url><loc>https://macropraxis.org/blog</loc></url><url><loc>https://macropraxis.org/blog-posts-database</loc></url><url><loc>https://macropraxis.org/blog-posts-database/10-tips-to-ensuring-your-startup-survives-the-first-12-months</loc></url><url><loc>https://macropraxis.org/blog-posts-database/6-positive-office-habits</loc></url><url><loc>https://macropraxis.org/blog-posts-database/comparing-the-latest-web-frameworks</loc></url><url><loc>https://macropraxis.org/blog-posts-database/finding-the-balance-between-work-and-life</loc></url><url><loc>https://macropraxis.org/blog-posts-database/remote-working-is-it-really-all-its-made-out-to-be</loc></url><url><loc>https://macropraxis.org/blog-posts-database/the-fine-art-of-balancing-productivity-and-procrastination</loc></url><url><loc>https://macropraxis.org/blog-posts-database/what-is-notion-and-why-is-it-so-cool</loc></url><url><loc>https://macropraxis.org/building-high-performance-sales-teams</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/business-email-compromise-bec-and-generative-ai</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cadence</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cadence/515-weekly-report</loc><lastmod>2026-03-17T15:20:53.230Z</lastmod></url><url><loc>https://macropraxis.org/careers</loc></url><url><loc>https://macropraxis.org/careers-database</loc></url><url><loc>https://macropraxis.org/careers-database/dev-ops</loc></url><url><loc>https://macropraxis.org/careers-database/marketing-lead</loc></url><url><loc>https://macropraxis.org/careers-database/notion-expert</loc></url><url><loc>https://macropraxis.org/careers-database/senior-ui-designer</loc></url><url><loc>https://macropraxis.org/case-studies</loc></url><url><loc>https://macropraxis.org/case-studies-database</loc></url><url><loc>https://macropraxis.org/contact</loc><lastmod>2026-01-27T16:09:05.241Z</lastmod></url><url><loc>https://macropraxis.org/creating-the-perfect-all-in-one-productivity-tool-for-businesses</loc></url><url><loc>https://macropraxis.org/crossing-the-chasm</loc></url><url><loc>https://macropraxis.org/customizing</loc></url><url><loc>https://macropraxis.org/cybersecurity</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/accenture</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/att-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/avant-communications-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/capgemini-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/deloitte</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/dxc-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/ey-ernst-young-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/infosys-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/kpmg-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/mckinsey-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/mr2-solutions-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/pwc-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/sandler-partners-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/softserve-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/tata-communications-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/telarus-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/trace3-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/verizon-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/west-monroe-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/wipro-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity-consulting/wwt-cybersecurity-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/cissp-domains</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/nist-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/adaptive-shield-sspm-saas-security-posture-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/akamai</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/amazon-cloudfront-cdn</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/amazon-detective</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/amazon-guardduty</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/amazon-inspector</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/amazon-macie</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aqua-security-cnapp-vulnerability-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/avepoint-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-artifact</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-audit-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-cloudtrail</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-config</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-elastic-disaster-recovery</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-firewall-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-iam-identity-center-single-sign-on</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-identity-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-iot-device-defender</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-key-management-service</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-lambda-with-security-hub-guardduty</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-network-firewall</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-security-hub</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-shield-ddos</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/aws-waf</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-active-directory-external-identities</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-application-gateway</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-backup</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-bastion</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-ddos-protection</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-firewall</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-firewall-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-key-vault</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-management-groups</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-monitor</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-site-recovery</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-vpn-gateway</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/azure-web-application-firewall</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/bettercloud-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/beyondtrust-privilege-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/broadcom-symantec-endpoint-security-enterprise</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/check-point-infinity-xdrxpr-extended-prevention-response</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/check-point-next-generation-firewalls-ngfw</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cisco-cloudlock</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cisco-duo</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cisco-secure-firewall</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cisco-secure-workload-tetration</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cledara-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cloudflare</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cohesity-backup-recovery</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/commvault-back-up-recovery</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/coro-cloud-network-security-module</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/coro-email-security-modules</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/coro-endpoint-security-modules</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/crowdstrike-xdr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/cyberark-privilege-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/delinea-privilege-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/devo-siem</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/exabeam-siem</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/expel-mdr-soc-operation-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/f5-application-security</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/forcepoint-bitglass-casb</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/fortinet-ngfw</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/global-relay-email-communication-surveillance</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-access-transparency-and-access-approval</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-anthos</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-apigee-api-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-assured-workloads</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-backup-and-dr-service</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-beyondcorp-enterprise</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-binary-authorization</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-chronicle-siem</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-armor</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-cdn</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-cloud-security-foundations</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-firewall</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-identity</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-ids</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-key-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-cloud-vpn</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-confidential-computing</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-mandiant-threat-intelligence</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-mandiant-xdr-platform</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-recaptcha-enterprise</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-security-command-center</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-sensitive-data-protection-dlp</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-vps-service-controls</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/google-web-risk</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/guardicore</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-data-encryption</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-data-protection</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-data-risk-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-discover-classify</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-insights</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-key-lifecycle-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-guardium-vulnerability-assessment</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-mainframe-zsecure-suite</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-qradar-edr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-qradar-log-insights</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-qradar-siem-soar</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-randori-recon</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-security-maas360</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-security-verify-governance</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-security-verify-identity</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-security-verify-privilege-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-security-verify-trust</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-storage-defender</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-storage-protect-cloud</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-trusteer-pinpoint-assure</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-trusteer-pinpoint-detect</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-trusteer-rapport</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-trusteer-rapport-mobile</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ibm-x-force</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/illumio</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/imperva-application-security-ddos-waf</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/lacework-cnapp</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/logrhythm-siem-axon</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/mcafee-enterprise-antivirus</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-defender-for-cloud</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-defender-for-endpoint</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-defender-xdr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-entra-id-formally-active-directory</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-entra-permissions-management-ciem</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-intune-endpoint-privilege-management-pedm</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/microsoft-sentinel</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/mimecast-email-security</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/netscout-arbor-networks-ddos</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/netskope-casb</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/obsidian-sspm-saas-security-posture-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/okta-identity-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/orca-vulnerability-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/palo-alto-cortex-xsoar</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/palo-alto-next-generation-firewalls-ngfw</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/palo-alto-prisma-cloud</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/ping-identity-pingone-for-workforce</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/proofpoint-email-security</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/push-security-casb-ispm-itdr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/qualys-vulnerability-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/recorded-future</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/red-canary-mdr-soc-operation-services</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/securonix-unified-defense-siem</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/sentinelone-xdr-respond-pro</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/skyhigh-security-casb-mcafee</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/smarsh-email-archiving</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/sophos-enterprise-antivirus</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/sophos-xdr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/splunk-siem-soar</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/symantec-endpoint-security-enterprise</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/tenable-insight-vulnerability-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/thales-vormetric-ciphertrust-manager</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/tigera-cnapp-vulnerability-mgmt</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/torii-security-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/trend-micro-edr</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/valence-security-sspm-saas-security-posture-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/veeam-back-up-recovery</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/wing-security-sspm-saas-security-posture-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/wiz-vulnerability-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/zluri-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/zscaler</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/security-solutions/zylo-saas-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/cybersecurity/zero-trust-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/designing-the-smoothest-employee-onboarding-process</loc></url><url><loc>https://macropraxis.org/effectiveness</loc><lastmod>2026-03-17T15:24:02.501Z</lastmod></url><url><loc>https://macropraxis.org/effectiveness/circle-of-control</loc><lastmod>2026-03-17T15:23:38.250Z</lastmod></url><url><loc>https://macropraxis.org/effectiveness/effortless</loc><lastmod>2026-03-17T15:24:02.501Z</lastmod></url><url><loc>https://macropraxis.org/effectiveness/influence</loc><lastmod>2026-03-17T15:23:38.250Z</lastmod></url><url><loc>https://macropraxis.org/effectiveness/urgent-important</loc><lastmod>2026-03-17T15:23:38.250Z</lastmod></url><url><loc>https://macropraxis.org/effortless</loc></url><url><loc>https://macropraxis.org/getting-started</loc></url><url><loc>https://macropraxis.org/good-to-great</loc></url><url><loc>https://macropraxis.org/help-center</loc></url><url><loc>https://macropraxis.org/influence</loc></url><url><loc>https://macropraxis.org/leadership</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/leadership/balanced-scorecard</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/leadership/good-to-great-venn</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/leadership/team-effectiveness</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/lets-get-real-or-lets-not-play</loc></url><url><loc>https://macropraxis.org/library</loc></url><url><loc>https://macropraxis.org/library-f-final</loc></url><url><loc>https://macropraxis.org/library-final</loc></url><url><loc>https://macropraxis.org/library-sources</loc></url><url><loc>https://macropraxis.org/library-test</loc></url><url><loc>https://macropraxis.org/library/cissp-certification-exam-guide</loc></url><url><loc>https://macropraxis.org/library/library-test</loc></url><url><loc>https://macropraxis.org/library/no-rules-rules</loc></url><url><loc>https://macropraxis.org/mindset</loc></url><url><loc>https://macropraxis.org/models</loc><lastmod>2026-03-17T15:24:02.501Z</lastmod></url><url><loc>https://macropraxis.org/models/blue-ocean-four-organizational-hurdles-to-strategy-execution</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/cia-triad-model</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/cisa-identity-credential-and-access-management-icam</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/closed-loop-communication</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/cybersecurity-consulting</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/delegation-model</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/effort-impact-matrix</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/feedback-the-4as</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/hard-work-5-types</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/intelligence-iexq</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/make-the-implicit-explicit-getting-results</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/mitre-attck-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/negotiation-wrecking-ball-vs-martini-glass</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/partner-relationship-management-prm</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/porters-5-forces</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/problem-solving-7-step-process</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/prospect-theory-loss-aversion</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/qualification-model</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/redefining-happiness-matrix</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/sale-enablement</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/sale-enablement-model</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/sales-kpi-matrix</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/skill-will-matrix</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/snap-selling-model</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/star-interviewing</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/team-development-stages</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/the-double-diamond-problem-definition-solving</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/the-five-sales-insights-5is</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/the-message-box</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/the-perfect-hire</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/models/value-chain-analysis-michael-porter</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/opportunity-development</loc><lastmod>2025-12-15T17:36:25.425Z</lastmod></url><url><loc>https://macropraxis.org/opportunity-development/opportunity-checklist</loc></url><url><loc>https://macropraxis.org/people</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/people/coaching-effectiveness</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/people/myers-briggs</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/people/talent-density</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/please-understand-me-ii</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/pricing</loc></url><url><loc>https://macropraxis.org/published-research</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/a-new-era-of-healthcare-testing-prioritizing-apis-for-maximum-impact</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/ai-self-play-enhancing-cybersecurity-using-redblue-team-ai-driven-simulations</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/breaking-barriers-in-healthcare-how-automated-testing-can-revolutionize-interoperability</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/cracking-the-new-logo-code</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/flipping-the-script-deception-technology-and-the-maturation-of-assume-breach</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/homomorphic-encryption-cross-border-financial-crime-intelligence-sharing</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/how-ai-is-transforming-account-management-efficiency</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/ransomware-its-impact-on-the-healthcare-industrys-value-chain</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/routes-to-market-building-your-go-to-market-gtm-strategy-with-partners</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/saas-sprawl-expanded-attack-surface-research</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/sales-enablement-research-best-practices</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/sales-kpi-research-helping-reps-win-more-deals</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/survey-of-automated-testing-in-healthcare-interoperability</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/tbt-breach-analysis-change-healthcare-2024</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/tbt-breach-analysis-first-american-financial-corp-2023-ransomware-cyberattack</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/tbt-breach-analysis-mgm-resorts-2023</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/tbt-breach-analysis-salt-typhoon-telco-attack-2022-2024</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/tbt-breach-analysis-solarwinds-supply-chain-attack-power-generation-utility-2020</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/the-hidden-costs-risks-of-free-deception-tools</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/the-last-praxis-humanitys-final-evolution-in-the-age-of-agi</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/the-me-digital-transformation-imperative-looking-ahead-to-2029</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/the-value-of-microsofts-copilot</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/published-research/top-20-breach-impact-analysis-as-of-2025</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/quotes</loc><lastmod>2026-03-17T15:23:49.757Z</lastmod></url><url><loc>https://macropraxis.org/sales</loc><lastmod>2025-12-15T17:36:25.425Z</lastmod></url><url><loc>https://macropraxis.org/sales/challenger-sale</loc><lastmod>2025-12-15T17:36:30.398Z</lastmod></url><url><loc>https://macropraxis.org/sales/how-of-sales</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sales/what-of-sales</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sign-up-for-newsletter</loc></url><url><loc>https://macropraxis.org/sources</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/blue-ocean-strategy-w-chan-kim-renee-mauborgne</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/building-a-second-brain-tiago-forte</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/building-successful-partner-channels-hans-peter-bech</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/cisa-identity-credential-and-access-management-icam-reference-architecture</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/cissp-certification-exam-guide-shon-harris</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/competitive-strategy-michael-e-porter</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/crossing-the-chasm-geoffrey-moore</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/cult-of-the-dead-cow-joseph-menn</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/cyber-war-richard-a-clarke</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/effortless-greg-mckewon</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/essentials-of-negotiation-roy-j-lewicki-bruce-barry</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/getting-past-no-william-ury</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/good-to-great-jim-collins</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/influence-robert-cialdini</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/iso-27001-information-security-cybersecurity-and-privacy-protection</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/lets-get-real-or-lets-not-play-mahan-khalsa-randy-illig</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/made-to-stick-why-some-ideas-survive-and-others-die-chip-heath-dan-heath</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/meddicc-andy-wyhte</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/mindset-carol-dweck</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/nist-800-53-security-privacy-controls-for-information-systems-and-organizations</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/nist-sp-1800-35-implementing-a-zero-trust-architecture-privileged-access-management</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/nist-sp-800-171-protecting-controlled-unclassified-information</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/no-rules-rules-reed-hastings</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/playing-to-the-edge-michael-v-hayden</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/practical-cryptography-niels-ferguson-bruce-schneier</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/sales-enablement-30-the-blueprint-to-sales-enablement-excellence-roderick-jefferson</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/sales-enablement-a-master-framework-to-engage-equip-and-empower-a-world-class-sales-force-byron-matthews-tamara-schenk</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/sandworm-andy-greenberg</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/scaling-people-claire-hughes-johnson</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/secrets-lies-bruce-schneier</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/security-engineering-a-guide-to-building-dependable-distributed-systems-ross-anderson</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/snap-selling-jill-konrath</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/start-with-why-simon-sinek</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-art-of-deception-kevin-mitnick</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-assault-on-intelligence-michael-v-hayden</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-balanced-scorecard-robert-kaplan-david-norton</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-challenger-sale-matthew-dixon-brent-adamson</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-checklist-manifesto-atul-gawande</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-design-of-everyday-things-don-norman</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-five-dysfunctions-of-a-team-patrick-lencioni</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-hard-thing-about-hard-things-ben-horowitz</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-innovators-dilemma-clayton-christensen</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-seven-habits-of-highly-effective-people-stephen-covey</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/the-subtle-art-of-not-giving-a-fck-marc-manson</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/thinking-fast-and-slow-daniel-kahneman</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/work-rules-laszlo-bock</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/sources/zero-to-one-peter-thiel</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/start-with-why</loc></url><url><loc>https://macropraxis.org/starting-with-the-end-in-mind</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/strategy</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/strategy/crossing-the-chasm</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/strategy/golden-circle</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/strategy/price-vs-value</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/super-notion-the-future-of-website-publishing</loc></url><url><loc>https://macropraxis.org/team-building</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/team-building/hiring-checklist</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/team-database</loc></url><url><loc>https://macropraxis.org/team-database/anna</loc></url><url><loc>https://macropraxis.org/team-database/hamish</loc></url><url><loc>https://macropraxis.org/team-database/helena</loc></url><url><loc>https://macropraxis.org/team-database/jack</loc></url><url><loc>https://macropraxis.org/team-database/jane</loc></url><url><loc>https://macropraxis.org/team-database/mikey</loc></url><url><loc>https://macropraxis.org/team-database/moosh</loc></url><url><loc>https://macropraxis.org/team-database/phil</loc></url><url><loc>https://macropraxis.org/team-database/zaf</loc></url><url><loc>https://macropraxis.org/territory-planning</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/the-balanced-scorecard</loc></url><url><loc>https://macropraxis.org/the-challenger-sale</loc></url><url><loc>https://macropraxis.org/the-checklist-manifesto</loc></url><url><loc>https://macropraxis.org/the-five-dysfunctions-of-a-team</loc></url><url><loc>https://macropraxis.org/the-innovators-dilemma</loc></url><url><loc>https://macropraxis.org/the-seven-habits-of-highly-effective-people</loc></url><url><loc>https://macropraxis.org/the-team</loc></url><url><loc>https://macropraxis.org/tools-reports-checklists</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/account-plan-opportunity-checklist</loc><lastmod>2025-12-15T17:34:11.840Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/account-plan-opportunity-checklist/lets-get-real-or-lets-not-play-mahan-khalsa-randy-illig-1</loc></url><url><loc>https://macropraxis.org/tools-reports-checklists/account-plan-opportunity-checklist/the-challenger-sale-matthew-dixon-brent-adamson-1</loc></url><url><loc>https://macropraxis.org/tools-reports-checklists/account-plan-opportunity-checklist/the-checklist-manifesto-atul-gawande-1</loc></url><url><loc>https://macropraxis.org/tools-reports-checklists/current-states</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/fortune-500-analysis-tool</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/hiring-process-checklist</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/hiring-rubric</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/iam-pam-nist-zero-trust-mapping-tool</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/iam-pam-nist-zero-trust-mapping-tool/icam-zero-trust-example</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/negotiation</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/new-hire-onboarding</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/partner-relationship-checklist</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/personality-test</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/pre-post-meeting-nudge-report</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/prospect-industry-analysis-tool</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/saas-attack-matrix-tool</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/saas-attack-matrix-tool/icam-zero-trust-example</loc></url><url><loc>https://macropraxis.org/tools-reports-checklists/sale-enablement-checklist</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/strategic-self-questioning-checklist</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/territory-plan-5x</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/the-message-box-tool</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/tools-reports-checklists/weekly-calendar-integrated-coaching</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training</loc><lastmod>2025-12-15T17:36:25.425Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/case-study-myers-briggs</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-leadership-fundamentals</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-meddicc</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-myers-briggs-personality-indicator</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-nist-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-porters-five-forces</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-sales-enablement</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-the-axe-solution-selling</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-value-chain-analysis</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/training-syllabus/training-syllabus-zero-trust-framework</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url><url><loc>https://macropraxis.org/zero-trust-security</loc><lastmod>2025-12-01T02:33:08.197Z</lastmod></url></urlset>