<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/industrial-espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-auditing</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-embezzlement</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-fraud</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-fraud-awareness-training</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-identity-crime</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-it-sabotage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-risk</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-risk-management</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-sabotage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-terrorism</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-theft</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-threat-analyst</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-threat-awareness-training</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-threat-incident-response</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-threat-program</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-threats</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/insider-violence</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/integrity</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/key-risk-indicators</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/likelihood-%26-consequence</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/logic-bombs</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/malicious-insider</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/maximum-acceptable-outage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/mice</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/narcissist</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/negative-workplace-issues</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/operations-resilience</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/organisation-assets</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/physical-exfiltration</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/political-espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/pre-employment-check</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/privilege-user</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/recovery-point-objective</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/recovery-time-objective</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/red-flags</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/resilience</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/risk</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/risk-appetite-and-risk-tolerance</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/risk-governance</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/risk-management</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/risk-policy</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/security-awareness-training</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/security-event-information-management</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/strategic-risk</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/strategic-risk-policy</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/stressful-event</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/technical-controls</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/theft-of-intellectual-property</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/toxic-workplace</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/trusted-business-partner</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/trusted-insider</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/unintentional-insider</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/unknown-access-path</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/user-activity-monitoring</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/violent-behaviour</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/vulnerability</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/whistleblowing</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/zero-trust</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/identity-and-access-management</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/business-continuity-management</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/business-continuity-planning</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/collusion-with-outsiders</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/confidentiality</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/criminal-espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/critical-infrastructure</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/dark-web</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/data-exfiltration</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/data-leak</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/data-loss</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/data-loss-prevention</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/deception</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/disaster-recovery</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/disengaged-employee</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/disgruntled-employee</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/economic-espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/employee-support-assistance</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/former-employee</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/fraud-triangle</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/government-espionage</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/acceptable-user-policies</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/access-path</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/accumulation-of-privileges</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/availability</loc>
<lastmod>2026-04-29</lastmod>
</url>
<url>
<loc>https://shop.insiderthreats.com.au/glossary-terms/behavioural-patterns</loc>
<lastmod>2026-04-29</lastmod>
</url>
</urlset>