<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/what-are-you-feeding-your-pam-tiger</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-Pit-Stop-PAM.jpg</image:loc><image:caption>WhitepaperPitStopPAM</image:caption><image:title>WhitepaperPitStopPAM</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/how-to-spot-and-mitigate-more-insider-threats-with-iga</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Omada-Blog.jpg</image:loc><image:caption>OmadaBlog</image:caption><image:title>OmadaBlog</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/tldr-forgerock-2021-consumer-identity-breach-report</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Webinar-Recording-Speeding-Up-Zero-Trust-Delivery.jpg</image:loc><image:caption>WebinarRecordingSpeedingUpZeroTrustDelivery</image:caption><image:title>WebinarRecordingSpeedingUpZeroTrustDelivery</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/introduction-to-identity-governance-and-administration-iga</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Webinar-IAM-Modernization-Ping.jpg</image:loc><image:caption>WebinarIAMModernizationPing</image:caption><image:title>WebinarIAMModernizationPing</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/more-security-through-fewer-passwords</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Standard-webinar-recording.jpg</image:loc><image:caption>Standardwebinarrecording</image:caption><image:title>Standardwebinarrecording</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/ic-consult-secure-deployment-process</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/10_patching_process.svg</image:loc><image:caption>10patchingprocess</image:caption><image:title>10patchingprocess</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/grafik_defects.svg</image:loc><image:caption>grafikdefects</image:caption><image:title>grafikdefects</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/04_integration_testing.svg</image:loc><image:caption>04integrationtesting</image:caption><image:title>04integrationtesting</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/03_new_solutions-1.svg</image:loc><image:caption>03newsolutions1</image:caption><image:title>03newsolutions1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/06_image_scanning.svg</image:loc><image:caption>06imagescanning</image:caption><image:title>06imagescanning</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/11_cve_whitelisting.svg</image:loc><image:caption>11cvewhitelisting</image:caption><image:title>11cvewhitelisting</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/07_dynamic_application.svg</image:loc><image:caption>07dynamicapplication</image:caption><image:title>07dynamicapplication</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/09_runtime_container.svg</image:loc><image:caption>09runtimecontainer</image:caption><image:title>09runtimecontainer</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/03_unit_testing.svg</image:loc><image:caption>03unittesting</image:caption><image:title>03unittesting</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/05_schema_validation.svg</image:loc><image:caption>05schemavalidation</image:caption><image:title>05schemavalidation</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/01_static_application.svg</image:loc><image:caption>01staticapplication</image:caption><image:title>01staticapplication</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/02_software_composition.svg</image:loc><image:caption>02softwarecomposition</image:caption><image:title>02softwarecomposition</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/08_application_configuration.svg</image:loc><image:caption>08applicationconfiguration</image:caption><image:title>08applicationconfiguration</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/ciam-trends-oauth-2-0-and-openid-connect</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/CIAM-Hypes-Article-2.jpg</image:loc><image:caption>CIAMHypesArticle2</image:caption><image:title>CIAMHypesArticle2</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/connecting-worlds-iot-and-iam-integration-through-ping-davinci</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Blog-Passkeys-1.jpg</image:loc><image:caption>BlogPasskeys1</image:caption><image:title>BlogPasskeys1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/webinar-recording-b2b-identity-icc-sailpoint-seczetta</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zeichnung-3.svg</image:loc><image:caption>Zeichnung3</image:caption><image:title>Zeichnung3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/2211_Webinar_Recording_B2B_Identity.jpg</image:loc><image:caption>2211WebinarRecordingB2BIdentity</image:caption><image:title>2211WebinarRecordingB2BIdentity</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/why-businesses-need-identity-threat-detection-and-response-itdr</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Implement-ITDR-Blog-Resource-Image.jpg</image:loc><image:caption>ImplementITDRBlogResourceImage</image:caption><image:title>ImplementITDRBlogResourceImage</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/user-access-reviews-the-unsung-hero-of-identity-and-access-management</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/2-1.jpg</image:loc><image:caption>21</image:caption><image:title>21</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/2-1.jpg</image:loc><image:caption>21</image:caption><image:title>21</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Webinar-IAM-Modernization-Ping.jpg</image:loc><image:caption>WebinarIAMModernizationPing</image:caption><image:title>WebinarIAMModernizationPing</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-The-IAM-Cloud-Journey.jpg</image:loc><image:caption>WhitepaperTheIAMCloudJourney</image:caption><image:title>WhitepaperTheIAMCloudJourney</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Omada-Blog.jpg</image:loc><image:caption>OmadaBlog</image:caption><image:title>OmadaBlog</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Omada-Blog-2_ER-Resource-Card1.jpg</image:loc><image:caption>OmadaBlog2ERResourceCard1</image:caption><image:title>OmadaBlog2ERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/SAP-IDM-Blog-Resource-Card.jpg</image:loc><image:caption>SAPIDMBlogResourceCard</image:caption><image:title>SAPIDMBlogResourceCard</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ITDR-Blog-Resource-Image.jpg</image:loc><image:caption>ITDRBlogResourceImage</image:caption><image:title>ITDRBlogResourceImage</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Implement-ITDR-Blog-Resource-Image.jpg</image:loc><image:caption>ImplementITDRBlogResourceImage</image:caption><image:title>ImplementITDRBlogResourceImage</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zeichnung-3.svg</image:loc><image:caption>Zeichnung3</image:caption><image:title>Zeichnung3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/TSA_Webinar_-ER-Resource-Card-1.jpg</image:loc><image:caption>TSAWebinarERResourceCard1</image:caption><image:title>TSAWebinarERResourceCard1</image:title></image:image><lastmod>2024-10-08</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/webinar-how-to-avoid-common-iga-pitfalls-and-deploy-successfully</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ER-Resource-Cards-Images-1.jpg</image:loc><image:caption>ERResourceCardsImages1</image:caption><image:title>ERResourceCardsImages1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zeichnung-3.svg</image:loc><image:caption>Zeichnung3</image:caption><image:title>Zeichnung3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Untitled-3-1-1.jpg</image:loc><image:caption>Untitled311</image:caption><image:title>Untitled311</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Article-NIS2-ForgeRock-1-1.jpg</image:loc><image:caption>ArticleNIS2ForgeRock11</image:caption><image:title>ArticleNIS2ForgeRock11</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Omada-Webinar-Website-Header-IGA-Pitfalls.jpg</image:loc><image:caption>OmadaWebinarWebsiteHeaderIGAPitfalls</image:caption><image:title>OmadaWebinarWebsiteHeaderIGAPitfalls</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/hanson-lu-HIathOCFdFg-unsplash_fingerprintmaske-1.jpg</image:loc><image:caption>hansonluHIathOCFdFgunsplashfingerprintmaske1</image:caption><image:title>hansonluHIathOCFdFgunsplashfingerprintmaske1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/privileged-access-management-hacking-endangered-industries</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ER-Resource-Cards-Images9-2.jpg</image:loc><image:caption>ERResourceCardsImages92</image:caption><image:title>ERResourceCardsImages92</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/ciam-trends-mfa-passwordless-decentralized-identity</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Blog-Passkeys-1.jpg</image:loc><image:caption>BlogPasskeys1</image:caption><image:title>BlogPasskeys1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/sap-idm-end-of-life-why-transitioning-to-a-modern-iga-solution-is-essential</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/SAP-IDM-Blog-Resource-Card.jpg</image:loc><image:caption>SAPIDMBlogResourceCard</image:caption><image:title>SAPIDMBlogResourceCard</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/iam-under-attack-what-drives-iam-professionals-in-2024</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Identity-First-Zero-Trust-Arch-Picture.jpg</image:loc><image:caption>IdentityFirstZeroTrustArchPicture</image:caption><image:title>IdentityFirstZeroTrustArchPicture</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zero-Trust-Architecture-Overview.png</image:loc><image:caption>ZeroTrustArchitectureOverview</image:caption><image:title>ZeroTrustArchitectureOverview</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Saviynts-2024-Identity-Security-Trends_ER-Resource-Card-1.jpg</image:loc><image:caption>Saviynts2024IdentitySecurityTrendsERResourceCard1</image:caption><image:title>Saviynts2024IdentitySecurityTrendsERResourceCard1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/navigating-nis2-understanding-and-preparing-iam-systems-for-compliance</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ER-Resource-Cards-Images9-2.jpg</image:loc><image:caption>ERResourceCardsImages92</image:caption><image:title>ERResourceCardsImages92</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/can-you-run-user-access-reviews-without-a-dedicated-tool</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/3-2.jpg</image:loc><image:caption>32</image:caption><image:title>32</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zeichnung-3.svg</image:loc><image:caption>Zeichnung3</image:caption><image:title>Zeichnung3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/saviynts-2024-identity-security-trends-a-concise-overview-by-ic-consult</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/IAM-under-attack_Article_ER-Resource-Card-1.jpg</image:loc><image:caption>IAMunderattackArticleERResourceCard1</image:caption><image:title>IAMunderattackArticleERResourceCard1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/8b1172e3-ed8a-4ab3-b2f1-eba2466a3b03</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2025-06-05</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/okta-connectors-in-action-ic-consults-oracle-ebs-connector</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Okta_Blog.jpg</image:loc><image:caption>OktaBlog</image:caption><image:title>OktaBlog</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-The-IAM-Cloud-Journey.jpg</image:loc><image:caption>WhitepaperTheIAMCloudJourney</image:caption><image:title>WhitepaperTheIAMCloudJourney</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/architectural-measures-for-zero-trust-in-iga-building-a-secure-framework</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zero-Trust-AI-Webinar-Recording_ER-Resource-Card4.jpg</image:loc><image:caption>ZeroTrustAIWebinarRecordingERResourceCard4</image:caption><image:title>ZeroTrustAIWebinarRecordingERResourceCard4</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/how-you-benefit-from-outsourcing-iam</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/210810_icc_cloud_journey_4_artikel_1920x500_jpg-1.webp</image:loc><image:caption>210810icccloudjourney4artikel1920x500jpg1</image:caption><image:title>210810icccloudjourney4artikel1920x500jpg1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/how-to-find-the-ideal-idaas-solution-okta-ic-consult</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-the-future-of-IAM-lies-in-the-cloud.jpg</image:loc><image:caption>WhitepaperthefutureofIAMliesinthecloud</image:caption><image:title>WhitepaperthefutureofIAMliesinthecloud</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/idaas-the-fastest-way-to-cloud-iam</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/MicrosoftTeams-image-2-1.jpg</image:loc><image:caption>MicrosoftTeamsimage21</image:caption><image:title>MicrosoftTeamsimage21</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/cloud-based-identity-is-the-future</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/MicrosoftTeams-image-2-1.jpg</image:loc><image:caption>MicrosoftTeamsimage21</image:caption><image:title>MicrosoftTeamsimage21</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/the-benefits-of-passkeys-in-ciam-a-password-less-future</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/CIAM-Hypes-Article-3.jpg</image:loc><image:caption>CIAMHypesArticle3</image:caption><image:title>CIAMHypesArticle3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/make-or-buy-diy-iam-reasonable-approach</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/07_scale-1.svg</image:loc><image:caption>07scale1</image:caption><image:title>07scale1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/03_security-1.svg</image:loc><image:caption>03security1</image:caption><image:title>03security1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/06_integration-1.svg</image:loc><image:caption>06integration1</image:caption><image:title>06integration1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/05_customers-1.svg</image:loc><image:caption>05customers1</image:caption><image:title>05customers1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/01_development-1.svg</image:loc><image:caption>01development1</image:caption><image:title>01development1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Saviynts-2024-Identity-Security-Trends_ER-Resource-Card-1.jpg</image:loc><image:caption>Saviynts2024IdentitySecurityTrendsERResourceCard1</image:caption><image:title>Saviynts2024IdentitySecurityTrendsERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/02_timing-1.svg</image:loc><image:caption>02timing1</image:caption><image:title>02timing1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/04_authentication-1.svg</image:loc><image:caption>04authentication1</image:caption><image:title>04authentication1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/the-state-of-the-identity-attack-surface-a-tldr-overview-with-silverfort</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/3.jpg</image:loc><image:caption>3</image:caption><image:title>3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/cloud-iam-for-advanced-requirements</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-Expert-Level-Security-Okta-IDaaS.jpg</image:loc><image:caption>WhitepaperExpertLevelSecurityOktaIDaaS</image:caption><image:title>WhitepaperExpertLevelSecurityOktaIDaaS</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/are-you-ready-to-tackle-nis2-compliance</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ER-Resource-Cards-Images9-2.jpg</image:loc><image:caption>ERResourceCardsImages92</image:caption><image:title>ERResourceCardsImages92</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/understanding-zero-trust-in-identity-governance-and-administration-iga-key-principles</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/TSA_Webinar_-ER-Resource-Card-1.jpg</image:loc><image:caption>TSAWebinarERResourceCard1</image:caption><image:title>TSAWebinarERResourceCard1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/article-modernization-iam-for-partners-b2b</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/04_digital_processes.svg</image:loc><image:caption>04digitalprocesses</image:caption><image:title>04digitalprocesses</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/02_new_possibilities.svg</image:loc><image:caption>02newpossibilities</image:caption><image:title>02newpossibilities</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/05_where_is_future.svg</image:loc><image:caption>05whereisfuture</image:caption><image:title>05whereisfuture</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/01_save_and_win.svg</image:loc><image:caption>01saveandwin</image:caption><image:title>01saveandwin</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/220608_icc_automobile_grafik.svg</image:loc><image:caption>220608iccautomobilegrafik</image:caption><image:title>220608iccautomobilegrafik</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/03_new_solutions-1.svg</image:loc><image:caption>03newsolutions1</image:caption><image:title>03newsolutions1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-CIAM-Trends-Hypes-1-1-1.jpg</image:loc><image:caption>WhitepaperCIAMTrendsHypes111</image:caption><image:title>WhitepaperCIAMTrendsHypes111</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/privileged-access-management-in-greenfield-scenarios</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/senhasegura-_Article_ER-Resource-Card-2.jpg</image:loc><image:caption>senhaseguraArticleERResourceCard2</image:caption><image:title>senhaseguraArticleERResourceCard2</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/tldr-forrester-study-beyond-boundaries</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/IAM-under-attack_Article_ER-Resource-Card-1.jpg</image:loc><image:caption>IAMunderattackArticleERResourceCard1</image:caption><image:title>IAMunderattackArticleERResourceCard1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/ciam-trends-document-centric-identity-proofing-and-byoi</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Whitepaper-CIAM-Trends-Hypes-1-1-1.jpg</image:loc><image:caption>WhitepaperCIAMTrendsHypes111</image:caption><image:title>WhitepaperCIAMTrendsHypes111</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/how-modern-iga-improves-security-in-your-organization</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Omada-Blog-2_ER-Resource-Card1.jpg</image:loc><image:caption>OmadaBlog2ERResourceCard1</image:caption><image:title>OmadaBlog2ERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/navigating-nis2-compliance-for-iam-systems-2</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/hanson-lu-HIathOCFdFg-unsplash_fingerprintmaske-1.jpg</image:loc><image:caption>hansonluHIathOCFdFgunsplashfingerprintmaske1</image:caption><image:title>hansonluHIathOCFdFgunsplashfingerprintmaske1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Untitled-3-1-1.jpg</image:loc><image:caption>Untitled311</image:caption><image:title>Untitled311</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/NIS2-Webinar-Recording-Website-Header1.jpg</image:loc><image:caption>NIS2WebinarRecordingWebsiteHeader1</image:caption><image:title>NIS2WebinarRecordingWebsiteHeader1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Zeichnung-3.svg</image:loc><image:caption>Zeichnung3</image:caption><image:title>Zeichnung3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Article-NIS2-ForgeRock-1-1.jpg</image:loc><image:caption>ArticleNIS2ForgeRock11</image:caption><image:title>ArticleNIS2ForgeRock11</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ER-Resource-Cards-Images-1.jpg</image:loc><image:caption>ERResourceCardsImages1</image:caption><image:title>ERResourceCardsImages1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/know-your-software-interview-log4j-vulnerability</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/24_Kai_Mindermann_1952_quadrat.jpg</image:loc><image:caption>24KaiMindermann1952quadrat</image:caption><image:title>24KaiMindermann1952quadrat</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/NIS2-Compliance_Webinar_-ER-Resource-Card1.jpg</image:loc><image:caption>NIS2ComplianceWebinarERResourceCard1</image:caption><image:title>NIS2ComplianceWebinarERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Heiko-Klark-schwarz-weiss.jpg</image:loc><image:caption>HeikoKlarkschwarzweiss</image:caption><image:title>HeikoKlarkschwarzweiss</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/understanding-tsa-compliance-and-the-crucial-role-of-pam-strategies-key-questions-explored</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/TSA_Webinar_-ER-Resource-Card-1.jpg</image:loc><image:caption>TSAWebinarERResourceCard1</image:caption><image:title>TSAWebinarERResourceCard1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/implement-itdr-identity-threat-detection-and-response-a-step-by-step-guide</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/ITDR-Blog-Resource-Image.jpg</image:loc><image:caption>ITDRBlogResourceImage</image:caption><image:title>ITDRBlogResourceImage</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/combat-unauthorized-access-with-ai-driven-identity</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Securing-Against-Social-Engineering-and-Phishing-Attacks_ER-Resource-Card1.jpg</image:loc><image:caption>SecuringAgainstSocialEngineeringandPhishingAttacksERResourceCard1</image:caption><image:title>SecuringAgainstSocialEngineeringandPhishingAttacksERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/privileged-access-management-in-brownfield-environments</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/senhasegura-_Article_ER-Resource-Card-2.jpg</image:loc><image:caption>senhaseguraArticleERResourceCard2</image:caption><image:title>senhaseguraArticleERResourceCard2</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/are-you-ready-for-iam-in-the-cloud</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/MicrosoftTeams-image-1.jpg</image:loc><image:caption>MicrosoftTeamsimage1</image:caption><image:title>MicrosoftTeamsimage1</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/pam-key-technology-for-critical-environments</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/SDO-Blog_ER-Resource-Card-1.jpg</image:loc><image:caption>SDOBlogERResourceCard1</image:caption><image:title>SDOBlogERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/what-is-privileged-session-management</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Webinar-Recording-cidaas-Identity-Fabrics.jpg</image:loc><image:caption>WebinarRecordingcidaasIdentityFabrics</image:caption><image:title>WebinarRecordingcidaasIdentityFabrics</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/securing-against-social-engineering-and-phishing-attacks</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/Beyond-the-Silos_Webinar_ER-Resource-Card.jpg</image:loc><image:caption>BeyondtheSilosWebinarERResourceCard</image:caption><image:title>BeyondtheSilosWebinarERResourceCard</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/the-mfa-protection-gaps-no-one-talks-about</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/SDO-Blog_ER-Resource-Card-1.jpg</image:loc><image:caption>SDOBlogERResourceCard1</image:caption><image:title>SDOBlogERResourceCard1</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><lastmod>2024-10-09</lastmod></url><url><loc>https://blog.iam-excellence.com/ic-consult-blog/en/resource/delinea-platform-vs-secret-server-new-features</loc><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/ic_consult_logo_rgb-3.png</image:loc><image:caption>icconsultlogorgb3</image:caption><image:title>icconsultlogorgb3</image:title></image:image><image:image><image:loc>https://5161834.fs1.hubspotusercontent-eu1.net/hubfs/5161834/Imported_Blog_Media/senhasegura-_Article_ER-Resource-Card-2.jpg</image:loc><image:caption>senhaseguraArticleERResourceCard2</image:caption><image:title>senhaseguraArticleERResourceCard2</image:title></image:image><lastmod>2024-10-09</lastmod></url></urlset>