<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 6:35 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://theriskfoundry.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Risk Foundry</title>
		<link><![CDATA[https://theriskfoundry.com]]></link>
		<description><![CDATA[The Risk Foundry]]></description>
		<lastBuildDate><![CDATA[Wed, 12 Jun 2024 03:18:24 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://theriskfoundry.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://theriskfoundry.com/about-the-risk-foundry/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/about-the-risk-foundry/]]></link>
			<title>About the Risk Foundry</title>
			<pubDate><![CDATA[Wed, 12 Jun 2024 03:18:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/]]></link>
			<title>The Risk Foundry: Home of the One Hour Risk Assessment</title>
			<pubDate><![CDATA[Tue, 30 Jul 2024 16:11:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/blog/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 24 Sep 2024 01:46:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-continuous-threat-exposure-management-ctem-2/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-continuous-threat-exposure-management-ctem-2/]]></link>
			<title>Continuous Cybersecurity Risk Assessment (CCRA) vs Continuous Threat Exposure Management (CTEM)</title>
			<pubDate><![CDATA[Sat, 29 Jun 2024 15:43:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-attack-surface-management-asm/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-attack-surface-management-asm/]]></link>
			<title>Continuous Cybersecurity Risk Assessment (CCRA) vs Attack Surface Management (ASM)</title>
			<pubDate><![CDATA[Sat, 29 Jun 2024 15:43:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-automated-pen-testing/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/continuous-cybersecurity-risk-assessment-ccra-vs-automated-pen-testing/]]></link>
			<title>Continuous Cybersecurity Risk Assessment (CCRA) vs Automated Pen Testing</title>
			<pubDate><![CDATA[Sat, 29 Jun 2024 15:41:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/why-cybersecurity-risk-assessments-are-essential-for-smbs-and-how-our-risk-framework-helps/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/why-cybersecurity-risk-assessments-are-essential-for-smbs-and-how-our-risk-framework-helps/]]></link>
			<title>Why Cybersecurity Risk Assessments are Essential for SMBs and How Our Risk Framework Helps</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/which-businesses-are-required-to-conduct-cybersecurity-risk-assessments-and-why/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/which-businesses-are-required-to-conduct-cybersecurity-risk-assessments-and-why/]]></link>
			<title>Which Businesses Are Required to Conduct Cybersecurity Risk Assessments (and Why)?</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:27:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/how-a-cybersecurity-risk-assessment-immediately-helps-smbs-protect-themselves/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/how-a-cybersecurity-risk-assessment-immediately-helps-smbs-protect-themselves/]]></link>
			<title>How a Cybersecurity Risk Assessment Immediately Helps SMBs Protect Themselves</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:24:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/pci-dss-4-0-who-needs-to-conduct-a-cybersecurity-risk-assessment-and-why-its-critical/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/pci-dss-4-0-who-needs-to-conduct-a-cybersecurity-risk-assessment-and-why-its-critical/]]></link>
			<title>PCI DSS 4.0: Who Needs to Conduct a Cybersecurity Risk Assessment and Why It’s Critical</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:22:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/who-is-required-to-perform-a-nist-800-53-cybersecurity-risk-assessment-and-why-it-matters/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/who-is-required-to-perform-a-nist-800-53-cybersecurity-risk-assessment-and-why-it-matters/]]></link>
			<title>Who is Required to Perform a NIST 800-53 Cybersecurity Risk Assessment and Why It Matters</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:15:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/understanding-the-secs-cybersecurity-risk-assessment-requirement-who-must-comply-and-what-it-entails/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/understanding-the-secs-cybersecurity-risk-assessment-requirement-who-must-comply-and-what-it-entails/]]></link>
			<title>Understanding the SEC’s Cybersecurity Risk Assessment Requirement: Who Must Comply and What It Entails</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:10:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/cybersecurity-risk-assessments-essential-for-compliance-but-not-a-compliance-guarantee/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/cybersecurity-risk-assessments-essential-for-compliance-but-not-a-compliance-guarantee/]]></link>
			<title>Cybersecurity Risk Assessments: Essential for Compliance, But Not a Compliance Guarantee</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:01:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/why-us/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/why-us/]]></link>
			<title>Why Us | We provide one-hour cybersecurity risk assessments for your customers.</title>
			<pubDate><![CDATA[Mon, 12 Aug 2024 16:48:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/our-team/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/our-team/]]></link>
			<title>Our Team</title>
			<pubDate><![CDATA[Fri, 21 Jun 2024 02:35:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/contact-us/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Sat, 27 Apr 2024 05:07:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://theriskfoundry.com/cybersecurity-risk-assessments-the-path-to-compliance-but-not-compliance-itself/]]></guid>
			<link><![CDATA[https://theriskfoundry.com/cybersecurity-risk-assessments-the-path-to-compliance-but-not-compliance-itself/]]></link>
			<title>Cybersecurity Risk Assessments: The Path to Compliance (But Not Compliance Itself)</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 16:02:59 +0000]]></pubDate>
		</item>
				</channel>
</rss>
