<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.iotsi.org/index</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2018-07-21</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/566b1ae8a12f444cd6c935e2/1524340876231/M2M-IoT-Device-Industry-Examples</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/566b174ca128e652f02b2235/1449858902010/M2M-IoT-Technology-Surface-Logical-Breakout</image:loc>
      <image:title>Framework</image:title>
      <image:caption>M2M and IoT Technology Surface Logical Breakout</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/552702d5e4b0e6a7fd120aec/1524342192941/M2M-IoT-Primary-End-to-End-System-Components_v2.png</image:loc>
      <image:title>Framework</image:title>
      <image:caption>M2M and IoT Primary End-to-End System Components</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/552701a3e4b0dd89342e4383/1524341843132/Example-M2M-IoT-Connection-Scenarios_v4.png</image:loc>
      <image:title>Framework</image:title>
      <image:caption>Example M2M and IoT Connection Scenarios</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/552702b7e4b062f717b8128a/1524341858713/Primary-M2M-IoT-Communications-Applications_v3.png</image:loc>
      <image:title>Framework</image:title>
      <image:caption>Primary M2M and IoT Communications Applications</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5aa5b1619140b73db6a5cd0d/1524340797907/IOTSI_IoT_System_System_Classifications_v3.0</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5b3e8e07562fa714b6e34917/1530826266338/The+foundation+for+device_v1-2.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5712bde560b5e92c3a242667/1460846066677/m2isf_Considering_Security_Testing.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/570448612b8ddeb199eb29e7/1459898703599/m2isf_A_Spectrum_of_Control_Types-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56ca406786db432638d5b34a/1457213259179/m2isf-ARBIL-security-process-model-L.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5b3e815403ce6438fa59e3b5/1530823050300/System-Security-Contextv1.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56ca3bbf45bf2194d54bd245/1456094568505/</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5adb97baf950b7b16a81a7c5/1524340956110/IoTSI_the_hacking_model-update1-trans.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad3b78c70a6ad118a90288d/1523824577692/DSRS+Images_step+1-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad4044a70a6ad118a9c2d40/1526438792516/IoTSI-DSRS-2018-V1.0-thumbnail-L.jpg</image:loc>
      <image:title>Framework</image:title>
      <image:caption>DSRS WHITEPAPER</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad3b806352f53c87a387e6a/1523824666944/DSRS+Images_step+2-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad3b8af352f53c87a389abb/1523824834645/DSRS+Images_step+3-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad3b90d03ce641bc8a8f26e/1523824924689/DSRS+Images_step+4-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56225a2ee4b0a755f5e115a7/1445092163246/m2isfThreeCirclesTag3.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5874595ff5e231cac8134118/1484020240488/Blurred-35-1500px.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/58745a37f7e0abdd018a37cc/1484020506696/DSLA-AdLink.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5622ac74e4b02f1548adbe9b/1445113142656/Supporting-clip.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5869635415d5db92fb85d8ba/1483307021950/Cybersecurity+Principles+of+IoT</image:loc>
      <image:title>Framework</image:title>
      <image:caption>M2M and IoT technology relationship diagram</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/58745a1ab3db2b6aef0b54b1/1484020254688/Blurred-34-1500px.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5b3eb1720e2e72f3fb19397f/1530835317316/IoT-Connected-System-BlueWhiteL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5b5395f12b6a280bdec067bb/1532204547227/IoT+Cyber+Threats_v1.1L.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/555fab13e4b003a99f54edd7/1523819539517/Product_Security_ResponsibilityL_optim.png</image:loc>
      <image:title>Framework</image:title>
      <image:caption>Product Security Responsibility in IoT and M2M</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56cf07007c65e440ca6e2d73/1456408422098/</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56db549a59827e888a92f8a9/1457214668683/M2ISF-Considering-System-Risk-L.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/555fa98ee4b07a2428eafaa0/1523819523014/Balancing-Threat-Risk-Security-IoT-M2M_L_optim.png</image:loc>
      <image:title>Framework</image:title>
      <image:caption>Balancing Threat, Risk and Security in IoT and M2M</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/53249edce4b04ecedf6c9f80/1394908927892/Blue_Circuit_LockL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/53249de9e4b028bc910bfa20/1530824815873/Digital_ViralL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad3b66eaa4a9904670b60e5/1523824297471/orange-blue-digital-abstract-L.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ad9642670a6adf9d3e3ff31/1524196519967/Pillars-of-IoT-Cybersecurity-Hero-L.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/55bb7533e4b0d7157acfbd86/1438348597848/5_OrangeBlueFilmStripL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/55bb74b0e4b08db54f5a34c9/1438348466529/2_MedicalDigitalAbstractL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/55a121cae4b0ffb20ceb3480/1436623308362/Orange_Hive_resized.png</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/55bb74dbe4b0d0cc37a810a7/1438348510309/3_BlueHoneyCombDigitalL.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56213bbfe4b0c8b4f050f3d8/1432328245617/Ghost_Tech_L_optim.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/591afcbb03596e39bab0844a/1432328245617/Ghost_Tech_L_optim.jpg</image:loc>
      <image:title>Framework</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/550cb07be4b0f7f604a6c4bf/1426894972700/LineANDcircles1.png</image:loc>
      <image:title>Overview</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/550cb0d9e4b010610913b63e/1426895066819/ColoredCircles1</image:loc>
      <image:title>Overview</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/550c5b89e4b03bd3f92e9928/1394909115478/Digital_ViralL.jpg</image:loc>
      <image:title>Overview</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/attacker-methodology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5afb00caaa4a990673145265/1526399241217/IoT+Security+Analysis+Tools-L.png</image:loc>
      <image:title>Attacker Modus Operandi</image:title>
      <image:caption>Embedded Systems Security Analysis Tools v1</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5afb006f758d46ffd231219b/1526399166910/IoT-System-Attack-Methodology-L.png</image:loc>
      <image:title>Attacker Modus Operandi</image:title>
      <image:caption>Embedded-System-Attacker-Hacking-Methodology - www.m2isf.com</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5324a0fee4b028bc910bfc8b/1394909444777/Robot1L.jpg</image:loc>
      <image:title>Attacker Modus Operandi</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/iot-privacy-best-practice</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/55a1252ce4b0b796f1fc5a82/1436624176544/IoT-and-M2M-Privacy-Components-v2</image:loc>
      <image:title>Privacy Design Best Practices</image:title>
      <image:caption>IoT and M2M Privacy Components v2</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56ca3ed8e32140b6932cb267/1456094960835/Dark_Blue_DigitalAbstractSquares_resized-L.png</image:loc>
      <image:title>Privacy Design Best Practices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/security-best-practices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5aa5b62753450a415649e679/1521911686068/IoTS_Security+Design+Best+Practices_thumbnail-L.jpg</image:loc>
      <image:title>Security Design Best Practices</image:title>
      <image:caption>VIEW THE PDF</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/563502a8e4b0bf2e9fd4a7bd/1446314870702/System+Security+Core+Goals+v1.png</image:loc>
      <image:title>Security Design Best Practices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/56db4656e707eb815a742164/1457211051086/Light-Gray-Digital-Color-Blocks-L.jpg</image:loc>
      <image:title>Security Design Best Practices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/secure-me</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-12-20</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/57d71003579fb30c254cf8c8/1473712133513/Suit-Activating-Shield-light.jpg</image:loc>
      <image:title>Secure-Me: D-OPSEC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/57d71328cd0f68f35dcffd41/1473712937872/Phishing-Hook-light.jpg</image:loc>
      <image:title>Secure-Me: D-OPSEC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/57d7150e44024394f2f218d8/1473713424569/Quad-Security-Controls-light.jpg</image:loc>
      <image:title>Secure-Me: D-OPSEC</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/578175cd579fb375af5a57fe/1469369186451/Suit-Protecting-User-resized-lightL.jpg</image:loc>
      <image:title>Secure-Me: D-OPSEC</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/change-log</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.iotsi.org/devicesla</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-04-21</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5873f74e20099e70180df449/1483994976862/DSLA-Example-Link.jpg</image:loc>
      <image:title>Device-SLA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5abafcdb6d2a733c07711a9d/1522203960095/DSLA-shortlink-label-example-1L.png</image:loc>
      <image:title>Device-SLA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ab8090af950b7f8f1703f06/1522010391109/Device+Security+Level+Agreement+Categories-L+v1.jpg</image:loc>
      <image:title>Device-SLA</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ab802c32b6a28e8430c4189/1522008840246/Purple-Digital-Hero-L.jpg</image:loc>
      <image:title>Device-SLA</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/iot-cybersecurity-principles</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/586434fe59cc68953ac44aa5/1482962192038/Abstract_Blue_NodesL.jpg</image:loc>
      <image:title>Cybersecurity Principles of IoT</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/network-and-cloud-chc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-05-30</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/592d78a86a496328942a1f5b/1496152294887/Orange-Cloud-Architecture-1500L.jpg</image:loc>
      <image:title>Network and Cloud CHC</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/product-development-chc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-05-30</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/592d781e44024329b96dbca7/1496152108856/Blue-Architectured-Gearing-1500L.jpg</image:loc>
      <image:title>Product Development CHC</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/pre-release-security-checklist</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5b4ba7636d2a732ab38b5484/1531686946125/IoTSI+Product+Pre-Release+Security+Validation+Checklist+V1.0-thumbnail-L.jpg</image:loc>
      <image:title>Product Security Launch checklist</image:title>
      <image:caption>Launch Checklist PDF</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5ace1faa03ce64a75c669c53/1523457983865/PreRelease-Checklist-Hero-MasterL.jpg</image:loc>
      <image:title>Product Security Launch checklist</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/dsrs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-12</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/52d75d3de4b0281856c4372c/t/5af76bfd8a922da689d6c5d2/1526164526285/orange-blue-digital-abstract-L.jpg</image:loc>
      <image:title>DSRS</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.iotsi.org/product-launch-security-checklist-template</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-15</lastmod>
  </url>
</urlset>

