<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/Lessons-in-incident-response-from-the-Olympics-World-Cup</loc>
        <video:video>
            <video:title>Lessons in incident response from the Olympics, World Cup</video:title>
            <video:publication_date>2026-03-16T13:18:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/Zp-vHrHt4-4/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=Zp-vHrHt4-4</video:player_loc>
            <video:duration>1065</video:duration>
            <video:description>Cybersecurity lessons from global sports events show that preparation, defense and quick recovery are essential to besting adversaries.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-quantum-key-distribution</loc>
        <video:video>
            <video:title>An explanation of quantum key distribution</video:title>
            <video:publication_date>2025-08-18T11:51:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Quantum key distribution uses physics to create secure encryption keys that detect eavesdropping instantly, offering a quantum-safe solution for future cybersecurity challenges.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-post-quantum-cryptography</loc>
        <video:video>
            <video:title>An explanation of post-quantum cryptography</video:title>
            <video:publication_date>2025-08-15T11:00:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-quantum-cryptography</loc>
        <video:video>
            <video:title>An explanation of quantum cryptography</video:title>
            <video:publication_date>2025-08-06T10:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/_5NQf8k3Jo0/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=_5NQf8k3Jo0</video:player_loc>
            <video:duration>176</video:duration>
            <video:description>Quantum cryptography uses photons to transmit keys securely through quantum properties, creating an unhackable system that outperforms traditional math-based encryption methods.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/AI-security-Top-experts-weigh-in-on-the-why-and-how</loc>
        <video:video>
            <video:title>AI security: Top experts weigh in on the why and how</video:title>
            <video:publication_date>2025-08-05T11:40:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://cdn.brighttalk.com/ams/california/images/communication/627600/image_1007243.jpg?width=640&amp;height=360</video:thumbnail_loc>
            <video:player_loc>https://www.brighttalk.com/webcast/17830/627600</video:player_loc>
            <video:duration>3267</video:duration>
            <video:description>AI is everywhere, so security focus on this new technology is essential. In this podcast episode, three top security experts review the risks and discuss ways to mitigate them.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-encryption</loc>
        <video:video>
            <video:title>An explanation of encryption</video:title>
            <video:publication_date>2025-08-01T08:46:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-purple-teaming</loc>
        <video:video>
            <video:title>An explanation of purple teaming</video:title>
            <video:publication_date>2025-08-01T08:23:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Purple teaming unites offensive red teams and defensive blue teams to share knowledge, find vulnerabilities and strengthen security through structured frameworks and playbooks.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-risk-management-for-businesses</loc>
        <video:video>
            <video:title>An explanation of risk management for businesses</video:title>
            <video:publication_date>2025-07-24T11:04:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Risk management transforms uncertainty into opportunity by identifying threats, evaluating impacts and implementing strategic controls to protect and enhance business value.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-firewall-types-and-uses</loc>
        <video:video>
            <video:title>An explanation of firewall types and uses</video:title>
            <video:publication_date>2025-07-22T08:51:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-data-breaches</loc>
        <video:video>
            <video:title>An explanation of data breaches</video:title>
            <video:publication_date>2025-07-21T08:57:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/An-explanation-of-identity-and-access-management</loc>
        <video:video>
            <video:title>An explanation of identity and access management</video:title>
            <video:publication_date>2025-07-17T12:14:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/Ransomware-Examples-prevention-and-mitigating-the-damage</loc>
        <video:video>
            <video:title>Ransomware: Examples, prevention and mitigating the damage</video:title>
            <video:publication_date>2025-06-30T11:04:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://cdn.brighttalk.com/ams/california/images/communication/628442/image_1045148.png?width=640&amp;height=360</video:thumbnail_loc>
            <video:player_loc>https://www.brighttalk.com/webcast/18975/628442</video:player_loc>
            <video:duration>3461</video:duration>
            <video:description>Top cybersecurity experts gathered to discuss the latest threats from ransomware and how organizations, large and small, can prevent or, at least, mitigate an attack.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/The-DOGE-effect-on-cyber-Whats-happened-and-whats-next</loc>
        <video:video>
            <video:title>The DOGE effect on cyber: What's happened and what's next?</video:title>
            <video:publication_date>2025-06-02T11:52:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://cdn.brighttalk.com/ams/california/images/communication/628444/image_1032663.png?width=640&amp;height=360</video:thumbnail_loc>
            <video:player_loc>https://www.brighttalk.com/webcast/18975/628444</video:player_loc>
            <video:duration>3645</video:duration>
            <video:description>In this webinar, part of 'CISO Insights' series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency's actions and the impact on their field.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/AI-security-concerns-keeping-infosec-leaders-up-at-night</loc>
        <video:video>
            <video:title>AI security concerns keeping infosec leaders up at night</video:title>
            <video:publication_date>2020-08-26T12:51:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/O8rRMeCtVmE/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=O8rRMeCtVmE</video:player_loc>
            <video:duration>166</video:duration>
            <video:description>Conversations about 'AI as a solution' may overlook potentially grave AI security issues. Explore the potential infosec implications of the emerging technology in this video.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/Where-does-security-fit-into-SDLC-phases</loc>
        <video:video>
            <video:title>Where does security fit into SDLC phases?</video:title>
            <video:publication_date>2018-02-19T10:48:00-05:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/kT77wimTXnw/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=kT77wimTXnw</video:player_loc>
            <video:duration>911</video:duration>
            <video:description>In each phase of the software development life cycle, there is an opportunity for infosec pros to add value. Learn more in this video with expert Adam Gordon.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/As-privacy-requirements-evolve-CISSPs-must-stay-informed</loc>
        <video:video>
            <video:title>As privacy requirements evolve, CISSPs must stay informed</video:title>
            <video:publication_date>2017-07-17T00:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/pkIE2I5oR3Y/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=pkIE2I5oR3Y</video:player_loc>
            <video:duration>735</video:duration>
            <video:description>Just as technology constantly changes, so too do the laws and regulations that govern data privacy. CISSPs must remain aware of their organization's individual requirements.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/Adjusting-your-network-perimeter-security</loc>
        <video:video>
            <video:title>Adjusting your network perimeter security</video:title>
            <video:publication_date>2015-11-20T00:00:00-05:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/CBw3L7Fnpy8/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=CBw3L7Fnpy8</video:player_loc>
            <video:duration>1049</video:duration>
            <video:description>Expert Johna Till Johnson explains how the enterprise perimeter became obsolete, and how to replace network perimeter security with an approach to perimeterless security.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/searchsecurity/video/NIST-cybersecurity-framework-Assessing-the-strengths-and-weaknesses</loc>
        <video:video>
            <video:title>NIST cybersecurity framework: Assessing the strengths and weaknesses</video:title>
            <video:publication_date>2014-05-13T00:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/ET2C0rY_b9o/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=ET2C0rY_b9o</video:player_loc>
            <video:duration>736</video:duration>
            <video:description>Video: Securicon executive consultant Ernie Hayden discusses what the NIST cybersecurity framework got right, and how the document can be improved.</video:description>
        </video:video>
    </url>
</urlset>
