<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 4 April 2026 at 05:30 by All in One SEO v4.8.9 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://wisdiam.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Wisdiam</title>
		<link><![CDATA[https://wisdiam.com]]></link>
		<description><![CDATA[Wisdiam]]></description>
		<lastBuildDate><![CDATA[Wed, 18 Sep 2024 19:44:07 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://wisdiam.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-telcos/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-telcos/]]></link>
			<title>12 recent cyber-attacks on the telco sector</title>
			<pubDate><![CDATA[Wed, 18 Sep 2024 19:44:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/avoid-two-e-mail-providers-board-business/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/avoid-two-e-mail-providers-board-business/]]></link>
			<title>Two types of e-mail provider to avoid for board business</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:15:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/cyber-security-exercise-in-a-box-guided-tour/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/cyber-security-exercise-in-a-box-guided-tour/]]></link>
			<title>Cyber security Exercise in a Box guided tour</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:14:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-food-agriculture-sector/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-food-agriculture-sector/]]></link>
			<title>8 recent cyber attacks on food production and agriculture</title>
			<pubDate><![CDATA[Wed, 09 Oct 2024 10:09:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-manufacturing-industry/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-manufacturing-industry/]]></link>
			<title>8 recent cyber attacks on the manufacturing industry</title>
			<pubDate><![CDATA[Wed, 18 Sep 2024 19:44:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/about/]]></guid>
			<link><![CDATA[https://wisdiam.com/about/]]></link>
			<title>About Wisdiam</title>
			<pubDate><![CDATA[Tue, 23 Apr 2024 11:51:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/questions-boards-ask-about-domain-name-security/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/questions-boards-ask-about-domain-name-security/]]></link>
			<title>Four questions boards should ask about domain name security</title>
			<pubDate><![CDATA[Thu, 11 Apr 2024 10:32:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/enhanced-visibility-hardening-guidance-communications-telecom-infrastructure/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/enhanced-visibility-hardening-guidance-communications-telecom-infrastructure/]]></link>
			<title>Enhanced Visibility and Hardening Guidance for Communications Infrastructure</title>
			<pubDate><![CDATA[Sun, 15 Dec 2024 05:57:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-transport-logistics-sector/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-transport-logistics-sector/]]></link>
			<title>14 recent cyber attacks on the transport &amp; logistics sector</title>
			<pubDate><![CDATA[Sun, 06 Oct 2024 09:57:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/sa-power-networks-cyber-security-annual-report-2023/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/sa-power-networks-cyber-security-annual-report-2023/]]></link>
			<title>SA Power Networks Cyber Security Annual Report 2023</title>
			<pubDate><![CDATA[Sat, 27 Apr 2024 12:11:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-water-wastewater/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/recent-cyber-attacks-water-wastewater/]]></link>
			<title>11 recent cyber attacks on the water and wastewater sector</title>
			<pubDate><![CDATA[Sat, 08 Nov 2025 03:25:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/how-doughnuts-make-break-cyber-security-culture/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/how-doughnuts-make-break-cyber-security-culture/]]></link>
			<title>How doughnuts can make or break your cyber security culture</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:15:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/governance-institute-of-australias-effective-cyber-risk-management-guide/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/governance-institute-of-australias-effective-cyber-risk-management-guide/]]></link>
			<title>GIA&#8217;s Effective Cyber Risk Management Guide</title>
			<pubDate><![CDATA[Sun, 01 Sep 2024 11:13:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/nist-cybersecurity-framework-csf/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/nist-cybersecurity-framework-csf/]]></link>
			<title>NIST Cybersecurity Framework (CSF) 2.0</title>
			<pubDate><![CDATA[Mon, 29 Jul 2024 11:26:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/cie-vs-cce/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/cie-vs-cce/]]></link>
			<title>Cyber-Informed Engineering (CIE) vs Consequence Driven, Cyber-Informed Engineering (CCE)</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:12:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/city-council-cyber-attack-consequences/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/city-council-cyber-attack-consequences/]]></link>
			<title>Rare look into city council cyber attack and consequences</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:10:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/one-pc-from-disaster-zaun-cyber-security-lesson/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/one-pc-from-disaster-zaun-cyber-security-lesson/]]></link>
			<title>One PC from disaster: Zaun&#8217;s cyber security lesson</title>
			<pubDate><![CDATA[Wed, 10 Apr 2024 11:09:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/insights-from-rare-case-study/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/insights-from-rare-case-study/]]></link>
			<title>Insights from a rare case study</title>
			<pubDate><![CDATA[Tue, 09 Apr 2024 12:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/unlocking-cyber-resilience-industrial-environments-five-principles/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/unlocking-cyber-resilience-industrial-environments-five-principles/]]></link>
			<title>Unlocking Cyber Resilience in Industrial Environments: 5 Principles</title>
			<pubDate><![CDATA[Wed, 29 Nov 2023 11:29:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/]]></guid>
			<link><![CDATA[https://wisdiam.com/]]></link>
			<title>Cyber security awareness for infrastructure asset managers</title>
			<pubDate><![CDATA[Sun, 28 Apr 2024 08:04:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/lets-torque-about-smart-tool-cyber-security/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/lets-torque-about-smart-tool-cyber-security/]]></link>
			<title>Let&#8217;s torque about smart tool cyber security</title>
			<pubDate><![CDATA[Tue, 09 Apr 2024 12:44:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/resources/]]></guid>
			<link><![CDATA[https://wisdiam.com/resources/]]></link>
			<title>Cyber Security Resources for Leaders in Asset Management</title>
			<pubDate><![CDATA[Wed, 24 Jan 2024 10:26:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/manufacturing-under-cyber-attack/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/manufacturing-under-cyber-attack/]]></link>
			<title>Manufacturing under cyber-attack</title>
			<pubDate><![CDATA[Wed, 06 Mar 2024 21:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/hacktivists-tap-into-vulnerable-operational-technology/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/hacktivists-tap-into-vulnerable-operational-technology/]]></link>
			<title>Hacktivists tap into vulnerable operational technology</title>
			<pubDate><![CDATA[Thu, 15 Feb 2024 01:58:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/privacy-policy/]]></guid>
			<link><![CDATA[https://wisdiam.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Thu, 11 Jan 2024 11:58:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/ncscs-cyber-security-training-for-staff/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/ncscs-cyber-security-training-for-staff/]]></link>
			<title>NCSC&#8217;s Cyber Security Training for Staff</title>
			<pubDate><![CDATA[Sun, 16 Apr 2023 06:44:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/contact/]]></guid>
			<link><![CDATA[https://wisdiam.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sun, 01 Oct 2023 10:54:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/how-boards-can-protect-security-employee-information/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/how-boards-can-protect-security-employee-information/]]></link>
			<title>How boards can protect the security of employee information</title>
			<pubDate><![CDATA[Sun, 01 Oct 2023 09:32:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/new-course-cyber-security-infrastructure-asset-managers/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/new-course-cyber-security-infrastructure-asset-managers/]]></link>
			<title>New course: Cyber security for infrastructure asset managers</title>
			<pubDate><![CDATA[Sun, 01 Oct 2023 09:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/aicd-governing-through-cyber-crisis/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/aicd-governing-through-cyber-crisis/]]></link>
			<title>AICD&#8217;s Governing Through a Cyber Crisis</title>
			<pubDate><![CDATA[Sat, 30 Mar 2024 12:47:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/subscribe/corporate/]]></guid>
			<link><![CDATA[https://wisdiam.com/subscribe/corporate/]]></link>
			<title>Cyber security awareness that gets noticed</title>
			<pubDate><![CDATA[Mon, 08 Apr 2024 11:56:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/cyber-physical-systems/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/cyber-physical-systems/]]></link>
			<title>Cyber-Physical Systems</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 10:14:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/ciscs-overview-of-cyber-security-obligations-for-corporate-leaders/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/ciscs-overview-of-cyber-security-obligations-for-corporate-leaders/]]></link>
			<title>CISC&#8217;s Overview of Cyber Security Obligations for Corporate Leaders</title>
			<pubDate><![CDATA[Wed, 24 Jan 2024 10:21:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/ncsc-cyber-security-toolkit-for-boards/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/ncsc-cyber-security-toolkit-for-boards/]]></link>
			<title>NCSC&#8217;s Cyber Security Toolkit for Boards</title>
			<pubDate><![CDATA[Sun, 16 Apr 2023 06:31:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/how-to-know-your-critical-digital-assets/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/how-to-know-your-critical-digital-assets/]]></link>
			<title>Directors: How to get to know your critical digital assets</title>
			<pubDate><![CDATA[Sat, 14 Jan 2023 05:39:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/aicd-cscrc-cyber-security-governance-principles/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/aicd-cscrc-cyber-security-governance-principles/]]></link>
			<title>AICD&#8217;s Cyber Security Governance Principles</title>
			<pubDate><![CDATA[Sat, 14 Jan 2023 05:37:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/building-a-model-of-organisational-cybersecurity-culture/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/building-a-model-of-organisational-cybersecurity-culture/]]></link>
			<title>Building a Model of Organisational Cybersecurity Culture</title>
			<pubDate><![CDATA[Thu, 12 Jan 2023 02:17:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://wisdiam.com/publications/]]></guid>
			<link><![CDATA[https://wisdiam.com/publications/]]></link>
			<title>Publications</title>
			<pubDate><![CDATA[Sun, 01 Oct 2023 10:54:56 +0000]]></pubDate>
		</item>
				</channel>
</rss>
