<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->

<url>
  <loc>https://www.isab.it/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.isab.it/contact/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/fireeye-email-threat-report-january-june-2018/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/formazione-utenti-e-gdpr-un-aspetto-previsto-da-non-sottovalutare/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/data-breach-quando-la-tecnologia-da-sola-non-basta/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/soluzioni/aerohive-il-wi-fi-intelligente/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/barracuda-cloudgen-firewall/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/barracuda-message-archiver/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/dell-emc2/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/soluzioni-fireeye/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/hx-protezione-endpoint-fireeye/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/soluzioni-fireeye/fireeye-helix-semplifica-integra-e-automatizza-le-operazioni-di-sicurezza/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/assessment-di-cyber-security/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/corsi-di-formazione-in-ambito-cyber-security/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/eventlog-analyzer/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/dpo/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/home/data-protection-officer-r/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/service-desk-plus/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/case-history-cifa/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/case-history-unical/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/privacy/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/cookie-policy/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.isab.it/focus-sulla-sicurezza-delle-reti-industriali/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/limportanza-del-network-monitoring/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/cose-formazione-in-ambito-di-cyber-security/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/soluzioni/dell-2/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/a-fireeye-il-premio-best-email-security-solution-scawards2018/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/programma-di-formazione-kaspersky-security-awareness/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.isab.it/28-gennaio-dataprivacy-day/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/meltdown-e-spectre-le-vulnerabilita-dei-microprocessori/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/gli-attacchi-alle-reti-industriali-nel-2017-e-previsioni-per-il-2018/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/sicurezza-endpoint/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/falsi-miti-sulla-sicurezza-informatica/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/fireeye-helix/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/notpetya-cosa-e-successo-il-27-giugno/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/come-il-wi-fi-ha-cambiato-il-modo-di-fare-business/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/proteggere-la-proprieta-intellettuale-nelle-comunicazioni/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/wannacry-2-0-la-nuova-ondata-di-ransomware/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/come-innalzare-il-livello-di-sicurezza/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/5-e-piu-motivi-per-monitorare-la-rete/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/linee-dati-performanti-in-tutto-il-mondo/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/un-sistema-di-helpdesk-e-giustificato-solo-nelle-aziende-con-migliaia-di-utenti/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/correlazione-dei-log-attivita-di-compliance-o-beneficio-concreto-di-business/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/conosciamo-le-vulnerabilita-della-nostra-azienda/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/attacchi-informatici-in-aumento-negli-ambienti-industriali-come-proteggere-i-progetti-aziendali/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/cose-lassessment-dei-processi-e-perche-tutte-le-aziende-dovrebbero-farlo/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.isab.it/prova-condivisione/</loc>
  <lastmod>2018-10-02T10:24:23+00:00</lastmod>
  <priority>0.41</priority>
</url>
</urlset>