<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//conscia.com/de/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://conscia.com/de/whitepaper/microsoft-check-up/</loc>
		<lastmod>2025-07-22T13:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/mscheckup-desk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/hinter-den-kulissen-des-cyberkriegs/</loc>
		<lastmod>2025-07-22T14:15:46+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/cyberwar-operation-center.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/netzwerk-trifft-ki/</loc>
		<lastmod>2025-07-22T14:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/data-center-security-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/cybersecurity-und-der-faktor-mensch/</loc>
		<lastmod>2025-07-22T15:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/bank-ransomware-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/sase/</loc>
		<lastmod>2025-07-22T17:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/adobestock_575870485-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/die-zukunft-der-zusammenarbeit/</loc>
		<lastmod>2025-07-23T06:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/tech-collaboration-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/digitale-transformation/</loc>
		<lastmod>2025-07-23T07:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/digital-transformation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/wifi7/</loc>
		<lastmod>2025-07-23T09:10:26+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/adobestock_163490030-min-min-1-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/managed-services-schulen/</loc>
		<lastmod>2025-07-23T09:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/pexels-rfstudio-3059750-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/one-pager-cybersecurity-workshop/</loc>
		<lastmod>2025-07-23T09:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-soc-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/mit-cns-zu-einfachem-asset-management/</loc>
		<lastmod>2025-07-23T09:18:02+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/cloud-solution-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/sicheres-nutzererlebnis-in-der-cloud/</loc>
		<lastmod>2025-07-23T09:18:47+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/cloud-solution-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/firewall-as-a-service/</loc>
		<lastmod>2025-07-23T09:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-industry-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/sd-wan-as-a-service/</loc>
		<lastmod>2025-07-23T09:21:08+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-using-tech-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/access-as-a-service/</loc>
		<lastmod>2025-07-23T09:22:05+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-soc-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/sichere-e-mail-fuer-sichere-geschaefte/</loc>
		<lastmod>2025-07-23T09:23:14+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-soc-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/erfolgreich-multifaktor-authentisierung-einfuehren/</loc>
		<lastmod>2025-07-23T09:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/16by9-soc-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/datenschutz-im-new-normal/</loc>
		<lastmod>2025-07-23T09:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/city-bubbles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/analyse-der-aktuellen-bedrohungen-im-cyberkrieg/</loc>
		<lastmod>2025-07-23T09:26:29+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2022/12/hacker-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/conscia-cloud-germany/</loc>
		<lastmod>2025-07-31T10:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-using-tech-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/sd-wan-sase/</loc>
		<lastmod>2025-07-31T10:49:54+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/07/16by9-using-tech-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/observability/</loc>
		<lastmod>2025-08-26T12:18:40+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/observability-troubleshoot-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/ot-it-sicherheit-und-transparenz-in-der-produktion/</loc>
		<lastmod>2025-08-26T13:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/person-working-with-ot-hd-1600x600-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/soc/</loc>
		<lastmod>2025-09-10T11:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/16by9-soc-4-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/zero-trust/</loc>
		<lastmod>2025-09-24T12:35:59+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/09/zero-trust-thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/cisco-hypershield/</loc>
		<lastmod>2025-11-19T10:06:12+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/hypershield-desk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://conscia.com/de/whitepaper/nis2/</loc>
		<lastmod>2026-01-29T08:21:37+00:00</lastmod>
		<image:image>
			<image:loc>https://conscia.com/de/wp-content/uploads/2025/06/nis-2-security-lock-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->