<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://alliedcybersolutions.org/about/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/img_9293.jpg</image:loc><image:title>IMG_9293</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/img_9196.jpeg</image:loc><image:title>IMG_9196</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/img_9291.jpg</image:loc><image:title>IMG_9291</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/img_9187.png</image:loc><image:title>IMG_9187</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/img_9270.png</image:loc><image:title>IMG_9270</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2025/04/kyle_1039_gray.jpg</image:loc><image:title>Kyle_1039_gray</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/11/jay-pic-3.jpg</image:loc><image:title>jay-pic-3</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/11/jay-pic-2.jpg</image:loc><image:title>jay-pic-2</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/11/jay-pic-1.jpg</image:loc><image:title>jay-pic-1</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/11/jay-pic.jpg</image:loc><image:title>jay-pic</image:title></image:image><lastmod>2026-03-27T17:29:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/michael-patterson/</loc><lastmod>2026-03-27T17:10:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/vanessa-venable/</loc><lastmod>2026-03-27T17:05:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/kyle-venable/</loc><lastmod>2026-03-27T17:03:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/how-we-help/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/cyber-security-services.jpg</image:loc><image:title>Cybersecurity,Data,Privacy,Hacker,Attack,Protection.,Information,Technology,Internet,Concept.</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/screenshot-2026-02-03-at-13.52.23.png</image:loc><image:title>Screenshot 2026-02-03 at 13.52.23</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/overlay-usa-flag-glowing-ai-260nw-2689427157.jpg.webp</image:loc><image:title>overlay-usa-flag-glowing-ai-260nw-2689427157.jpg</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/cyber-1.jpg</image:loc><image:title>Cyber 1</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/cyber-2.jpg</image:loc><image:title>Cyber 2</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/create-a-featured-image-that-captures-the-essence-that-we-4.png</image:loc><image:title>create-a-featured-image-that-captures-the-essence-that-we</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/create-a-featured-image-that-captures-the-essence-that-we-3.png</image:loc><image:title>create-a-featured-image-that-captures-the-essence-that-we</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/create-a-featured-image-that-captures-the-essence-that-we-2.png</image:loc><image:title>create-a-featured-image-that-captures-the-essence-that-we</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/create-a-featured-image-that-captures-the-essence-that-we-1.png</image:loc><image:title>create-a-featured-image-that-captures-the-essence-that-we</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/create-a-featured-image-that-captures-the-essence-that-we.png</image:loc><image:title>create-a-featured-image-that-captures-the-essence-that-we</image:title></image:image><lastmod>2026-02-03T20:40:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/cyber-risk-for-veteran-serving-organizations/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/gdfh.jpg</image:loc><image:title>GDFH</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/oirf-logo.png</image:loc><image:title>OIRF Logo</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/gsf-logo.jpg</image:loc><image:title>GSF Logo</image:title></image:image><lastmod>2026-02-02T23:06:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/our-toolkit/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2024/03/hp-2.jpeg</image:loc><image:title>HP 2</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2024/03/ciso-3.jpg</image:loc><image:title>ciso 3</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/10/zero-trust.jpg</image:loc><image:title>zero-trust</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/10/enterprise-it.jpg</image:loc><image:title>enterprise-it</image:title></image:image><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2022/10/cybersecurity.jpg</image:loc><image:title>cybersecurity</image:title></image:image><lastmod>2026-02-02T22:31:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/preparing-for-soc-2-without-burning-out-your-team/</loc><lastmod>2026-02-02T21:46:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/cybersecurity-for-nonprofit-boards/</loc><lastmod>2026-02-02T21:31:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/advisory-services/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/01/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-02T17:36:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/cybersecurity-built-for-mission-scale-and-accountability/</loc><image:image><image:loc>https://alliedcybersolutions.org/wp-content/uploads/2026/02/screenshot-2026-02-02-at-11.00.43.png</image:loc><image:title>Screenshot 2026-02-02 at 11.00.43</image:title></image:image><lastmod>2026-02-02T17:33:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://alliedcybersolutions.org/2021/08/18/example-post-3/</loc><lastmod>2021-08-18T13:41:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://alliedcybersolutions.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-27T17:29:43+00:00</lastmod></url></urlset>
