<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.hjregan.com/security-privacy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/about-sixty-bit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/advisory-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/what-makes-us-different</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1609826149108-1S7HMSP6E5U6CCH2UK3O/image-asset.jpeg</image:loc>
      <image:title>What Makes Us Different</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1610392729343-W56ZCSI83EMYSMTFBKHB/image-asset.jpeg</image:loc>
      <image:title>What Makes Us Different</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1609826277414-Z97DQ732IDGCR3MXUDQ6/image-asset.jpeg</image:loc>
      <image:title>What Makes Us Different</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.hjregan.com/more-than-simply-defense</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1611589111898-0NQMEITL6355GXJPOY50/Advisory.jpg</image:loc>
      <image:title>Home - Advisory Services</image:title>
      <image:caption>Innovation – tempered by experience Consulting focuses on the management and operationalization of technology in organizations applying a new or emerging technology — whether they are early-stage or established organizations. This incudes the organization’s network and physical security controls and the susceptibility of your staff to social attacks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1609829596795-EPI6GNVY6O97URSEMCDB/image.jpg</image:loc>
      <image:title>Home - Security &amp; Privacy</image:title>
      <image:caption>The Security Program in most organizations is flawed. We can provide Risk and Vulnerability assessments to assess information security, cyber security, physical security, and social engineering protection for enterprise resources and intellectual property. Recognize that most security regulations (HIPAA, GLBA, GDPR, CMMP, etc.) are “media agnostic” and include paper and other non-digital records.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1751976940806-CEQHZIE9V5XZPCKDGI0E/unsplash-image-tJsVpUI8bjo.jpg</image:loc>
      <image:title>Home - Regulatory Compliance</image:title>
      <image:caption>Regulatory requirements can be daunting We can assist in helping navigate the maze of requirements in programs such as HIPAA, GLBA, NERC-CIP, GDPR, CMMC, and others. Often the business is confronted with technical, administrative, legal, training, and documentation issues that have to be achieved— and that all have to support each other. Often the hardest part is creating and maintaining regulatory documentation artifacts and logs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5fdd0181c0b8202fb30604da/1609829649930-AL436VCTBNWOL2NK8E2R/image.jpg</image:loc>
      <image:title>Home - Business Continuity</image:title>
      <image:caption>Evolving Disaster Recovery &amp; Business Continuity Programs We can assist in the development of a threat matrix to identify both the threats and likelihood of events to allow a more granular and situational approach. Recovery can often be as traumatic as the incident or disaster, so a realistic and operable plan for recovery is a vital aspect of business continuity.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.hjregan.com/business-continuity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-17</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/network-operations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/advisory-services-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.hjregan.com/store</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>57487-12-18</lastmod>
  </url>
</urlset>

